Reliable, Repeatable, Measurable, Affordable



Similar documents
Enterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength

Trusted Experience on Major Data Center Initiatives

Rapid Response, Total Support. Homeland Security Solutions that Keep America Safe

Network Systems Integration

How To Protect Your Network From Attack From A Network Security Threat

Middle Class Economics: Cybersecurity Updated August 7, 2015

Network Management and Defense Telos offers a full range of managed services for:

Cybersecurity Delivering Confidence in the Cyber Domain

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

CyberSecurity Solutions. Delivering

Health Solutions. Mission-Critical Support Across the Health Spectrum

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Advancing the U.S. Air Force Mission

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Microsoft s cybersecurity commitment

Preemptive security solutions for healthcare

Flexible, Life-Cycle Support for Unique Mission Requirements

Critical Controls for Cyber Security.

Injazat s Managed Services Portfolio

Cybersecurity Enhancement Account. FY 2017 President s Budget

Cyber Watch. Written by Peter Buxbaum

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services

THE WORLD IS MOVING FAST, SECURITY FASTER.

A Comprehensive Cyber Compliance Model for Tactical Systems

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

FREQUENTLY ASKED QUESTIONS

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

North American Electric Reliability Corporation (NERC) Cyber Security Standard

HP and netforensics Security Information Management solutions. Business blueprint

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS

ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002

ClearSkies. Re-Defining SIEM

Payment Card Industry Data Security Standard

Cisco SAFE: A Security Reference Architecture

ABB s approach concerning IS Security for Automation Systems

High End Information Security Services

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Building Security In:

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

COMPLIANT CLOUD INFRASTRUCTURE FOR THE PUBLIC SECTOR SERVING STATE, LOCAL GOVERNMENT AND EDUCATION ORGANIZATIONS

Cybersecurity on a Global Scale

ALERT LOGIC FOR HIPAA COMPLIANCE

Department of Management Services. Request for Information

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

Caretower s SIEM Managed Security Services

Cyber Security Research and Development a Homeland Security Perspective

Cisco Security Optimization Service

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA Office: Fax:

How To Protect Your Data From Attack

Mike Vogel Executive Account Manager. Etmara Smith Manager, Supplier Diversity Small Business Program. Harris IT Services - Herndon, VA

Department of Homeland Security Office of Inspector General

Preventing and Defending Against Cyber Attacks November 2010

Advanced Threat Protection with Dell SecureWorks Security Services

Breaking the Cyber Attack Lifecycle

Managed Security Services for Data

IBM Global Technology Services Preemptive security products and services

KeyLock Solutions Security and Privacy Protection Practices

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

HHSN W 1 QSSI - Quality Software Services, Inc

Cisco Remote Management Services for Financial Services

CIO-SP3 Service areas NIH Chief Information Officers-Solutions & Partners

PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING

El Camino College Homeland Security Spring 2016 Courses

Defending Against Data Beaches: Internal Controls for Cybersecurity

SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT

IBM Internet Security Systems products and services

DISA Testing Services for the Enterprise. Luanne Overstreet

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

CYBER SECURITY FOR LONG TERM EVOLUTION

NetIQ FISMA Compliance & Risk Management Solutions

GEARS Cyber-Security Services

Federal Aviation Administration

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Intelligence Driven Security

Network Security Deployment (NSD)

Developing a Mature Security Operations Center

The Importance of Cybersecurity Monitoring for Utilities

A Cyber Security Integrator s perspective and approach

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

DoD Strategy for Defending Networks, Systems, and Data

Enterprise Computing Solutions

Transcription:

Reliable, Repeatable, Measurable, Affordable

Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you can trust? How do you keep pace with rapidly changing threats, technologies and requirements? How do you choose the best cyber defense? And once in place, how do you know it s working 24/7? helps you define your cyber security needs and provides the solutions to achieve them. As a leading cyber security integrator, we deliver agile, defense-in-depth solutions geared to your mission and enterprise needs. Our full life-cycle capabilities range from assessments and architectures to operational support to innovation. After decades of proven experience with the defense and intelligence communities, we know how to make cyber security work reliably, repeatably, measurably and affordably. Our cyber security solutions have defended the most mission-critical systems, including tactical, cross-domain, large-enterprise and national networks. We use leading edge technology to correlate information on millions of cyber events to identify critical actionable incidents. Currently, the company operates more than 20 security operations centers (SOCs) and 15 critical incident response teams (CIRTs) across government and industry. We also provide proven metrics to measure SOC performance. You know how well your cyber security operations are working and how best to improve them. Proven Life-Cycle Capabilities Enterprise Security Assessments: security surveys certification and accreditation (C&A) compliance audits penetration and vulnerability testing social engineering audits document destruction audits email and web security testing. Defense-in-Depth Architectures: engineering and integration of large-scale solutions governance SOCs continuous monitoring patch management continuity of operations adaptation to changing threats. Secure Networks Wireless and Wired: voice, data, video, email and instant messaging multi-level security environments IP-based unified communications systems. Detection and Identification: intrusion detection and prevention systems continuous network monitoring SOC management and metrics training and documentation realtime network traffic analysis host-based security and controls. Defense and Protection: perimeter defenses access controls security breach containment computer forensics CIRT operations disaster and data recovery insider threat protection vulnerability remediation infrastructure hardening. Innovation: security refresh decision support tools management tools proactive support to handle new threats, technologies and requirements. Our solutions and support protect critical cyber assets for military missions and enterprises worldwide. defends our Nation s critical cyber resources and networks.

Experience Proven on Major Cyber Security Initiatives s cyber security solutions protect large-scale information and network assets for U.S. federal government enterprises, such as the IRS. Defending Military Enterprises Worldwide. is the leading provider of cyber security solutions to the U.S. Air Force and the Air Force Intranet program, which protects USAF data networks through 16 cyber security gateways that form a security boundary to shield 105 bases worldwide. This effort includes the AFNet increment 1 redesign of the USAF s unclassified and classified network management and network defense architecture. Responding to an urgent operational need for Pacific Air Forces (PACAF), we designed and deployed the initial intrusion prevention system and a modernized security information and event management capability within a compressed timeline. We provide complete cyber security support to U.S. Army posts worldwide, including operation and maintenance of Army SOCs serving entire theaters of operation and more than 500 successful C&A assessments. Our cyber security experts evaluate products for technology insertion and furnish penetration testing for state-of-theart combat technologies. Our team integrated cyber security into all phases of the Pentagon Renovation program, a ten-year modernization of Pentagon tenant organizations to a fully secure enterprise IT environment. This included SOC development and advanced capabilities such as secure Voice over Internet Protocol (VoIP). Since 2005, we have helped the Missile Defense Agency ensure the security of its information infrastructure, providing information assurance (IA) services and C&A to meet Department of Defense Information Assurance Certification and Accreditation Process (DIACAP) requirements. Cyber Defense for Homeland Security Enterprises. We operate and sustain U.S. Customs and Border Protection s SOC 24/7, ensuring network and information security for more than 60,000 users. The SOC processes tens of millions of events per month, cutting through the noise to identify and handle about 175 actionable incidents. We built and manage the SOC for U.S. Citizenship and Immigration Services (USCIS), providing ITIL-based security management for 18,000 users at 250 offices throughout the world. Working with the U.S. Coast Guard (USCG) Telecommunication and Information Systems Command, we support the design, security and implementation of all USCG enterprise IT, Windows-based systems. Operating the USCG CIRT, we support an enterprise with gateways that handle 15.3 million emails per month, 43,000 of which have infections or malicious payloads. Supporting the Intelligence Community s (IC) Global Mission. General Dynamics Information Technology meets the demanding requirements of the IC. We are building and operating a modernized enterprise IT infrastructure, which employs an integrated enterprise data center designed to ensure the highest levels of security in a virtualized, cloud computing environment. High-Level Security and Privacy Requirements for Modern Healthcare. Federal health organizations and commercial payers rely on General Dynamics Information Technology for expert services in cyber security, IA, regulatory compliance and applications security management. Our C&A audits ensure compliance with key standards, including HIPAA, FISMA and the HITRUST Common Security Framework. Continuous monitoring and SOC services defend information networks and protect data privacy. Proven analysis and testing services and tools ensure the security of new applications and ehealth initiatives. Our secure data center in Maryland, designed to meet strict health industry requirements, provides managed hosting for applications and data warehousing. Supporting Federal Civilian Employees. develops and manages SOCs throughout federal civilian government. Serving 5,000 sites, these include SOCs for the U.S. Department of the Treasury, Internal Revenue Service and Food Safety Inspection Service. Our cyber security and network operations services support organizations such as the FBI, Federal Energy Regulatory Commission, Veterans Affairs, National Archives and Records Administration, Federal Highway Commission and the International Trade Administration. is the prime contractor for the IRS s Computer Security Incident Response Center, proactively protecting and responding to threats against the IRS s vast financial records and network since 2006. For the Federal Aviation Administration, we support its migration to a modern, secure communications infrastructure, including enterprise SOC support. The General Dynamics SOC. Serving tens of thousands of users, the General Dynamics SOC safeguards our federated enterprise environment, detecting and responding to threats against the company s cyber infrastructure and against company and customer data. Across General Dynamics Information Technology, our COTS-based tools process more than 60 million security events each day. Innovative event correlation reduces these to fewer than 50 actionable incidents. Our SOC also serves as a proving ground for our customers new security technologies and processes. The SOCs and CIRTs we operate process millions of potential security events daily to identify actionable incidents, typically two hundred or less. Knowledge gained on major programs brings best practices to our customers.

Your Best Defense for the Cyber Challenges Ahead is the leading provider of cyber security solutions to the U.S. Air Force, including operation of the Air Force SOC at Maxwell-Gunter AFB. s strengths and innovation protect critical networks that are part of your federal enterprise today and lay the foundation for more resilient cyber defenses in the future. Cyber Security s Front Lines. Our expert workforce features hundreds of IA professionals with sweeping technical skills, in-depth training and industry-recognized certifications. Those serving the defense community typically have current DoD security clearances or higher. We are also one of the first companies to adopt DoD 8570.01 certifications for IA workforce improvement. Innovation Reduces Risk. General Dynamics Information Technology drives innovations you won t find anywhere else. Our Security Management Operations Approach (SOMA) provides a repeatable, prescriptive framework for implementing and managing an enterprise cyber security operations program. Incorporating ideas and best practices from the IT Information Library (ITIL), CMMI for Services and CERT s Incident Management Capability Metric, SOMA helps ensure effective operations, continuing improvement and comprehensive performance measurement. We Fill the Gaps. Our innovative products fill key gaps, providing capabilities that commercial tools may lack. TruDetect: Network Intrusion Detection System (IDS). TruDetecet finds sophisticated threats that signature and behavioral based IDS s miss. Citadel Cyber Targeting and Analysis Tool. Citadel creates models that help senior managers make smart decisions on complex, high priority operational programs. Specialized Tools. We provide proven assessment, C&A and policy automation tools, plus customized tools for network defense and analysis. Security Vulnerability Management Tool (SVMT). Developed for USCIS, SVMT automates the aggregation and filtering of vulnerabilities from 350 field offices, 100 information technology systems and 40 applications. SVMT was a key component in raising the USCIS s FISMA score from a failing grade to an A. Meeting Critical Standards. Through our extensive C&A experience, we help you meet the latest security and IA standards. These include FISMA, DIACAP, NIST, ISO and NIACAP, as well as HIPAA, HITRUST and ISO 27799:2008 standards for healthcare. Our specialists monitor and work closely with government cyber security programs, regulatory agencies and standards organizations. We also help you develop continuous compliance monitoring to support timely, affordable audits, C&A and reporting. Respond Agilely, Defend Globally. Reduce your risk in an uncertain world. With cyber security solutions from General Dynamics Information Technology, you will respond agilely to the threats ahead as you defend your enterprise network around the globe. www.gdit.com The four best reasons to find out more. Reliable, Repeatable, Measurable, Affordable.

is an equal opportunity employer. 2011. All rights reserved. 7/11 Some photography courtesy of: U.S. Air Force, U.S. Army