Copyright 2014
Friday, All Rights Reserved.

Cloud Security
  • FedRAMP
  • Service Level Agreements (SLAs) Cloud Security Alliance
  • Role and responsibility clarification between Cloud Service Providers (CSPs) and customers
  • Trusted Internet Connections (TIC)
Audit Defense & Compliance
  • Prior auditors and assessors who speak oversight / compliance language (IG, GAO, SCA) and can help customers translate and prove compliance
  • Equipped for Financial Statement Audits (FSAs), FISMA, and Security Control Assessments (SCAs)
  • Security process advice
Information Assurance
  • NIST Risk Management Framework (RMF)
  • Assessment & Authorization (A&A)
  • Authorization to Operate (ATO) and ATO reciprocity
  • Governance, Risk and Compliance (GRC)
Security Technologies Experience
  • Network and Application Firewalls, DB Protection, Security Taps, and Anti-Malware
  • Intrusion Detection System (IDS) / Intrusion Prevention System (IPS)
  • Unified Threat Management (UTM)
  • Security Information and Event Management (SIEM)
  • Network, DB, and App Scanning for Large Enterprise Networks and Infrastructure
Risk Assessment
  • FRA (Facilitated Risk Assessment)
Network Security
  • Vulnerability Assessments
  • Penetration Testing
  • Application / DB Assessments
  • Security Monitoring & Reporting
  • Interconnection Security Agreements (ISAs) and Secure Connections
  • Incident Response & Forensics
  • Security Architecture Advisory Services
  • Event management
  • Threat Analysis and Cyber Threat Intelligence Sharing and Reporting
  • Trusted Internet Connection (TIC)
Identity & Access Management
  • HSPD-12
  • Multi-Factor Authentication (MFA) Password Vault
  • LDAP Integration
  • Single-Sign-On (SSO)
  • Privacy Act
Data Center Security
  • Security Support for Federal Data Center Consolidation Initiative (FDCCI) / Data Center Optimization Initiative (DCOI)
  • Physical Security
Business Continuity & Recovery
  • Business Impact Analysis (BIA)
  • Business Continuity Plan (BCP)
  • Business Resumption Plan (BRP)
  • Continuity of Operations Plan (COOP)
Software Assurance
  • Secure Agile Software Development
  • Source code, Database (DB), and Application Security Assessments
  • Pen Testing