SecureStrux Awarded Contract with Gryphon Technologies

Posted on April 21, 2018 by

SecureStrux LLC is pleased to announce an awarded contract with Gryphon Technologies (Gryphon) to provide Vulnerability Scanning Assured Compliance Assessment Solution (ACAS) Services for their Navy Platform IT (PIT) enclave. SecureStrux provides Vulnerability Scanning, configuration, and engineering assessment services to a wide range of clients so they can meet DoD, Federal, and commercial requirements. SecureStrux typically performs similar assessment and assistance projects using USCYBERCOM TASKORD 17-0019, DISA’s Best Practice Guides (BPGs), and industry best practices when providing scanning and remediation services. 

 

AdobeStock_237519989

 

Gryphon Technologies LC—which is headquartered in Washington, D.C.—is a premier professional and engineering services provider specializing in warfare systems and integration, naval architecture, marine engineering, program management, testing and evaluation, and logistics. For almost 20 years, the Company has designed, integrated, maintained, and upgraded state-of-the-art systems for the Department of Defense. Gryphon has consistently been ranked as one of America’s Fastest Growing Private Companies by Inc. Magazine.

SecureStrux supports a growing number of clients across the United States to meet Command Cyber Readiness Inspections (CCRI), Risk Management Framework (RMF), and Controlled Unclassified Information (CUI) compliance. Contact us today to learn more about how SecureStrux can help your organization engineer your environment and systems to comply with the various DoD and Federal cybersecurity compliance processes.

About SecureStrux

SecureStrux, LLC is a Women-Owned Small Business (WOSB) Cybersecurity Firm that provides specialized services in the areas of compliance, vulnerability management, cybersecurity strategies, and engineering solutions. We offer a comprehensive range of services that provide clients with proven methods and common-sense approaches to secure their data, build trust with their clients, and remain compliant with DoD, Federal, and Commercial cyber governance.