Get the protection and resilience you need

Uncover the Unknown. 
BeRansomware Ready.

Call on Halcyon Services to provide prevention, protection, and resilience from ransomware. Discover how proactive services assess and harden organizations from attacks by reviewing and improving control effectiveness using the latest ransomware intelligence.

Research, development and application. Rinse. Repeat.

The Halcyon Holistic Approach to Services

1

Our unique approach starts with research

Halcyon reverse-engineers public and private ransomware samples. The team’s analysis builds libraries of intelligence for ML/AI & Product improvements, with operator intel of their unique operator TTPs & IOCs.

2

Improving on product development

Halcyon Engineering develops defensive and resilience product features into the Halcyon Platform, against real attack patterns. They build tools to analyze, fingerprint, and decrypt victim files too.

3

Applying the science of professional services

Lessons learned generate a services catalogue with proactive and reactive services to harden clients pre-attack and to support victims in the event of a successful attack.

A Ransomware Readiness Exercise Cements Preventative Measures

Prevent Ransomware Events. Don’t Become a Statistic.

Why Halcyon?

Preventing a ransomware event has a significantly higher ROI than traditional assessments. The Halcyon Ransomware Readiness assessment focuses on the specific attack patterns, using the same tools as your potential attackers, that will impact your industry and organization size to make your time well spent.

How Do We Do It?

Perimeter Security Control Gaps

Initial Access Broker weaknesses are identified using our customized Breach and Attack Simulation tools. Starting from the outside in.

Endpoint security control gaps

Endpoint Exploitation & exfiltration gaps are identified via endpoint policies and execution for ransomware TPs, uncovering the unknown.

Disaster recovery & biz continuity gaps

Starting from the inside out, testing backup system scope, plan, and hardening prepares you for total control failure.

The Outcome

You receive the most informed technical remediation plan to harden your environment from a realistic ransomware attack.  Our control recommendations include effective solutions in victims that are proven to reduce your attack surface for prevention and resilience.
the incident response tabletop exercise will sharpen your skills

Preventing Ransomware is Table Stakes with Halcyon.

Why Halcyon?

Our methodology provides the most compelling learning experience for your executive team to understand their response capabilities in the most realistic ransomware attack possible.

How Do We Do It?

Our approach provides targeted scenarios by joining a red teamer, an incident responder, and an advisory consultant together to define your initial access vector, the specific data/systems that are encrypted, what data has been exfiltrated, and how that operator pressures an organization through negotiation and extortion techniques.

1

Industry specific

Halcyon utilizes all ransomware TTPs and data used to target your organization’s industry, which is collected from recent incident response events.

2

Merged expertise

Our method blends offensive, defense, and advisory services to ensure the most effective exercise and outcome.

3

Third party review

Uniting contacts in ransomware negotiation, legal, and privacy means every aspect is considered from all attacks.

The Outcome

Our exercise provides the best executive experience, and our report generates the most effective action plan to ensure your Incident Response Plan is prepared to respond to a ransomware event with the best potential results. We perform the 1-day exercise and a 1 hour debrief is provided one week later, to review our report in depth

Become Ransomware Resilient.

Talk to a Halcyon Services expert to learn more

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Cookie Consent

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.