Telos offers security assessment and compliance services to uncover any vulnerabilities your systems and applications may have and offer recommendations for mitigating them.
The CUI deadline is December 31: are you ready? If you handle controlled unclassified information (CUI) of the federal government, you need to care for it by implementing NIST SP 800-171. Learn how Telos can help you.
Discovering, correcting and preventing existing security problems on an ongoing basis.
Telos cyber security consultants use their expertise in security assessment, compliance, and authorization to analyze threats to cloud and on-premise systems based on their likelihood of occurrence. By combining known threats, architectural design, and the probability of occurrence with mitigation and risk transference strategies, we’re able to provide a clear representation of an organization’s risk posture.
We can do an initial risk assessment and provide services and solutions for continuous risk assessments. We have performed assessments of complex multi-level secure systems, small, dedicated systems, cloud-based services, and e-commerce systems. Our consultants have assisted the FBI and the Army with insider incident investigations and with other security incidents.
Evaluating your network architecture and security policies for weaknesses.
Our cyber security consultants leverage their background in networking, systems deployment and support, architecture, and an extensive library of compliance and security test scripts to evaluate and test the security of your network. Using our experience, commercial and open source tools, and <penetration-testing techniques>, we can evaluate the security of your system from multiple points of view to ensure that defense-in-depth security strategy is working properly.
Evaluations can be performed from multiple locations within and outside your network to thoroughly understand and explain the threats from each attack point to ensure the best return on investment for security and functionality.
Examining your security posture to discover and remediate vulnerabilities.
The purpose of a vulnerability assessment is to evaluate your current IT environment known vulnerabilities, review your current security posture in the context of those vulnerabilities, and provide recommendations for correcting them. Evaluations performed from multiple locations within and outside your network help you understand the threats from each attack point for a thorough assessment of your IT environment.
Our consultants have led large-scale vulnerability assessments and network redesigns; researched, evaluated, and discovered vulnerabilities; and developed technical solutions to resolve them. We can also use our Xacta® IA Manager software to help accelerate vulnerability management and remediation business functions within and across an entire enterprise.
Confirming that your IT environment complies with industry and government standards.
Organizations that need to comply with industry and government standards for IT security can turn to Telos Corporation to assure that they can meet them. We’ve served Fortune 500 companies, federal and defense agencies, and the intelligence community with capabilities for assessing and evaluating their systems in advance of audits and testing for security authorization.
Telos supports compliance with regulatory requirements in the commercial sector such as GLBA, HIPAA, Sarbanes-Oxley, and international standards such as ISO-17799. We’re also a leading provider of federal assessment and authorization (A&A) services to the federal government, the Department of Defense, and the Intelligence Community.
Analyzing software source code to prevent malicious code from doing harm.
Telos has developed automated and manual processes and procedures to ensure consistency and completeness in analyzing software source code for malicious code. We will review software source code to check for Trojan Horses, time and logic bombs, and back doors, as well as software flaws such as inadequate bounds-definition and software race conditions that could allow the software to be exploited.