Cyber Security

Cyber Security
Offense, Defense, Special Teams: Hardened. Secure. Trusted.

For more than a decade, Independent Software has worked behind the scenes delivering cybersecurity services to protect our nation’s most sensitive information and critical infrastructure. As a strategically minded and versatile company, we are constantly adapting to our clients’ needs by grooming engineers and computer scientists with practical skills in Intrusion Detection, Cross Domain Solutions, Ethical Hacking, and all flavors of computer software designed to solve our customer’s challenging cyber missions.

Cyber Defense / Computer Network Operations (CNO)
We support mission operations while ensuring customer networks are defended from today’s cyber threats, by:

  • Secure Mobile/Wireless Technologies
  • Data Exploitation
  • Reverse Engineering
  • Software & Systems (re)engineering

Cross-Domain Solutions
We provide support to government agencies in support of multi-domain requirements and initiatives by:

  • Designing, implementing, testing, and providing sustainment support of leading cross-domain technologies
  • Offering our subject matter expertise in technologies that include SafeNet MDeXs, Owl Diodes, MLGs, and AFTs
  • Developing and deploying hardened OS loads including Trusted Solaris and Linux

Penetration Testing & Vulnerability Assessments
Assessing current security posture and making recommendations for system and process improvements by:

  • Offering vulnerability scanning and penetration testing, both in conjunction with C&A efforts as well as stand-alone activities that include a report identifying vulnerabilities found, the risk they pose, and suggested mitigations. This testing can take a number of forms, including zero knowledge testing of the network perimeter and more detailed testing of specific roles in applications using credentials.

Privacy/Data/Content Protection
Beyond making certain the appropriate infrastructure is in place, organizations also need to be concerned with the data itself. Specifically, questions have to be answered concerning who is authorized to access certain types of data, how it is used, where it is stored and for how long, and how it is disclosed to others. Recent government and private-sector efforts have focused on preventing accidental and intentional disclosure of sensitive information by implementing targeting policies and procedures, deploying technologies that track the flow of sensitive data, and implementing mechanisms to block its disclosure.

  • We can help organizations address these issues through reviewing and drafting privacy, records management, data retention, and disclosure monitoring policies, implementing workflow and business process changes to improve decision making around the handling of sensitive information, and supporting ongoing privacy operations. These services can help organizations address laws, regulations, and standards such as OMB 06-16/07-16, Privacy Act of 1974, state breach notification laws, PCI Standard, HIPAA, NIST guidance, and other requirements.

Identity Management/PKI
Beyond making certain the appropriate infrastructure is in place, organizations also need to be concerned with the data itself. Specifically, questions have to be answered concerning who is authorized to access certain types of data, how it is used, where it is stored and for how long, and how it is disclosed to others. Recent government and private-sector efforts have focused on preventing accidental and intentional disclosure of sensitive information by implementing targeting policies and procedures, deploying technologies that track the flow of sensitive data, and implementing mechanisms to block its disclosure.

  • We have been heavily involved in a variety of initiatives to help ensure that organizations properly vet users, issue appropriate credentials, manage user accounts and groups, alert administrators of anomalies in the use of credentials, and properly terminate accounts. Independent Software can assist customers in planning, designing, implementing, and operating identity management systems for both physical and logical access. We can integrate a variety of platforms including Biometric, Two-Factor, Radius, Active Directory, and native Lightweight Directory Access Protocol (LDAP) to tie together disparate authentication schemes based on proprietary and open standards.

Contact Us