- Sold by Telos Corporation
Obfuscation and encryption in a secure, cloud-based, non-attribution network.
Telos Corporation empowers and protects the world's most security-conscious enterprises with solutions and services for continuous security assurance of individuals, systems, and information. Telos offerings include cyber security solutions and services for IT risk management and information security; secure mobility to protect globally connected enterprises; and identity management to establish trust in personnel and continuously monitor for insider threats. The company serves military, intelligence and civilian agencies of the federal government, allied nations, and commercial organizations around the world. For more information, visit www.telos.com.
Obfuscation and encryption in a secure, cloud-based, non-attribution network.
Xacta 360 is the premier SaaS solution for IT risk and compliance management, bringing key insights to security specialists, CISOs, and other IT decision makers. This cloud-based version of the proven Xacta solution streamlines cloud adoption and simplifies compliance for AWS-based workloads.
Instructor led product overview training for the Xacta 360 and Xacta.io applications.
Experienced Xacta software and security engineers provide up to one-week of Xacta software application installation, initial configuration, risk and compliance process analysis
Identifies gaps between the organization's environment and the 17 required controls from FAR.52.204-21. CMMC Level 1 is the foundational level.
Identifies any gaps between the organization's environment and the 110 required controls from NIST 800-171 and a subset of NIST 800-172 controls. CMMC Level 3 is for organizations that work with controlled unclassified information on critical systems.
Identifies gaps between the organization's environment and the 110 required controls from NIST 800-171. Level 2 is for organizations that handle CUI data.
Preliminary security assessment of IaaS, PaaS or SaaS with identified security failings. Compliance discussed with the customer for a base control review to include review of current controls, known deficiencies, implementation of controls, suggested controls and configurations.
Assessment of proposed cloud architecture. Provide advisory on cloud design, migration approach and security implementation, focusing on areas of optimization, cloud best-practices, cost savings and third party offerings.
Initial assessment of on-premises architecture, current applications and evaluation of each component for lift and shift, refactoring, or re-engineering.
showing 1 - 10