Cybersecurity

DEFENSE-IN-DEPTH
CYBERSECURITY SOLUTIONS
THAT STRENGTHEN CRITICAL
IT RESOURCES AND DATA

In todays connected world with ubiquitous technology, increasingly complex networks, greater reliance on cloud computing, and the increased sophistication, frequency, and impact of cyber-attacks, organizations must have a continually monitored and protected infrastructure using a robust cybersecurity program to address and respond to cyber risks.

 

Our cleared and certified cybersecurity professionals deliver agile, defense-in-depth solutions that enable confidentiality, integrity, and availability of our DoD customer’s business critical IT resources and data. We also provide infrastructure facility’s physical security, personnel security, and cybersecurity education training.

 

We provide you assurance that your data, systems, and services are protected from intrusions, theft, and sabotage. Our IT security and risk assessment services ensure the requisite level of security controls are protecting your organization’s information assets.

ASD’s CYBER LAB ADVANTAGE

Our Laboratory Environment allows us to deploy, evaluate, train and demonstrate Cybersecurity tools and methods before we match them to any of our customer’s needs.  ASD is able to rapidly build proof-of-concepts to specific customer requirements.

CORE COMPETENCIES

 Computer Network Defense in Depth
Security Information & Event Management (SIEM)
Continuous Monitoring and Real-time Detection
Cyber Situational Awareness
Risk Assessment and Response
Implement Mandated Policies/Controls

Insider Threat Detection/Prevention
Technical Support for Encryption
Secure Authentication Systems
Security Hardening
Information Architecture / Plans
FISMA Tracking and Reporting
Secure Video Teleconferencing
Technology Evaluation Support

Promote User Awareness and Training
Monitor Policy/Control Effectiveness
Evaluate & Test Systems/Applications
PKI Installation & Management
Risk Identification
Vulnerability Management
RMF/A&A

OUR TOOLS

ASD has partnerships and agreements with companies and platforms that we have tested in our own lab environment. Below are some of the tools that we have selected for our customers.

 

Vectra Cognito™
Cognito is the award-winning threat detection and response platform from Vectra. It automates the hunt for cyber attackers, shows where they’re hiding and tells you what they’re doing.
 

CryptoniteNXT
Contain attackers and make their targets invisible. An attacker can’t discover what they can’t see, and likewise can’t attack without a target. CryptoniteNXT eliminates an adversary’s network visibility and reduces their attack surface, without sacrificing performance or transparency to your users.
 

Attivo
Attivo Networks deception technology provides a threat defense of traps and lures designed to deceive attackers into revealing themselves. Engagement-based attack analysis, forensics, and 3rd party integrations accelerate incident response.
 

NIKSUN
NIKSUN NetDetector Suite provides in-depth and real-time forensics that go beyond firewalls and IDS/IPS systems to identify, resolve and prevent cyber-attacks. NetDetector is a solution for full packet capture, application fingerprinting/reconstruction, IDS and anomaly detection.
 

Tanium
Tanium empowers security and IT operations teams with the unique power to secure, control and manage millions of endpoints with unprecedented speed, simplicity and scale.
 

WALKOFF
An open source, community-based automation framework allowing integration of capabilities and devices to cut through the repetitive, tedious tasks involved in controlling enterprise networks.