Call us at 210-804-1409

Outsource With Confidence

Our Information Security process ensures robust systems engineering principles are applied to the IT lifecycle. From defining requirements and analyzing sub-processes to system design, we are committed to providing accredited systems that our clients can have confidence in. We will instill trustworthiness at every stage of the process.

We are very familiar with the DoD Information Assurance Policy for IA Certification and Accreditation process (DIACAP). We will provide Outstanding and timely Information Assurance support for our clients. The scope of our IA support includes the "entire network", to include Windows domains (web, DNS, RAS), VPN connections, local workgroups, PKI registration, stand-alone servers, UNIX servers, and other client systems (e.g., Macintosh systems, Intel-based PCs, and other peripheral equipment). Our IA Network Specialists provide the following support:

We are confident in our recommendations and planning for secure operational configurations. We remain current on industry best practices, threats, and vulnerabilities, utilizing such sources as AFCERT, DOD-CERT, and the National Institute for Standards and Technology (NIST). We will plan for aggressive but achievable security, coordinating all recommendations through written communications such as white papers, surveys, and standards. As applicable, we will also analyze all command files, source code, object files, libraries, and other computer files. Finally, we will utilize the following technical tools in monitoring the network: War Dialer, password crack programs, Password Policy Enforcers, and Wireless Enterprise Protocols.

We are experienced in supporting all DIACAP activities, coordinating closely with our Technical Writer in developing submission packages. This may include completion of configuration documentation, vulnerability scanning exercises, and associated remediation activities. We will provide guidance on processing hardware/software requests and other systems requirements or audit documentation. We have conducted Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIG) scans utilizing DISA Gold Disk and successfully conducted mitigation procedures in preparation for DIACAP assessments. Our CISSP on staff ensure proper security procedures are followed and embedded into every system/application that we develop and/or maintain.

We are Health Insurance Portability and Accountability Act (HIPAA) trained to ensure your organization exceeds all requirements for protecting patient health information.

©Copyright - Genesis Business Systems, 2015.