image
image


Information Assurance
 

Back to Information Technology

 
Change / Configuration / Life Cycle Management
Communication and Electronics
Enterprise Level Support
Geographical Information Systems (GIS)
Information Assurance (IA) / NIST Risk Management Framework
Integration Lab
Network Management
Oracle
SAN / NAS
Video Teleconferencing
 


Over the last several years, Information Assurance (IA) has become a major concern within both the commercial and government sectors.  IA is defined as those measures utilized to protect information systems from intrusion such as computer hackers and the various forms of cyber attack to ensure their availability, integrity, authentication, confidentiality and non-repudiation is preserved.  As part of its efforts to safeguard the information it maintains, the U.S. Government passed the Federal Information Security Management Act (FISMA) in 2002.  FISMA is now the standard that is used by all Chief Information Officers (CIO) to develop their cyber security plans.

Services: Glacier Technologies provides IA services to various civilian and Department of Defense (DoD) agencies in order to sustain the security and availability of their information environments.  As part of this service, Glacier’s IA practitioners develop policies and procedures, assess security controls and devise risk management plans.  Our engineers ensure adequate controls are in place to maintain information system availability in the event of a disaster. We develop Continuity of Operations (COOP) plans to assist in detecting and monitoring intrusion activities and to provide certified technical support for IA and security systems. 

Glacier Technologies also assists various DoD agencies to meet the provisions of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) that are required for all DoD servers and IT networks.  The company is currently performing this accreditation service for the U.S. Army as well as providing IA technical and evaluation support for several of its military installations.  As part of this service, our technicians work with the customer to harden their database and information storage structure in order to protect it against deliberate and accidental information tampering.  In addition, our engineers install and support a variety of infrastructure security devices and applications.  It should be noted that Glacier employees possess a number of highly regarded certifications, to include CISSP and CISA

Finally, our experts assists our government clients with implementing a risk management framework that transforms the certification and accreditation (C&A) process into a methodology that enables them to manage their information systems effectively as well as assess risk in a near real-time manner.  This involves Glacier personnel assisting our federal clients with categorizing their information systems, selecting applicable security controls, developing security plans with supporting documentation and assessing security controls while providing continuous monitoring.       

Experience: We continuously maintain broad experience in designing IA support programs to assist various commercial and government agencies to comply with both NIST and IAW requirements.  Additionally, we provide our clients with on-going support to address such issues as intrusion detection and analysis, and outside audit assistance.  We provide vulnerability risk assessment and management support for standard and highly distributed networks including incident assessment, analysis, reporting and data center evaluation for FISMA compliance.  Based on the results of the assessment, our team of experts will make recommendations for implementing changes and improvements to the existing security processes.  Currently, the company is providing one of its government customers with IT security services that include managing the agency’s security operations center and ensuring compliance with FISMA, OMB Circular A-123 and GAO FISCAM requirements.  In addition, Glacier is supporting the client’s security authorization activities in accordance with the Risk Management Framework methodology.


Contact us | View site map


image



 
image