Cyber Security
There are multiple areas where systems can make organizations vulnerable to virus attacks and data theft, among other threats. The goal of our IT Security Solutions is to ensure your data Confidentiality, Integrity, and Availability is protected.
We can assist you in protecting the Confidentiality of your data through our enterprise-wide Security Program; protecting the Integrity of your data through our Information Assurance Program and securing your assets; and protecting the Availability of your data by implementing our DR/COOP services.
E-INFOSOL’s enterprise-wide Security Program, we perform a system assessment and provide advice as to help you identify the FIPS 199 Security Categorization and FIPS 200 to identify the applicable Security Controls required.
Whether it’s the traditional approach, or one focused on the Cloud Computing environment, we provide Authorization Boundary Identification, as well as prioritization of assets by their level of criticality.
Additional services in this program include the development of an Information Security Plan in compliance with NIST SP 800-18 Rev 1 (Guide for Developing Security Plans for Federal Information Systems), as well as the development of IT Contingency Plans in compliance with NIST SP 800-34 Rev1, and developing a Configuration Management Plan for Information Systems in compliance with NIST SP 800-128. Furthermore, we aid in the development of all policies and procedures concerning Technical, Operational and Management Security Controls, as defined in NIST SP 800-53 Rev 3. Our services also include guidance and implementation of NIST SP 800-53 Rev 3 Security Controls applicable, based on a FIPS 199 Security Categorization.
Our FISMA audit services focus on executing a Risk Assessment that fully complies with NIST SP 800-37 Rev 1. After the audit, results are presented to Senior Executives along with an overview of the Information System’s Security Posture to help them make a Risk-Based decision with the goal of providing an Authorization to Operate.
The diverse technical background and expertise of our team ensures audits are engaged accurately from a Technical perspective, thus providing the more feasible recommendations to implement Security Controls.
We use the latest Vulnerability Assessment tools to execute in-depth Security Testing of Infrastructure Assets. We believe this assessment is essential in every organization, as it reveals Security Holes that may otherwise go unnoticed until the network is compromised. Therefore, we strongly recommend periodic Vulnerability Assessments with a proper scope, as determined by your particular system needs. We can assist in identifying assets vulnerabilities and in mitigating the risk of vulnerabilities being exploited. Given the uniqueness of every IT environment, we tailor our Security Assessment activities to fit each specific environment. Our expertise in Virtualization and Cloud Computing also enables us to fully understand security configurations and attributes specific to these environments.
Our approach to Security Assessments involves manually extracting security configuration from the assets, observing the implementation of security controls and performing automated vulnerability scanning. Both Vulnerability Scanning and Security Assessment services are offered as part of our FISMA audit service.