Engineering & Architecture

CYBER & COMPLIANCE SERVICES

Today’s threat landscape is fast-moving and ever-changing, so DIBNet organizations and DoD agencies that successfully adapt, begin with security and compliance by design.

Our team helps you architect and engineer your systems or enclave security to be as secure, compliant, and reliable as possible.

Our cybersecurity and compliance solutions are designed to help you run your cyber program more efficiently, protect mission-critical assets, and maximize your ROI. From aligning youcybersecurity and compliance strategy, through ongoing monitoring and continuous improvement, our subject matter experts empower you to optimize your cyber posture.

SYSTEM AND NETWORK BUILD-OUTS

DoD Agency & Defense Contractor System and Network Build-Outs

When building a network or system to DCSA or DoD RMF specifications or to meet the upcoming CMMC requirements, SecureStrux™ always starts with the end in mind, baking security into the process from the start. We can securely build and maintain the SIPRNet, NIPRNet, enclaves that your organization requires. Take your system or network through the RMF process, or we can engineer your entire corporate network for CMMC compliance.

VULNERABILITY ASSESSMENTS

Internal & External Network Vulnerability Assessments

To help your organization identify, address, and mitigate potential vulnerabilities, we provide vulnerability scans and assessments. The scans will give you peace of mind knowing your operations are protected. We offer a host of different reviews and assessments including ACASTenable, HBSS, and Vulnerability Assessments.

ACAS, TENABLE, HBSS, ETC

Vulnerability Management Engineering

Increase visibility into critical security issues by implementing the Tenable/Nessus Suite to automate network discovery and use associated products to deliver comprehensive network and application vulnerability scanning and configuration assessment.

Endpoint Security

Endpoint Security contains products designed to meet known intrusion points, discover gaps, and reduce the likelihood of unauthorized device and network access. Leading point products including Host Intrusion Prevention System, Asset Publishing Service, Asset Configuration Compliance Module, Device Control Module/Data Loss Prevention, Policy Auditor, Rogue System Detection, Endpoint Security (ENS), Threat Intelligence Exchange TIE/Data Exchange Layer (DXL), and McAfee Application Control (MAC).

Vulnerability Scanning

Increase visibility into critical security issues by implementing the Tenable Suite to automate network discovery and use associated products to deliver comprehensive network and application vulnerability scanning and configuration assessment.

ACAS, TENABLE, HBSS, ETC

Network, LAN, & Physical Penetration Testing

Understand your vulnerabilities and learn how to eliminate them with a penetration test.

SecureStrux™ penetration testing professional services have conveniently packaged a sequence of periodic (and scheduled) pen tests into an annual automated penetration testing subscription.

Take the next step on your Network or System

Bring in the experts to help you solve the pressing engineering and architectural challenges for the network, system, or enclave you are building out.

SYSTEM & APPLICATION

System & Application Hardening & STIG Application

The United States Defense Information Systems Agency (DISA) has a library of security guidelines for the Department of Defense (DoD) Information Systems. These guidelines are called Security Technical Implementation Guides (STIGs), which identify configuration settings and procedures that organizations should apply to improve the security of their networks and systems. 

Our seasoned SecureStrux™ Team is ready to serve you. We have over 20 years of experience securing and hardening enclaves, networks, and systems for the DoD and other organizations that need to meet DISA requirements.

NETWORK PORT SECURITY SOLUTION

NIPRNet and SIPRNet Multi-Factor Authentication

SecureStrux™ implements the required DoD Public Key Infrastructure (PKI) environment, sets up their required systems, and handles the third-party applications required for authentication. We work closely with DISA and the Cyber Exchange to get all the required application certificates, Common Access Card (CACs), and tokens. Whether you need PKI for an application, a web service, on-premise, or in the cloud, SecureStrux™ can help your organization configure your applications, systems, and network appliances to meet DoD compliance.

CYBER-AUTOMATION

Cyber-Automation, Insider Threat & Data Transfer Auditor

PowerStrux™ – Standalone System Auditor

PowerStrux™ Auditor leverages Microsoft’s built-in programming language to access, parse, and report on events of interest. The use of this script will mitigate the effort for the staff members that are responsible while assisting in the auditing with ease and efficiency.

The PowerStrux™ standalone auditor produces a report containing the following:

  1. User logon and logoff dates and times
  2. Data transfers and print jobs
  3. Failed logon attempts
  4. Account management events
  5. User status and inactivity
  6. Administrator, Backup Operator, Auditors, and Power User group membership
  7. Event Log actions, to include clearing the Event Log
  8. Windows Defender signature update and scan dates and times
  9. Privileged use events
  10. System service status
  11. System port information

DataStrux – Data Transfer Auditor

Our DataStrux data transfer auditor tool monitors users in real-time when they copy data from machines to removable media (flash and CD-ROM drives).

Our Certifications Include

Take the next step on your Network or System

Bring in the experts to help you solve the pressing engineering and architectural challenges for the network, system, or enclave you are building out.