We provide a variety of consulting services to include: Cyber Compliance, Cyber Engineering, and Defensive Cyber Support.
- System Development Lifecycle (SDLC)
- ERB/CCB Proposals
- Cyber Architecture and Design
- VMWare, Windows, and RHEL
- Test Access Points (TAPs)/Aggregators
- Intrusion Detection Systems (IDS)
- Security Info and Event Manager (SIEM)
- Ansible Automation Platform (AAP)
- Trellix (Formerly McAfee EPO)
- Cisco and Palo Alto Firewalls
- Cross-Domain Solutions (CDS)
- Cisco Identity Services Engine (ISE)
- KG Network Encryptors
- Highly Resilient Systems
- Active Directory, DNS, LDAPS, GPOs
- SIEM Monitoring
- Threat Hunting
- Baseline Monitoring
- Trend Analysis
- Search for Indicators of Compromise (IoCs)
- Risk Assessments
- Incident Response
- QoS Monitoring
- Required Reporting
- Threat Assessments
- Vulnerability Assessments
- Log Analysis
- Packet Inspection
- Data Correlation
- CSSP Integration