Services

Drake IA Solutions specializes in Information Assurance and Cyber Security services that protect the confidentiality, integrity, and availability of user data through physical, technical, and administrative controls that focus on preventing unauthorized access to data centers and internet connected systems through authenticity, non repudiation and mitigation of cyber/malicious threats. Our services and offerings follow.


Cyber Analysis & Engineering

 

Monitor networks for security incidents and abnormal activities. Monitoring includes Network and Host Intrusion Detection/Prevention, firewalls and all network perimeter security devices for anomalous or suspicious activity.


System Risk Management

 

Focus on 5 risk management steps (1) Identify Risk (2) Analyze Risk (3) Evaluate Risk (4) Mitigate and (5) Monitor Risk.


Accreditation Services

 

Provide a detailed plan of corrective actions and provide the plans for the remediation measures needed in response to information security weaknesses and threats. Expert Accreditation Oversight and Assistance: Security-related technical support for accreditation activities to include system security plans, system security authorization agreements, concepts of operations, security requirement traceability matrices, test plans and plans of actions and milestones.


Configuration Management & Change Control

 

Establish baseline configurations and inventories of organizational information systems that include hardware, software, firmware and documentation for networks as well as establish security configuration settings for technology products. Create change control procedures.


Security Training & Briefings

 

Security starts and ends with an informed user-base. Drake IA Solutions provides a proactive training and awareness culture through on-site training, remote or train-the-trainer sessions that allow managers and users of organizational information systems to be aware of security risks and focus on having adequately trained personnel.


Standard Operating Procedures & Policies

 

Ensuring the Information Systems Security department’s policies, procedures and practices are compliant with business/agency standards. Developing and/or reviewing System Security Plans, Security Assessment Reports, Privacy Impact Analysis, Contingency Plans and Disaster Recovery Plans. Also performing routine evaluations of these documents, security scan results and system settings in order to address controls deemed insufficient or updates to controls for remediation.


Document Management

 

Providing an efficient Document Management System (DMS) to help enhance data security and keep sensitive business and personal information, personally identifiable information and protected health information secure through access control, authentication, usage control, encryption and proper back-up.