Click here to download “Risk Management Methodologies” now! Companies thrive based on the results of their business decisions: from headliners (invest in cloud computing or upgrade servers?); to managerial (add resources to an executing project?); to operational (is it time to …

Whitepaper 03-03: Three Risk Management Methodologies Read more »

Click here to download “P2SP for DoD Contractors” now! Effective and relevant organizational policies, practices, standards and procedures (P2SP) provide the direction and guidance necessary for vendors to work successfully with the Department of Defense (DoD). Successful implementation of P2SP creates a …

Whitepaper 03-02: IT Policies and Procedures for DoD Read more »

Click here to download “Awareness and Ethics in the Operations Environment” now! Working in the Department of Defense (DoD) demands providing excellent results, utilizing strong security measures, delivered in a cost-effective way. The DoD has high standards for industry and the …

Whitepaper 03-01: Awareness and Ethics in the Operations Environment Read more »

Click here to download “Critical Analysis Organizational Network” now! Government is demanding that private industry improve delivery efficiency while simultaneously decreasing costs – all the while meeting ever-more-stringent information assurance requirements. To achieve these goals, organizations of all sizes must …

Whitepaper 02-04: Critical Analysis of an Organization Network Read more »

Download the whitepaper “Network Perimeter Security” here! Most small companies struggle with network security, but that does not relieve these companies of the requirements for ensuring the confidentiality, integrity, and availability of their network and network resources. This whitepaper helps …

Whitepaper 02-03: Network Perimeter Security Read more »

Download the Network IAA Use Case whitepaper here! The typical Small / Medium size Business (SMB) must provide both intranet (internal) and extranet (external) access for its employees and customers based on roles, permissions, and clearance. This white paper looks …

Whitepaper 02-02: Network Identification, Authentication, and Authorization Use Case Read more »