Case Study: Ensuring Secure DOD Network Operations
Sentar’s professionals worked with the client across a range of technical areas to monitor client network data for intrusions or malicious activity.
Sentar’s professionals worked with the client across a range of technical areas to monitor client network data for intrusions or malicious activity.
Over 75 federal contractors have relied upon Sentar’s experts to assess their cybersecurity posture and develop necessary procedures to achieve compliance on a fast-paced schedule.
Our client struggled to meet and reflect compliance against reportable metrics identified within the DoD CIO Cyber Hygiene Scorecard.
Sentar established the D2D Transition Assessment Support (TAS) Team to provide initial risk posture documentation for the client.
Due to the unique operational nature of client devices, the Med-COI transition required a tailored approach to the Risk Management Framework (RMF).
A long-term solution was developed after the unsuccessful implementation of a 3rd party overlay to client sensors and control systems.
We provided endpoint management, endpoint monitoring, and backup/disaster recovery support, to 255,000 military users geographically distributed worldwide.
© Sentar, inc., All rights reserved