page header

Leading the Way

Our Experienced Team
Will Get You There

Information Assurance

Vigilant's Information Systems and Security Services offerings encompass a full range of information assurance capabilities, including:

  • Certification and Accreditation services
  • Network Vulnerability Assessments
  • Intrusion Detection
  • Incident Response
  • and Compliance Testing services.

These services are currently provided in multiple environments, including mainframe, distributed computing and wireless platforms.

Our staff consists of highly qualified and certified IA professionals, and our capabilities include:

Certification and Accreditation (C&A)

Provides comprehensive evaluation of technical and non-technical security features of an information system, and other safeguards made in support of the accreditation process. This evaluation establishes the extent to which a particular design and implementation meets a set of specified security requirements. Vigilant is experienced in providing contingency plans, risk assessments, System Security Authorization Agreements, statements of residual risk, and monthly progress reports utilizing NIACAP and DITSCAP requirements and procedures necessary to receive a formal accreditation declaration by the Designated Approving Authority. Vigilant is currently providing C&A services to the FBI, in support of their Information assurance Section in the mainframe, distributed computing, and wireless environments.

Information Assurance Consulting

Provides services to protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and nonrepudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities. In addition to our support of the FBI, our information assurance support to the District of Columbia Government encompassed vulnerability assessments, threat definition, vulnerability determination, risk analysis, countermeasure recommendations and residual risk assessment.

Network Security Consulting

Provides expertise in network security and information systems exploitation, consisting of: reviewing security configurations and suggesting alternatives, reviewing technical proposals, making presentations, and assisting the organization on security issues from strategic and tactical views. Provide insights into deterring technical and non-technical exploitation of vulnerabilities in the current and future information age that may prevent or hamper an organization in carrying out its mission.

Network and Application Security Assessment

Provides evaluation of the connections to other systems and/or networks to ensure that network and overall system security policies are properly enforced. Vigilant evaluates the intended connections to other systems and networks to ensure the system design will enforce specific network security policies and protect the IS from adverse confidentiality, integrity, availability, and accountability impacts. Our support of the Navy Marine Corps Intranet (NMCI) program incorporates application security assessments through our duties in setup operations, and maintenance of the Legacy Application Development Readiness Activity (LADRA) labs at multiple locations, nationwide.

Network Vulnerability Evaluation

Vigilant employs automated tools and expertise to evaluate internal network for security vulnerabilities, known software flaws, configuration flaws, and unnecessary services and connections. Vigilant identifies security weaknesses of other networked connections, hosts and devices, and provides recommendations to improve information assurance. Vigilant performs a vulnerability analysis to identify specific risks that an organization faces from both outside and inside threats. Our vulnerability assessment incorporates evaluation of the system architecture, system design, network interfaces, product integration, and configuration management practices to determine system susceptibility to exploitation by any related threat.