Cybersecurity

Cybersecurity

About Cybersecurity

In today’s world, cyber threats are ever-present, evolving, and advancing. A proactive approach to cyber resilience is crucial to the protection of secure systems and information.

For over 25 years, Atlas Tech cybersecurity professionals have been providing invaluable communication and information assurance solutions to our military. From engineering to integration to sustainment, Atlas Tech ensures that expanding digital environments are built and supported with the latest and most innovative cybersecurity standards to protect from external -- and internal -- threats.

Atlas cybersecurity controls span and align administrative, physical, and technical levels. We work within the rigor of our Quality Management System and our proprietary operational framework to ensure our customers, including the Department of Defense (DoD) and Department of Homeland Security (DHS), have threat-centric, safe operating environments.

Administrative Controls

Administrative Controls include policies, personnel actions and controls, security awareness training, and testing.

Physical Controls

Physical Controls include network segregation, perimeter security, computer controls, work area separation, data back-ups, and cabling.

Technical Controls

Technical Controls include system access, network architecture, network access, encryption and protocols, and auditing.

Information Assurance Solutions

Our specialized Team Members are accredited in Information Assurance techniques to meet or exceed DoD Directive 8570 (DoDD 8570). Atlas’ cybersecurity portfolio sampling:

Solutions

  • Security Vulnerability Patching Research, Development, Release, Implementation
  • Installation, Validation, and Testing Services
  • Assist Creation and Resolution of Authority to Operate Packages (ATO)
  • HBSS Policy Development and Implementation
  • STIG Compliance
  • Cross Domain Solutions
  • Core Impact Certified Professional (CICP)
  • TACLANE/FASTLANE Crypto Training & Support
  • SafeNet Hardware Security Modules (HSMs)
  • Vulnerability Scanning ACAS/Teneable, SCCVI, eEye-Retina

Programs

  • CANES – Consolidated Afloat Networks and Enterprise Services
  • CND – Computer Network Defense
  • SCI Networks
  • ADNS – Automated Digital Network System
  • COMPOSE - Common PC Operating System Environment
Credentials

Credentials

  • IAT/IAM Certifications
    • Certified Information Systems Security Professional (CISSP)
    • Certified Advanced Security Practitioner (CASP+)
    • Certified Network Defense Architect (CNDA)
    • Certified in Risk and Information Systems Control (CRISC)
    • GIAC Certified Incident Handler (GCIH)
    • GIAC Assessing and Auditing Wireless Networks (GAWN)
    • CompTIA Security+
    • CompTIA Network+
  • IASAE Certifications
    • Information Systems Security Engineering Professional (CISSP-ISSEP)
    • Certified Advanced Security Practitioner (CASP+)
  • CSSP Certifications
    • Certified Ethical Hacker (CEH)
    • GIAC Penetration Tester (GPEN)
See All Credentials

Areas of Expertise

Information Assurance

Information Assurance

Security Engineering

Security Engineering

Identity, Credential, and Access Management (ICAM)

Identity, Credential, and Access Management (ICAM)

Public Key Infrastructure (PKI)

Public Key Infrastructure (PKI)

Role-Based Access Control (RBAC)

Role-Based Access Control (RBAC)

Security Assessment and Certification

Security Assessment and Certification

Why Us

Atlas Tech’s Team Members focus on intrusion detection and pre-emptive identification and correction of vulnerabilities, ensuring that all access points are well secured. It is this intimate and constantly deepening understanding of the threat environment that makes Atlas a trusted provider of information security to the Naval Information Warfare Systems Command (NAVWAR) and other military departments and government agencies .

Knowing that security extends beyond systems, Atlas Tech’s Team Members are further able to counter threats by working with all personnel, including those of the fleets supporting the warfighters, have Information Assurance Technical (IAT) Level II or appropriate certification to provide Network Environment (NE) and advanced level Computing Environment (CE) support.

MORE ABOUT US