• Industries
    • Industries
    • Industries we serve
      Healthcare
      Financial Services
      Critical Infrastructure
      DIB and FSIs
      Defense and Military
      Federal Government
      State and Local
      K-12 and Higher Ed
      Offerings A-Z
      I want to...
      Manage cyber risk on a continuous basis.
      Harden and protect our cybersecurity posture
      Reduce the digital attack surface of our organization
      Assure compliance in cloud and on-premises environments
      Minimize audit fatigue and the growing compliance burden on my organization
      Enable mobile personnel to work securely across and beyond the enterprise
      Assure the integrity and security of our supply chain
      Protect personnel identities and locations
  • Offerings
    • Offerings
    • Xacta: Automate cyber risk management
      Xacta Overview
      Xacta 360
      Xacta.io
      IBM Security AGS + Xacta
      Xacta: Speed time to compliance
      NIST RMF Automation
      FedRAMP Automation
      NIST CSF Automation
      CSF / 800-171 Automation
      CMMC Automation
      Comply with federal and DoD standards
      CMMC Readiness Assessment
      NIST SP 800-171 Security Assessment
      Licensed ASCA Assessment Services
      Strengthen your cybersecurity posture
      Supply Chain Risk Management
      Assessment Services
      Engineering Services
      Penetration Testing
      Telos Ghost: Eliminate network attack surfaces
      Telos Ghost Overview
      Cyber Threat Intelligence
      Secure, Anonymized Search
      Anonymous Communications
      Server Protection
      Managed Attribution
      IoT/IIoT Protection
      Work without concern across the enterprise
      Secure Mobility Services
      Enterprise Wireless Networks
      Campus Wi-Fi
      Maintenance Mobility
      Communicate securely for strategic requirements
      AMHS Organizational Messaging
      AMHS Training
      Telos ACA: Gain actionable cyber threat intelligence
      Telos ACA Overview
      IDTrust360: Protect personnel and facilities
      IDTrust360 Overview
      ONYX Touchless Fingerprinting
      ONYX KYC Compliance for Finservs
      Securely move to and work in the cloud
      Cloud Migration and Engineering
      Cloud Compliance Automation
      AWS Compliance Solutions
      Microsoft Azure Compliance Solutions
      Operate and defend enterprise networks
      Telos Secure Networks
      Network Management and Defense
      Telos Robotic Process Automation (RPA)
      Cybersecurity Operations
      Offerings A-Z
  • Support
  • Partners
  • More
    • More
    • Company
      About Telos
      Core Values
      Corporate Citizenship
      Management and Directors
      Investors
      Contracts
      Contracts Overview
      2GIT
      Alliant 2
      ITES 3H
      GSA Schedule
    • News and Events
    • Blog
    • Resource Center
    • Contact Us
    • Careers
  • Industries
  • Offerings
  • Support
  • Partners
  • More

Industries we serve

  • Healthcare
  • Financial Services
  • Critical Infrastructure
  • DIB and FSIs
  • Defense and Military
  • Federal Government
  • State and Local
  • K-12 and Higher Ed
Offerings A-Z

I want to...

  • Manage cyber risk on a continuous basis.
  • Harden and protect our cybersecurity posture
  • Reduce the digital attack surface of our organization
  • Assure compliance in cloud and on-premises environments
  • Minimize audit fatigue and the growing compliance burden on my organization
  • Enable mobile personnel to work securely across and beyond the enterprise
  • Assure the integrity and security of our supply chain
  • Protect personnel identities and locations
  • Xacta: Automate cyber risk management
    • Xacta Overview
    • Xacta 360
    • Xacta.io
    • IBM Security AGS + Xacta
  • Xacta: Speed time to compliance
    • NIST RMF Automation
    • FedRAMP Automation
    • NIST CSF Automation
    • CSF / 800-171 Automation
    • CMMC Automation
  • Comply with federal and DoD standards
    • CMMC Readiness Assessment
    • NIST SP 800-171 Security Assessment
    • Licensed ASCA Assessment Services
  • Strengthen your cybersecurity posture
    • Supply Chain Risk Management
    • Assessment Services
    • Engineering Services
    • Penetration Testing
Offerings A-Z
  • Telos Ghost: Eliminate network attack surfaces
    • Telos Ghost Overview
    • Cyber Threat Intelligence
    • Secure, Anonymized Search
    • Anonymous Communications
    • Server Protection
    • Managed Attribution
    • IoT/IIoT Protection
  • Work without concern across the enterprise
    • Secure Mobility Services
    • Enterprise Wireless Networks
    • Campus Wi-Fi
    • Maintenance Mobility
  • Communicate securely for strategic requirements
    • AMHS Organizational Messaging
    • AMHS Training
  • Telos ACA: Gain actionable cyber threat intelligence
    • Telos ACA Overview
  • IDTrust360: Protect personnel and facilities
    • IDTrust360 Overview
    • ONYX Touchless Fingerprinting
    • ONYX KYC Compliance for Finservs
  • Securely move to and work in the cloud
    • Cloud Migration and Engineering
    • Cloud Compliance Automation
    • AWS Compliance Solutions
    • Microsoft Azure Compliance Solutions
  • Operate and defend enterprise networks
    • Telos Secure Networks
    • Network Management and Defense
    • Telos Robotic Process Automation (RPA)
    • Cybersecurity Operations
  • Company
  • Contracts
  • News and Events
  • Blog
  • Resource Center
  • Contact Us
  • Careers
  • About Telos
  • Core Values
  • Corporate Citizenship
  • Management and Directors
  • Investors
  • Contracts Overview
  • 2GIT
  • Alliant 2
  • ITES 3H
  • GSA Schedule

Offerings

Xacta®Xacta 360 Continuous Compliance AssessmentXacta 360 for CMMCXacta 360 for Supply Chain Risk ManagementXacta 360 for Risk Management FrameworkXacta 360 for FedRAMP AutomationXacta 360 for NIST CSF AutomationXacta 360 for NIST CSF and SP 800 171Xacta.io™ Continuous Security AssessmentIBM Security Active Governance Services + XactaCybersecurity ServicesConsulting ServicesAssessment and ComplianceEngineering and EvaluationCybersecurity OperationsPenetration Testing
Telos Ghost®Cyber Threat IntelligenceSecure, Anonymized SearchServer ProtectionManaged AttributionIoT/IIoT ProtectionTelos Ghost: ApplicationsTelos Advanced Cyber AnalyticsCloud ServicesCloud Compliance AutomationAWS Compliance SolutionsMicrosoft Azure Compliance SolutionsCloud Services
IDTrust360ONYX: Mobile Biometric CaptureONYX: KYC Compliance for FinservsSecure NetworksNetwork Management and DefenseSecure Mobility SolutionsTelos Robotic Process Automation (RPA)AMHS: Organizational MessagingAMHS TrainingAMHS Support

Subscribe to Our Newsletter

Although we may use your information for targeted marketing and advertising, as described in the Privacy Policy, we will never sell your information to any third party.

By checking this box, you consent to Telos sending you information about its products, services, events, industry topics and company news, by email and/or phone or text to the contact information you submitted. Of course, you may withdraw your consent and unsubscribe at any time.

Telos® Corporation
19886 Ashburn Road
Ashburn, Virginia 20147
1-800-444-9628 Contact Us
  • Industries
    • Healthcare
    • Financial Services
    • Critical Infrastructure
    • DIB and FSIs
    • Defense and Military
    • Federal Government
    • State and Local
    • K-12 and Higher Ed
  • Offerings
    • Xacta®
    • Telos Advanced Cyber Analytics
    • Telos Ghost®
    • IDTrust360®
    • ONYX
    • Cloud Solutions
    • Cybersecurity Services
    • Secure Mobility
    • All Offerings
  • Of Interest
    • Support
    • Resource Center
    • About Telos®
    • Careers
    • e-Catalog
    • Commercial Price List

© 2023 Telos Corporation. All rights reserved.

  • Legal
  • Privacy
Loading results...

Matching results

See all results

No results

Popular searches

  • cloud security
  • telos ghost
  • telos xacta
  • cloud compliance
  • enterprise cyber security

I want to...

  • Minimize audit fatigue and the growing compliance burden on my organization
  • Manage cyber risk on a continuous basis.
  • Harden and protect our cybersecurity posture
  • Reduce the digital attack surface of our organization
  • Assure compliance in cloud and on-premises environments
  • Enable mobile personnel to work securely across and beyond the enterprise
  • Assure the integrity and security of our supply chain