Cyber Security Services

Our services span all critical security management and operation functions, including event aggregation and archiving, real-time analysis, incident investigation, remediation, reporting and audit. We evaluate and develop security programs, security policies, security requirements, system security plans, contingency plans, incident response plans, training plans, and continuous monitoring and patch management strategies, intrusion detection and prevention strategies, configuration management plans, and audit collection and review strategies.

We understand and assist our customer with developing and implementing the following:

  • Access Control Systems and Methodology - details the critical requirements to establish adequate and effective access control restrictions for an organization. Access control protects systems, data, physical infrastructure and personnel in order to maintain their integrity, availability and confidentiality.
  • Communications and Network Security - addresses the security concerns related to the critical role of telecommunications and networks in distributed computing environments. Our security engineers understand the risks to communications networks across data, voice and multimedia.
  • Cryptography - requires the security professional to understand cryptographic methodologies and the use of cryptography to protect an organization's data storage and communications from compromise and misuse.
  • Security Architecture Analysis - requires the evaluation and choice of different architectures, and understanding risks associates with each type of design.
  • Technology Related Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP) - involves the identification of adverse events that could threaten the ability of the organization to continue normal operations. Once identified, the security professional will implement countermeasures to reduce the risk of such incidents from reoccurring.
  • Physical Security Considerations - Our engineers are cognizant of the importance of physical security and personnel controls in a complete information systems security model.