SteelCloud has been automating and remediating STIG/CIS policy compliance for over a decade. We knew there had to be a way to make the process easier, reducing the time it takes to harden systems for mandatory RMF compliance - thus freeing up critical technical resources.
ConfigOS is SteelCloud’s automated security policy remediation solution. This easy to implement software product is designed to simplify the process of achieving, maintaining, and continuously delivering a defect-free, policy-compliant environment.
Dramatically reduce the time you spend on RMF, NIST and STIG remediation.
Protecting systems and data requires massive defensive vigilance and action on the part of CISOs, CTOs, CIOs and the personnel that work for them at multiple points in the value chain of serving up information systems services to a needy customer base.
Part of Flashpoint’s Global Intelligence Team, the Physical Security & Counterterrorism Team is dedicated to empowering decision makers with the intelligence and raw data needed to protect an organization’s people, infrastructure, and other assets.
Flashpoint collects and analyzes threat data from a diverse set of sources to deliver critical intelligence.
Flashpoint informs decision makers on emerging trends that affect policy and threats to Federal programs. Our unique position to glean information from the DDW allows us to incorporate highly differentiated and signal-rich, unclassified data into our analysis, as well as provide access to primary sources.
Flashpoint broadens the scope of cyber intelligence beyond threat detection to areas like physical security, providing the relevant context to business units not traditionally afforded the benefits of intelligence derived from illicit communities.
Flashpoint Professional Services offerings enable intelligence and investigations teams to support further analysis, and produce intelligence in support of their mission. Flashpoint’s services enable teams to augment their current operations, plan and build programs that map to specific intelligence requirements, and train teams to build the necessary skills to perform the duties to support their mission.
This paper intends to examine the information security risks innate to the public sector IT supply chain for software and hardware, and their effect on the integrity and availability of federal IT systems and data. It will also enumerate the various standards and impending bills governing the security of the public-sector supply chain.
Flashpoint offerings align to every step in the intelligence cycle; by monitoring and identifying publicly available closed source and vetted communities of interest in support of intelligence needs and collection requirements. Flashpoint’s unique access to illicit online communities, enables intelligence teams to perform further analysis, and produce intelligence in support of their mission.
Actionable intelligence on adversaries operating within illicit online communities is indispensable in support of many missions. Access to information on terrorist activity and recruitment, the spread of jihadi propaganda, cyberattacks, fraudulent activity, malicious insiders, supply-chain threats, and more is difficult and, in some instances, could be dangerous to obtain.
Organizations need to protect their customer base and have insight into whether data has been compromised. Compromised Credentials Monitoring - Customer allows organizations to monitor for compromised customer credentials, while enabling enterprises to prevent fraudulent activity and protect their client base.
Abuse of enterprise credentials allows attackers onto your network and exposes sensitive business and personal data. Compromised Credentials Monitoring - Enterprise enables organizations to search and monitor Flashpoint’s unique collections for compromised enterprise accounts and passwords in order to flag accounts, reset employee passwords, and restrict permissions to prevent actors from accessing confidential or personally identifiable information (PII).
Flashpoint Compromised Credentials Monitoring (CCM) allows users to monitor exposure of compromised credentials for their employee and customer email addresses to take action after breaches to mitigate risk of account takeover (ATO).