Cyber Security
Information Assurance
Traversing through the myriad of security guidelines and directives can be bewildering—let us assist. SecuriGence has developed security policies, procedures, and guidelines based on many different forms of guidance, such as NIST 800 Series, DoD Instructions, Risk Management Framework (RMF), DoD directives such as TASKORDs and PLANORDs, and the ICD Series. We have utilized these guidelines, while integrating agency-specific guidance and requirements to produce effective solutions. SecuriGence also has experience managing agency programs such as Information Assurance Vulnerability Management (IAVM), Vulnerability Management System (VMS), and 8570 Workforce Improvement Program (WIP).
Computer Network Defense
The malicious actor attempting to exploit your information systems only has to be right once. While today’s IT capabilities have fundamentally transformed the way we operate, they have also increased our attack profile exponentially. SecuriGence has leveraged leading edge technology, such as next-generation firewalls (NGFW), big data SIEM solutions, and sandboxed virtual execution of code, to develop holistic, best-of-breed security stacks for our customers. Our staff are computer network defense experts, tackling the latest risks to information systems, such as advanced persistent threats (APTs), zero-day exploits, and insider threat.
Security Engineering
An unpatched Windows system will survive approximately 5 minutes on the open Internet according to the Internet Storm Center (ISC). The truth is, fundamental system hardening, implementation of an anti-malware suite, and other security best-practices can substantially decrease the attack surface. Our security engineering staff utilize NIST, DISA STIGs, and CIS benchmarks, among others, coupled with organization-specific guidance, and industry best-practices to harden systems. SecuriGence has implemented and maintained enterprise deployments of industry leading anti-malware suites, to include the DoD’s execution of McAfee ePolicyOrchestrator, known as HBSS. Vulnerability scanning is a key component of assessing weaknesses in network components, endpoints, and software. SecuriGence engineers have experience with numerous vulnerability scanners, to include Retina, Acunetix, and Nessus—along with the DoD implementation of Nessus, called Assured Compliance Assessment Solution (ACAS). Our staff are certified in various Microsoft, Red Hat Linux, Cisco and other products, and are authorities at securing them against malicious actors.
Certification and Accreditation (C&A)|Assessment and Authorization (A&A)
What value is an information system without an authority to operate (ATO)? All dressed up and nowhere to go. C&A/A&A, while essential to gaining approval to operate an information system, is more importantly critical to the process of risk management within an organization’s overarching security program. The selection and specification of security controls, and subsequent implementation and testing, is crucial to ensuring that an information system has security baked-in from inception and throughout its system lifecycle. SecuriGence has extensive experience with many accreditation vehicles, to include:
- Defense Information Assurance Certification and Accreditation Process (DIACAP)
- DoD 8510.01 Risk Management Framework (RMF) for DoD IT
- NIST 800-37
- Director of Central Intelligence Directive (DCID) 6/3
- Joint SAP Implementation Guide (JSIG)
- DoD Joint Security Implementation Guide
- We have guided organizations through all phases of C&A/A&A, to include control selection, auditing, artifact generation, and plan of actions and milestones (POA&M) management, with 100% success in attaining ATO/ATC.
Zero Trust
We design and implement new security approaches for our customers that evolve with the ever-changing cyber landscape. These initiatives enhance security, scalability, and operational resilience across our customers enterprise architecture.
We successfully designed, developed, implemented, and deployed federally accredited Zero Trust Architecture (ZTA) endpoint solutions.
Cross Domain Solution
A solution that enables enterprises of different domains of control and levels of classification a means to access and share information seamlessly and securely. We are one of the few proven businesses with an established MLS solution. A key advantage of our Cross Domain Solution is that it is vendor agnostic, offering flexible solutions to the customer. Our platform supports multiple operating systems, tailoring specific software needs within a Special Access Program (SAP) enterprise, including Windows, Linux, and any other OS. We have been revolutionizing MLS and CDS by improving customer experience and ease of use through latest technologies, while maintaining a vendor-neutral approach and ensuring the ability to leverage existing investments.