our solutions

cybersecurity services

overview

What is our cybersecurity services?

Cybersecurity is one of the core service lines within CompNet Federal Solutions, inc (CFSI) and our company’s security service portfolio covers the full landscape of information security needs of our clients. We have the very best information security resources in the business that have supported just about every industry imaginable.

Years experience

0+

Years experience
Certified experts

0

Certified experts
End user satisfaction

0%

End user satisfaction
Global reach

0countries

Global reach
Service desk

024/7

Service desk

Cybersecurity is one of the core service lines within CompNet Federal Solutions, inc (CFSI) and our company’s security service portfolio covers the full landscape of information security needs of our clients. We have the very best information security resources in the business that have supported just about every industry imaginable. We are currently supporting the DOD, DHS, US Mind, the NRC, the IRS and DOS with their incident response, threat hunting, information security, security validation, FEDRAMP compliance, cloud security and vulnerability management objectives. In addition, CFSI  was proudly selected as a prime cybersecurity provider for Navy SPAWAR. We have offerings in all aspects of information security such as penetration testing, enterprise security architecture, security policy development, implementation services and federated identity management; furthermore, we have specialized abilities in security automation, threat hunting and applied threat intelligence and experience implementing the NIST Cybersecurity Framework (CSF) for hybrid and traditionally structured enterprises.

Security Automation Adoption Service

The Need For Speed: Automated malware attacks like WannaCry, NotPetya and as far back as SQL Slammer (2003) spread globally and were executed at a phenomenal rate, nearing machine speed (near light speed). If some attacks have spread across the entire globe in under 10 minutes, how much of our network can be compromised while our Change Control Boards are consulted for approved responses? The answer, “All of it”. CFSI security practitioners are experts at categorizing your own incident response tactics into groups that:
Can be fully automated – repetitive, error prone tasks such as creating and updating trouble tickets, sending notifications, patching and checking patch compliance

  1. Can benefit from human triggered automation – automated courses of action that can be triggered after an operator has picked the appropriate course of action to run – such as immediately quarantining malware, automatically stopping an identified attack or instantly stopping record theft in process
  2. Are not appropriate for automation – but can benefit from automated data enrichment, meaning decision support tools will be automated so decisions can be reached quickly and with confidence
  3. Once the categorization is complete, we design, build, test and implement the new capabilities (complete with training and on demand 24×7 support). We also have services for operating the Automated Courses Of Actions (ACOA) as a service – AaaS. The end result is incredibly faster containment of attacks and malware spread and is more time for your analysts to work security-related tasks rather than administrative tasks.

Applied Threatelligence© (Operationally Applied Threat Intelligence)

Threat Intelligence shines a light in the darkness when it comes to knowing your enemy. But few organizations know how to make a tangible difference in their security with Threat Intelligence. CFSI’s Threatelligent© offerings monitor and consolidate threat feeds to find the adversaries that can hurt you severely. They also apply that information directly to your individual operations and tool sets and give you very specific directions on what to do to protect your organization. These services not only make you more secure but also serve as excellent sources of budget justification. CFSI will tell you  where you should spend your funds and how to cover yourself in areas where you do not yet have sufficient defensive capabilities. These offerings are also one of the inputs to the CFSI Intelligence Driven Threat Hunting service. All CFSI offerings are available as services or as Turn-Key deliverable.

Threatelligent Hunting©: CFSI Intelligence-Driven Threat Hunting (BIT Hunting©)  

The Best Detection Tools Don’t Matter Without Threat Hunting. Would you build a dome around a city as the only measure to keep mosquitoes out? No. Because some mosquitoes are already living inside, and there are other vectors like rivers that allow them in. So even a perfect perimeter detection and prevention capability – if there were one – is not enough (and there is not one). It is imperative to continue looking for what is already there and what has come in using unexpected vectors. CFSI’s Threatelligent© Hunting (BIT Hunting©) integrates into your security operations processes and is fed by your tools and logs, as well as by the Threat Intelligence feeds that are available in your environment. The CFSI Threatelligent Hunting© solution is also equipped to feed directly to your security infrastructure, meaning that as soon as a new vector of attack, malware component or vulnerability is discovered, your defenses will be updated to keep that from happening in the future. BIT Hunting© is available as a service or as a Turn-Key deliverable.

SOC Optimization Service – Detect, Protect and Correct – Global Best practices

CFSI’s SOC Optimization Service is a consulting offering that leverages expertise in the world’s leading models for Security Operations, such as the NIST Cybersecurity Framework, the ISD 35, the CIS 20 and others in order to evaluate your organization for areas of increased effectiveness and reduced costs. We align our recommendations with the cyber kill chain steps and provide a plan that will take your organization from current state to optimal state. We also synchronize the roll-out timeline to your budget and priorities, whether those priorities come from our Threat Intelligence Service recommendations or from your own leadership. If needed, CFSI also offers delivery options that offload the majority of SOC Transformation duties from your staff, allowing them to continue normal duties while our experts set up your new Information Security capabilities and processes. Our staff will train and support your staff in transitioning to the Turn-Key new SOC tools and methods, or they can remain in place as long as needed.

Insider Threat Deterrence Program – Detect protect and Correct cycle

CFSI followed the US Department of Defense’s DOD and Department of Homeland Security DHS recommendation that DETERRENCE needs to be part of a total cybersecurity strategy and developed a first of its kind approach to stopping insider threat issues with a very cost effective, largely automated solution that complies with the most strict privacy laws, including those going into effect May 25, 2018 via the General Data Protection Regulation (GDPR) regulations in Europe.
This program integrates with many specialty commercial tools and open source software packages and can be stood up in as little as 3 months. The nature of this program keeps us from publicly describing it. But for confidential details on how this offering works, please contact the CFSI  Cybersecurity team at 202-304-1501.

Personnel Certifications:

PMP – Project Management Professional

ITIL – Information Technology Infrastructure Library

 

ISC2 Certifications:

CISSP- Certified Information Systems Security Professional

CCFP- Certified Cyber Forensics Professional

CCSP- Certified Cloud Security Professional

 

SANS Certifications:

GIAC-  Global Information Assurance Certification

GCED-  Global Certified Enterprise Defender

GCFA-  Global Certified Forensic Analyst

GPEN-  Global penetration testing certification

GWAPT- Global Web Application Penetration Tester

GCFE-  Global Certified Forensic Examiner

GSNA-  Global Systems and Network Auditor

GPPA-  Global Perimeter Protection Analyst

GAWN-  Global Assessing and Auditing Wireless Networks

GWEB-  Global Web Application Defender

GNFA – Network forensic analyst certification

GREM – Reverse Engineering Malware

GXPN – Exploit Researcher and Advanced Penetration Tester

GIAC – Continuous Monitoring Certification (GMON)

GCIH – Incident Handler Certification

 

Microsoft Certifications

Microsoft Technology Associate ( MTA )

Microsoft Certified Solutions Associate (MCSA)

Microsoft Certified Solutions Expert (MCSE)

Microsoft Certified Solutions Developer (MCSD)

Certified MCITP (Microsoft Certified IT Professional) – Database Administration: 2008

MCSA – Microsoft Certified System Associate in SQL Server 2012

Certified SSRS (SQL Server Reporting Services)

Certified on IIS – Administration

Microsoft SQL Server database

MySQL Database Administrator

 

Cisco Certifications:

CCNA- Cisco Certified Network Associate

CCNP- Cisco Certified Network Professional

CCIE Security- Cisco Certified Internetwork Expert Security

EC Council Certifications:

CEH – Certified Ethical Hacker

CHFI- Computer Hacking Forensics Investigator

ENSA – EC-Council Network Security Administrator (ENSA}

CNDA- Certified Network Defense Architect c

ECSS- EC-COUNCIL CERTIFIED SECURITY SPECIALIST

ECSP- EC-Council Certified Secure Programmer

ECES- EC-Council Certified Encryption Specialist

LPT – EC Council Licensed Penetration Tester

ECSA- EC-Council Certified Security Analyst

ECIH – EC-Council Certified Incident Handler (ECIH)

CERT CSIH – CERT-Certified Computer Security Incident Handler (CSIH)

Offensive Security: OSCP, OSCE, OSWP and OSEE

EnCase: EnCE

Dod 8570: IAT L2, CNDSP Analyst or IR

Carnegie Mellon: SEI, CCSIH

 

Oracle Certification:

Oracle Certified Junior Associate (OCJA)

Oracle Certified Associate (OCA)

Oracle Certified Professional (OCP)

Oracle Certified Master (OCM)

Oracle Certified Expert (OCE)

Oracle Certified Specialist (OCS).

Oracle Database 12c Administrator

Oracle SQL and PL/SQL

Oracle MySQL Database Administration

Oracle Data Warehousing

 

CompTIA Certification:

CompTIA Security +, Network+, Server +, A+, Network+, Server +, Lenix+

CSCIP/G – Certified Smart Card Industry Professional

CSEIP – Certified Smart Card Engineer ICAM Professional

PSP – Physical Security Professional

Solutions

Comprehensive IT services include

  • router-1807_67aa302b-3a94-46a7-aa3d-66b8928a87d7

    Network

    Cloud services are network dependent, which is why CFSI network management and monitoring services have become critical to IT.

  • telephone-operator-4682_c9489618-836b-47ec-8489-e15f613cb10c

    Service desk

    CFSI 24/7 support is about maximising service efficiency, resolving problems and driving continuous service improvement.

  • computer-network-1878_39828809-88f9-48e1-9a76-61c99401ec99

    Infrastructure

    CFSI ensures your IT infrastructure is always optimised to support the stable and highly available services organisations demand.

  • settings-server-1872_2e41baf2-8789-4215-b430-db35c3899936

    Endpoint management

    Client and server endpoints are managed as one estate, ensuring security and stability while maximising uptime and employee productivity.

  • source-code-1754_2b435bd8-ce76-4910-8137-7d07a3557fa3

    Applications

    CFSI supports Software as well as on-premise deployments, ensuring applications are always optimised for the best possible user experience.

  • add-image-5030_dcf585b8-8f3d-48ad-8579-a4ad56d14ba6

    Managed services plus

    CFSI provides advanced management tools to clients who want to take their IT Service Management to a higher level.

Benefits

Our services provide a unique range of benefits

  • Control IT Costs

    You can scale your IT Costs according to your requirements and only pay for what you need. Whether that be increasing or decreasing staff, or IT project work.

  • Trusted IT advisor

    Through regular account management meetings your Managed IT service company will be able to oversee your overall IT roadmap and become your trusted advisor.

  • Economy of scale

    As your business grows, its support structure needs to grow, too. When you use a managed IT service you can scale your business up or down with nothing more than a simple discussion.

  • Increased efficiency

    You’ll have your IT needs outsourced to a team of IT experts, and during times where you need additional project support, your managed IT provider supplies the extra staff.

  • Small initial investment

    Managed IT services help you offset the initial investment of technology costs. Rather than spending thousands of dollars on hardware and software upfront.

Stop wasting time and money on technology. Let’s get started

Compnet Federal Solutios are always accommodating our diverse needs and we feel like they are a part of our company rather than an external supplier.
John H. Bedard, Jr