Manassas, VA 20110 +1 (703) 278-2546 info@ir-tech.com

Specializing

Logistics IT Solutions

Certified

ISO 9001:2015

Cybersecurity

Cybersecurity (CY) demands are very fluid in the operational environment. New vulnerabilities and exploits are discovered and propagated daily. Customer directives prompt immediate changes to processes, production systems and documentation. We believe that the key to rapid response in dynamic operating environments is maintaining security management process discipline.

Our team has extensive CY experience to include Security Engineering, Deployment Support, Certification and Accreditation (C&A)/Authorization and Accreditation (A&A) for DoD, Vulnerability Management, Incident Response and Security Monitoring. We couple industry best-practices and internal procedures developed through accumulated lessons learned to form mature and responsive CY support.

In the DoD, we have demonstrated this by successfully accrediting and reaccrediting multiple systems with different architectures and configuration baselines concurrently in support of various programs. We use our expert security and systems knowledge, stakeholder communication, and impact analyses to rank and execute tasks. We review and revise priorities during scheduled or unscheduled meetings.

Cybersecurity Highlights

  • IT Security Testing – evaluating a computer systems’ security implementation through verification and validation
  • Risk Assessment – performing both qualitative and quantitative risk estimates against a particular threat
  • Technical Security Services – providing IT security during the life cycle of a system or network from initiation decommissioning
  • Threat Response – capability to effectively identify and respond efficiently to intrusion attempts
  • Anti-virus/Malware – capability to effectively identify and respond efficiently to intrusion attempts
  • Disaster Recovery – providing protection plans, policies, and procedures that minimize the negative effects of a disaster whether natural or man-made to resume critical business operations and business continuity
  • Network Security – provide protection of infrastructure components via firewalls, network intrusion detection systems, port security, etc.
  • Application Security – provide protection of software assets from external malicious actors
 
logistics

Related

ship

Multi-Level Secure Messaging Capability Added to SituX LogC2 platform

IR Tech recently demonstrated its ability to further adapt the SituX LogC2 platform to support operations in conflicted and austere environments. Military logistics data has...
convoy

MLS2

Project Needs: MAGTF Logistics Support Systems consists of the Common Logistics Command and Control System (CLC2S) and the Transportation Capacity Planning Tool (TCPT). These are...

Our Brochure

View our brochure for an easy to read guide on all of the services offered by us.

Download the PDF

Call +1 (703) 278-2546 or email us today!