1738 Elton Road Suite 316-A Silver Spring, Maryland 20903240-770-2097contact@secsofttech.com9am - 5pm

Key Features

The SST’s MSSP program provides comprehensive data protection, highly efficient disaster recovery, backup and restore, and innovative security awareness services/training

DATA PROTECTION

PHASE 1 – GAP ANALYSIS ASSESSMENT

SST conducts an initial risk assessment of your organization. A report of findings and recommendations is generated at the conclusion of the assessment. The findings indicate your current security profile; that is how your organizational goals and requirements align with your risk tolerance and resources. The end result of the initial assessment is providing a roadmap that ensures your assets are adequately managed to withstand current threats for your organization.

 

PHASE 2 – LAYERS OF SECURITY BUILD UP OR ASSURANCE

In this Phase, SST works with your organization to implement tailored layers of security that results in your target security profile.

 

VULNERABILITY MANAGEMENT

ASSET VULNERABILITY MONITORING – PATCH MANAGEMENT RECOMMENDATIONS – ASSET SCANNING **

SST works with your organization to create a vulnerability management program or fill gaps in your organizations vulnerability management program.

 

IA CONTROLS SELECTION & IMPLEMENTATION

An organization’s security posture level is determined by the strength and level of IA controls implementation program. According to best practices there are four security postures that determine the maturity of IA control implementation program.  They are: Security posture level 1 (Ad hoc security-results in weak controls), Security posture level 2 (Risk Informed – results in basic and adequate controls), Security posture level 3 (Repeatable Practices – results in refined controls), and Security posture level 4 (Adaptive Status – results in robust and resilient controls)

This service includes policy writing documentation such as organization/system security plan, incident response plan, etc

Menu