Cyber Security and Information Operations and Information Assurance (IO/IA) are matters we take very seriously indeed. And so do our customers, from government to both listed and private companies. That’s why they trust us to deliver the end-to-end offensive and defensive solutions that successfully protect them from a wide range of internal and external threats including breach, fraud, theft and sabotage.
What’s involved
- Vulnerability and Security Assessments
Physical and Information Security Assessments, Software Vulnerability Testing, Penetration Testing Certification and Accreditation, and Compliance and Security Audits
- Enterprise Information Assurance (IA) Solutions and Services
Cross-Domain Information Sharing, Perimeter Defense, Public Key Infrastructure (PKI), Security Architectural Engineering and Systems Integration, and IA Training
- Monitoring and Traffic Analysis
Secure Voice/Video/Data Communications, Endpoint and Network Monitoring, Information Protection, Insider Threat Protection, and Real-Time Network Traffic Intelligence
- Information Services
Cryptographic Solutions, Vulnerability Exploitation, Computer Network Defense (CND), Computer Network Operations (CNO), and Open Source Exploitation
- Information Operations (IO)
Dynamic Defense, Reverse Engineering, IO Tools and Exploits, Tradecraft, Forensics and Incident Response