Cybersecurity is the combination of technologies, processes and practices designed to protect networks, computers and data from attack, damage or unauthorized access. Our engineers & partners have deep domain expertise providing cybersecurity solutions and services for some of our nation’s most critical IT infrastructures in the areas of:
- Security Infrastructure Protection - our secure infrastructure solutions are designed to provide the uptime and availability our clients rely on. Our information security professionals partner with our clients to determine and deploy the right combination of information analysis and cyber security best practices that are optimized to meet each organization’s needs.
- Computer Network Defense - today’s computer networks face many security challenges. Networks are constantly under attack from both internal and external threats. At ViGLITY, our security engineers take a Blue Team approach in developing Computer Network Defense (CND) solutions to defend against Advanced Persistent Threats (APT). Our engineers work closely with our clients to analyze security architectures to design, develop, and deploy defense-in-depth strategies and design solutions to meet the ever evolving threat vector.
- Certification & Accreditation (C&A) - our engineers work closely with our clients to analyze their security awareness and posture by assessing the compliance of their systems against security standards published within the DoDI 8510.01, CNSSI 1253, and other Federal Standard publications. Our engineers and analysts leverage tools such as the Defense Information Systems Agency’s (DISA) Assured Compliance Assessment Solution (ACAS) to ensure system vulnerabilities are identified, mitigated and compliance is met using Enterprise Mission Assurance Support Service (eMASS) to manage assessments.
- Risk & Vulnerability Analysis - we excel at executing analyses designed to define, identify, and classify security vulnerabilities of our client’s networks. Our security analysts perform Threat and Risk Analysis and recommend solutions designed to maximize the Confidentiality, Integrity and Availability of our client’s systems. Our analysts work hard to determine the effectiveness of our proposed countermeasures to vulnerabilities and evaluate their effectiveness of our solutions once deployed.