Security Solutions and Services
At CSC, IT Infrastructure Security is part of building maintaining your network, data, and data centers.
Government organizations depend on information both for the efficient operation of their business processes and service to the citizen. The protection of that information and the infrastructure supporting it have always been vital, but new urgency has been added by the explosion of security threats from internal as well as external sources. The threat posed by the outside hacker is well-known; of equal importance is validating the need-to-know of the internal user.
CSC provides seamless integration of security services into our other IT infrastructure services. The breadth and depth of our security solutions has continued to grow in response to the needs of the public sector.
End-To-End Security Administration Services
- Advanced identity, credentialing and access management solutions using state-of-the-art technologies such as biometrics and RFID
- Workable and prototyped solutions to help comply with HSPD-12, the U.S. Government’s Homeland Security Presidential Directive for a common identification standard for federal employees and contractors
- Vulnerability and security policy reporting/compliance management, including compliance with the Federal Information Security Management Act (FISMA) (download PDF, 54.6 KB), NIST 800-53, e-Gov 22 as well as others such as Sarbanes-Oxley (SOX), Gramm Leach Bliley (GLB), and HIPAA
- Services to ensure business continuity and limit liability
- Managed security services
- Automated reporting and situation awareness utilizing CSC’s Security Policy Compliance and Reporting Service (download PDF, 101 KB)
Computer Security Operations and Incident Response Services
- Enterprisewide approach to computer security operations, including the handling and management of security incidents
- A range of proven tools for vulnerability assessments, intrusion detection, firewalls, user authentication through technologies such as Smart Cards, PKI, data and link encryption, policy enforcement, incident tracking/analysis and reporting, etc.
- Operation and risk management of trusted systems through surveillance and audit
- Download brochure on Computer Security Operations and incident Response Services (download PDF, 68.2 KB)
Security Operations Centers
CSC’s Security Operation Centers take a holistic approach to do the following:
- Monitor and manage intrusion detection and prevention
- Ensure implementation of an overall security policy across an enterprise
- Provide prioritization, oversight and disclosure of key risks and vulnerabilities
- Provide end-to-end risk management services throughout the risk life cycle.
Integrated Antivirus Management
Our fully managed Antivirus Management Services (download PDF, 68.2 KB) encompass scanning, antivirus software/hardware, monitoring of antivirus advisories, management and maintenance. The result is a sound IT environment and reduced costs through a policy of prevention rather than damage mitigation after an attack.
Certification and Accreditation (C&A) Support
CSC’s standardized approach and tools enable more consistent and repeatable assessments on security controls for facilitating C&A for DITSCAP, DIACAP, NIACAP and NIST 800-37 systems. Download C&A brochure (PDF, 40.3 KB).
