Comprehensive compliance assessments.

Integri can conduct a comprehensive assessment of the programs with compliance attributes to ensure the security posture for your company is appropriate for current activities and prepared for the future.

We can perform independent testing, validation, and analysis of the correct implementation of applicable IA Controls (IAC) to provide the risk and mitigation assessment, including a Certification Determination Letter, to the appropriate Certification Authority for review and approval.

We investigate and provide evidence that the assigned IACs are implemented correctly and in compliance with Security Technical Information Guides (STIGs).

Our capabilities include:

  • Implementing firewalls, anti-virus solutions, and intrusion detection and prevention systems
  • Conducting Host Based Security System (HBSS) installation, implementation, monitoring and reporting
  • Performing Information Assurance Vulnerability Management (IAVM) management
  • Developing security network and system architecture
  • Creating and maintaining current configuration diagrams
  • Optimizing data protection through security methodologies, such as encryption
  • Performing system and server administration
  • Managing ports and protocols
  • Scanning and analyzing logs
  • Performing network risk analysis and preparing mitigation recommendations