Cyber Security Capabilities

The Columbia Group’s Cyber Division has a team of certified security professionals available to help your organization identify and manage cyber security risk, support information assurance and accreditation efforts, evaluate security policies, and design, implement and monitor your network for both in-house and cloud based infrastructures.

Areas of cyber-expertise include:

  • CISSP and SSCP Certified personnel
  • Information Assurance
  • Network Architecture Design Implementation
  • Network Monitoring / Intrusion Detection
  • Network Capacity Management
  • Cyber Operations / Security Policy
  • Vulnerability Scan and Remediation
  • System Administration
  • Configuration Management
  • Risk Assessments / Risk Audits

    We perform risk audits / assessments based on penetration testing, vulnerability scanning, and social engineering to identify and quantify the risk exposure for your organization. We recommend mitigation steps and assist with implementation of security controls to reduce exposure to identified risks. We use the latest tools to provide real time monitoring and protection for your networks and applications.

    Information Assurance / Accreditation Support

    TCG helps you navigate the Information Assurance Certification and Accreditation Process. We utilize DISA Security Technical Implementation Guides (STIG) checklists to review your system or network security controls, and develop and maintain security documentation needed for your organization to assess and accept the risks. We have experience obtaining Authority to Operate using DIACAP, DITSCAP and RMF frameworks. We help you create and maintain your Plan of Actions and Milestones, Incident Response, Business continuity and Disaster Recovery Plans.

    Systems / Frameworks experience:

  • eMASS
  • RMF
  • FISMA Reporting
  • Cyber Operations / Network monitoring / Intrusion Detection

    TCG designs networks to optimize performance without sacrificing security, by recommending VPNs, Firewalls, intrusion detection and intrusion prevention systems that include real time Security Information and Event Management systems (SEIMs) that monitor your network and systems in real time to identify and prevent or respond to threats.

    Virtualization / CLOUD Security

    Virtualization and migration to cloud service providers can reduce costs and allow you to respond rapidly to changing requirements. TCG understands the benefits of virtualization and evaluates if CLOUD hosting might be right for you. We help you navigate the maze of FEDRAMP offerings and automate your cloud deployments.

    For more information eMail Us