SEMAIS consultants are well skilled at implementing various security products and services for organizations. Our Cyber Security Engineering (CsE) process focuses on the security aspects in the design of a systems to reduce exploits and threats. We can design and test security technologies for Computer Network Defense (CND), Audits, Security Assessments, Software Assurance, or Vulnerability Management tasks.

 

Host Based Security System (HBSS)

The Host Based Security System (HBSS) is the official name given to the United States Department of Defense (DOD) commercial-off-the-shelf (COTS) suite of software applications used within the DOD to monitor, detect, and defend the DOD computer networks and systems HBSS is deployed on both the Non-Classified Internet Protocol Routed Network (NIPRNet) and Secret Internet Protocol Routed Network (SIPRNet) networks, with priority given to installing it on the NIPRNet. HBSS is based on McAfee, Inc's ePolicy Orchestrator (ePO) and other McAfee point product security applications such as Host Intrusion Prevention System (HIPS).

 

Assured Compliance Assessment Solution (ACAS)

The Assured Compliance Assessment Solution (ACAS) is an integrated software solution that is scalable to an unlimited number of locations. The solution's tiering ability that provides the Department of Defense (DOD) enhanced enterprise security while being simple to install and manage. It can be deployed without difficulty via download to all DOD agencies - without the need to procure and install appliance devices. The tool performs automated network vulnerability scanning, configuration assessment, application vulnerability scanning, device configuration assessment, and network discovery.

 

End Point Security

In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.

 

Software Assurance (SwA)

Software assurance (SwA) is defined as "the level of confidence that software is free from vulnerabilities, either intentionally designed into the software or accidentally inserted at any time during its lifecycle, and that the software functions in the intended manner.  SEMAIS process for SwA ensures that the processes, procedures, and products used to produce and sustain the software conform to all requirements and standards specified to govern those processes, procedures, and products. We perform dynamic and static code analysis using tools such as HP Fortify and Web Inspect to discover coding errors based on OWASP standards.

 

© 2017 Secure Manged Instruction Systems, LLC 3350 Riverwood Pkwy  Ste 1900 |  Atlanta, Georgia 30339  | Email: semais@semais.net