Cyber Security
The government has access to a multitude of cyber ranges such as the DoD National Cyber Range Complex (NCRC). To maximize the benefit of using these cyber ranges, we offer optimized services to plan, execute, monitor, and report on various types of cyber range events, including:
We have codified how we maximize the use of cyber ranges in the methodology.
PRACTICEc-r
Key features of our cyber-range execution service include:
Analytics are playing an increasingly greater role in cyber defensive functions. As part of our Analytics Development capability, we provide the following expertise in the cyber-domain:
IT Asset Management (ITAM) focusses on the identification of IT devices such as hardware devices, software, and software licenses, and ensuring that their configurations are compliant and authorized. ITAM is related to Configuration Management and Change Management disciplines. ITAM has been recently associated with IT Managed Services (e.g., Desktop-as-a-Service), and with ITSM/ITIL more generally.
Recently, there are three trends which are shifting the focus of ITAM’s
We provide expertise in the entire ITAM lifecycle.
Supply chain (SC) security (or supply chain risk management [SCRM]) is the part of supply chain management that focuses on the risk management of elements of the supply chain, across the various participants such as manufacturers, developers, integrators, suppliers, vendors, logisticians, and shippers. Operations (and related functions) is typically considered outside the scope of the supply chain.
Supply chain security involves both 1) physical security relating to products, and 2) cybersecurity for hardware, firmware, software, data, and services.
We provide expertise securing the entire supply chain.