Ultra Electronics, ProLogic provides security engineering and architecture design to public and private organizations who need their computer networks secure in a cost effective process. Not a cookie cutter process but tailored to the business needs and levels of confidentiality, integrity and availability we listen, consult and assist each organization with physical and information security that meet their individual needs. Our customers entrust us to build information assurance into their projects. This blending of quality, proven results and solutions saves rework and valuable resources.

Expertise:
  • Computer network penetration and vulnerability assessment
  • Mitigation of vulnerabilities
  • Physical and information security engineering based on proven business standards
  • System/network life cycle information security management
  • Security compliance testing
  • Comprehensive and complete documentation
  • Customized analysis and review of each system
  • Risk assessment that draws needed information from multiple specialties
  • Tightly woven security team that has delivered high quality processes, policies, procedures on time and on budget
  • Experience with multiple operating systems such as CISCO, Red Hat, Solaris, Apple and various Microsoft Windows platforms
  • Architecture framework
  • Independent verification and validation (IV&V)
  • Comprehensive risk assessments that present management with their risk acceptance level
  • FISMA compliance verification
Documentation that can be provided:
  • System security plan
  • Information support plan
  • Disaster recovery plan
  • Incident response plan
  • Risk assessment
  • Plan of actions and milestones
  • Continuity of operations plan
  • Configuration management plan
  • Change management plan
  • Information assurance vulnerability management plan
Expertise with the following security standards
  • Computer network Certification and Accreditation (C&A) requirements and documentation
  • National Industrial Security Program Operating Manual (NISPOM)
  • Director of Central Intelligence Directives (DCID)
  • National Institute of Standards Technology (NIST) 800 series
  • Health Insurance Portability and Accountability Act (HIPAA) security requirements
  • Joint Air Force, Army and Navy (JAFAN)
  • Federal Information Security Management Act (FISMA)
Expertise with the following security standards
  • Computer network Certification and Accreditation (C&A) requirements and documentation
  • National Industrial Security Program Operating Manual (NISPOM)
  • Director of Central Intelligence Directives (DCID)
  • National Institute of Standards Technology (NIST) 800 series
  • Health Insurance Portability and Accountability Act (HIPAA) security requirements
  • Joint Air Force, Army and Navy (JAFAN)
  • Federal Information Security Management Act (FISMA)

 

   Team ProLogic’s Formula for Customer Support
Our plan offers… …through… …which results in
Proven experts:

  • Information assurance SME’s
  • Testing and validation
  • Implementation
  • Hardening software
  • Proven professionals with expertise in each of the key areas required
  • Data integration management leadership and innovation
  • Less technical risk
  • Lower lifecycle costs
  • Less custom software development
  • High degree of cross project collaboration
  • Proven track record
  • Over 15 years of federal and commercial support, providing reach-back to long term IA experts
  • Successful track record recruiting and delivering staff of the highest quality
  • Disciplined security and project Management and security/network engineering processes
  • Lower performance risk
  • Higher performance results
  • Less project personnel ramp-up
  • Higher system quality
  • Rapid decision making support
  • Lessons learned application
  • Unmatched implementation experience
  • Extensive working experience with DoD and federal agencies
  • Current personnel delivering solutions to customers
  • Deep knowledge of security project cutover and implementation processes
  • Smooth transition
  • Minimal ramp-up time
  • Schedule consistency (on-task)
  • Strong user relationships
  • Repeatable processes
  • Mastery of the change management process
  • Experience organizing and supporting change and configuration management initiatives
  • Superior delivery of project message
  • Reduced resistance
  • Energized user buy-in
  • Metrics for success