empowering our clients - cygnacom solutions · 2019-10-07 · challenges—mitigating evolving...
TRANSCRIPT
WHO WE ARE
We bring trust and reliability to the digital world for our customers and partners. Our clients depend on us to implement strong authentication, protect information and identities, test for evolving certification standards, and secure other high-value assets.
Broad Range of Experiencen Implementing, integrating and optimizing identity management and
information security solutionsn Experience with nearly every government agency
Government PKI Expertn Developed and led the first PKI deployment for the U.S. Government n Touched every major PKI deployment within the U.S. Federal Governmentn Managed multiple successful migrations of user keys from legacy
on-premises CAs to hosted environments
Solving Critical Challenges—Mitigating
Evolving Threats
SSOMFA
Custom application & module development
Cloud migrations
Enabling secure mobile & BYOD connectivity
Implementing multi-factor authentication (MFA)
and single sign-on (SSO)
EMPOWERING OUR CLIENTS to work efficiently and securely in an expanding digital world.
Our Mission
Trusted U.S. Government Partner
OUR SECURITY CAPABILITIES
Identity Management SolutionsCovering the entire identity management lifecycle—from conceptualization and policy development through design, implementation and operations—we help our clients meet audit and compliance requirements and develop systems that stand up to the demand of today’s highly integrated digital environments:n User provisioningn Certificate provisioningn Mobile device management & BYODn Multi-factor authenticators (MFA)n Role-based access controln Privileged account managementn Single sign-on (SSO)n Cloud identity management
Security Consulting & Professional Services
Identity and the CloudGuiding our clients in authenticating and migrating user keys from on-premises CAs to hosted environments—while meeting all relevant regulatory requirements—through a complete range of tools and expert guidance:n Planning servicesn Policy developmentn System architecture & designn Implementation servicesn Staff augmentationn Compliance reporting & audit
Public Key InfrastructureBringing 20+ years of pioneering PKI expertise to support the entire lifecycle of a public key infrastructure, helping our clients achieve a broad range of PKI objectives:n Design, install and configure PKI
systems—on-premises or cloud- based—to issue and manage certificates in an organization
n Enabling agencies to operate a Certificate Authority
n Optimizing existing PKI deployments to maximize benefits
n Migrating on-premises PKI to cloud-based services
n Deploying digital certificates to mobile devices
Identity Provider Solutions & IntegrationWorking with in-house staff to identify disparate identity providers within a client’s ecosystem, integrate and synchronize them within a centralized identity management solution, and build a complete architecture that creates a single source of secure identity across the organization.
Security PoliciesAssisting our clients in developing and auditing security plans and policies, including:n Organizational security policiesn Mobile & BYOD policiesn Disaster planningn Certificate policiesn Certification & registration
practices statementsn Annual & Triennial PKI auditsn HSPD-12 enablement and
mobile-derived credential implementations
Custom DevelopmentBuilding custom modules for identity management and identity provisioning solutions, as well as proprietary applications, including:n Public key and certificate enablement
(PKE)n SAML 2.0-compliant modules for
custom applicationsn Java Authentication and Authorization
Service (JAAS) modulesn Custom Policy Agents and Rule
Processorsn Integrations with existing or new
applications
Certification Services
Common CriteriaAccredited to conduct Common Criteria (ISO/IEC 15408) evaluations under U.S., Canadian, and Turkish schemes.
FIPS 140-2Accredited to test for FIPS 140-2, Security Requirements for Cryptographic Modules, and for testing of approved security functions.
Eligibility for ProcurementHelping government agencies determine whether Common Criteria or FIPS certifications are required.
Offering a full range of security testing services that enable our clients to meet strict and evolving certification standards for U.S., Canadian, and Turkish schemes.
A LEGACY OF LEADERSHIP
PKI Pioneer
We helped define the first PKI standards and bring unrivaled experience building
large-scale PKI infrastructures and hosting managed services PKI.
22 Years at the Forefront of Information Security
We’ve remained a trailblazer in security accreditations for more than two decades—
from Common Criteria and FIPS 140-2 to ISO/IEC 15408 and more.
Unmatched Depth of Experience
Our staff average more than 15 years of dedicated PKI and IT security expertise
working with federal government agencies.
Comprehensive Security Expertise
Our legacy brings in-depth knowledge across the spectrum: security policies,
development of standards from inception, architectures, implementations, operations,
technology, testing, all levels of validation.
Cygnacom has established and proven partnerships with leading identity management system integrators, as well as top identity management solution providers. We pride ourselves on delivering trusted expertise, working as a true, seamless extension of their teams.
POWER OF PARTNERSHIP
Technology and Solution Partners
We believe in strong, creative & flexible security solutions.
Wendy MurphyBusiness Development Director7925 Jones Branch Drive, Suite 5200McLean, VA 22102(703) [email protected]
cygnacom.com
Our experts are ready to work with you. Talk to us.
© 2018 All Rights Reserved by Cygnacom Inc.