monitor & response
Security Vulnerability Assessment – CTA assesses the vulnerabilities of server operating systems, database management systems, application software, and network components (firewalls, routers, gateways) as well as assessments associated with enterprise security practices and procedures. The result is a prioritized list of the discovered vulnerabilities, and analysis of the associated risks and estimated mitigation costs.
CTA currently provides Security Information and Event Management services to GSA for several networks in their purview. The system for accomplishing this was designed and implemented by CTA in coordination with GSA IT. The operational security activities include intrusion prevention, intrusion detection, intrusion response and reporting.
|© 2010 CTA - All rights reserved.
||703.575.4700 | firstname.lastname@example.org | contact us | home|