Maintaining a strong cybersecurity posture is critical in today’s world.
UTRS has a comprehensive history providing cybersecurity and information assurance (IA) solutions to the U.S. military. We continually meet evolving requirements without impacting efficiency.
It’s no longer sufficient to detect and deflect intrusions. We deploy preventative strategies on both individual and system levels to ensure that your information is not vulnerable in the first place.
Why UTRS for your cyber needs?
We provide cyber solutions for demanding military environments with zero tolerance for failure. From creating customized software applications to supporting classified networks that require rapid deployment and secure storage, our experts provide outstanding computing and data services to our clients. Our personnel are comprised of Certified Information Systems Security Professionals (CISSPs), Security +, and Certified Information Systems Auditors (CISAs). Team members also hold Global Information Assurance Certification (GSLC) Security Leadership Certification.
We provide the following services to the Department of Defense:
- Provide cybersecurity compliance oversight for all Armament Research, U.S. Army Combat Capabilities Development Center (DEVCOM) Armaments Center assets on NIPRnet, SIPRnet, and Defense Research and Engineering Network (DREN) design, installation, configuration, securing and maintenance of Information Technology/Information Systems (IT/IS)
- Educate and enforce DoD, Army regulations, and local policies concerning cybersecurity
- Provide certification and accreditation management for IS (internal as well as external customers), resulting in Authority to Operate (ATO)
- Assist and lead DEVCOM’s Information Management Officers (IMOs), serving as the central point of contact and acting as a liaison between DEVCOM and NEC
- Financial Integrated Reporting Environment (FIRE)
- Provide subject-matter expert (SME) support to guide mission systems and infrastructure through the Risk Management Framework (RMF) accreditation process
- Create and maintain cyber policies, procedures, and other documentation
- Provide data management of eMASS (NIPR and SIPR)
- Create and maintain cyber policies, procedures, and other documentation
- Educate the user community on best practices in cyber hygiene
- Systems currently hosted on local NIPRNet via Tenant Security Plans (ASI, FIRE, eNOVA, LiveCycle, WCP3, OCS, EPM, LCSD, QESA Info Systems, PDMLink, DOORS, ATS, ARM SEC, PIP, JPADS)
What does UTRS’s experience mean for your organization’s security?
We understand how to plan, implement, and scale verified solutions to ensure all departments and individual users are aligned with the most current tools to ensure a secure data posture.
Industries we protect
- Finance
- Accounting
- Legal
- Healthcare
- Real Estate
- Education
- Hospitality
- Government
- Construction
- Technology
- Manufacturing
- Retail
Services we provide
- Penetration Testing
- Vulnerability Assessment
- 360° Security Assessment
- Incident Response
- Compromise Assessment
- Virtual CISO/DPO (Chief Information Security Officer / Data Protection Officer)