Questions?
Get in touch- We will answer your questions: 1-855-5 TIKRAS

Capabilities

Tikras Technology Solutions Corp offers a wide array of technical cyber-security services, which enable our clients to successfully execute and support effective cyber-security programs. Our team of certified professionals has performed on multiple contracts for Department of Defense and multiple Civilian agencies and provides superior consulting services for our private sector clients.

 

Information Security Assessment: The Tikras security assessment is a tailored and comprehensive evaluation of an organization’s Technical, Operations and Management security controls covering all security control families in accordance with National Institutes of Standard and Technology (NIST), Risk Management Framework (RMF), and industry best practices. The assessment is performed by certified experts experienced in a wide variety of tools and techniques to identifysecurity risks and offer detailed mitigation strategies. Our methodology and detailed reporting supports both FISMA and HIPAA federal compliance requirements.
 
Vulnerability Testing: Tikras performs internal and external vulnerability analysis services of client networks and systems that encompass Major Applications and General Support Systems (GSS) to verify and validate risks associated with the IT devices in the system boundary. Our security engineers perform scans and conduct network discovery, collecting and analyzing data, to discover an organization’s potential weaknesses. Ultimately, we determine what network services are visible and, of the services visible, catalog known vulnerabilities associated with the service as well as verify and validate risks associated with the IT devices within the system boundary. Our analysis demonstrates the ability of a person with access to a client’s information system computing resources to circumvent “in-place” security protection mechanisms. For those vulnerabilities discovered, the Tikrasteam develops detailed reports identifying the risk level (LOW, MEDIUM, HIGH) and provides mitigating strategies for each risk documented. Additionally, to the degree possible, false-positives are eliminated from reporting. Tikrassecurity engineers and Subject Matter Experts (SMEs) document all scans executed during testing. Client personnel are welcome and encouraged to participate and observe all test execution. 
 
Penetration Testing: Tikras performs both Internal and External penetration testing of client network segments, applications, and systems utilizing a verifiable and repeatable process. The purpose of our testing is to measure the system’s ability to maintain a secure posture under external and/or internal attack by demonstrating the ability of a motivated person to circumvent in-place security protection mechanisms. If our team is successful in breaching your security the Tikras security engineers and SMEs further attempt to discern if a potential attacker could either compromise information (e.g., steal it, modify it, etc.), or disrupt client information system operations (e.g., delete file systems, halt system operations, etc.). All testing information and resultsthat support our security team’s conclusions are provided to the client in the form of artifacts, evidence, and/or dictations.
 
Staff Augmentation: Tikras staff augmentation services are designed to provide on-site and cost-effective security expertise to organizations to perform designated critical security, technical, management or operation tasks. Our security professionals ensure expert knowledge transfer in all engagements to maximize the in-house value of their performance.
 
Security Program Guidance: Tikras provides executive level support to organizations requiring strategic guidance for the purposes of building and implementing effective and efficient organization-wide security programs. Our services strive to build strategies that incorporate functional continuous monitoring, maintain compliance with the Risk Management Framework (RMF), and any other applicable client-specific requirements.
 
Security Policy Planning and Development: Tikras provides expert resources and compliant templates to assist in developing security policies, procedures, standards, and guidelines. Our security experts analyze, prepare, update, and provide security-related operational, management, and technical information systems documentation that supports a continuous monitoring environment and strategy.
 
Cyber Security Training: Tikras instructors are certified technology experts and experienced educators. This unique combination minimizes project learning curves and results in a curriculum that ensures the most rapid and effective resultspossible. Tikras offers standardized on-site, instructor-led training courses in CISSP® (Certified Information Systems Security Professional), Sec+ Certification & Net+ Certification. Tikras also maintains the capability to design, develop,and deliver turnkey education solutions that include interactive learning materials and multi-use system simulators tailored to meet individual client goals.
 
Assessment and Authorization (A&A) Services: Tikras A&A service capabilities cover multiple areas of FISMA compliance. 
 
  • FISMA Audit Services - Often referred to as continuous monitoring, Tikrasserves as the Certification Authority (CA) for your organization. Our processes align with those of federal agencies and use the same documents and deliverables required by NIST in the SP 800-37 framework. Ongoing A&A ensures that the security controls implemented during security authorization remain updated and effective.

  • FISMA Assessment and Authorization (A&A) Package Development - Tikrassecurity professionals will assist your organization in building compliant A&A document packages to submit for authorization.

 
For more detailed information on the above services, please contact Tikras at: (703) 942-9300