TACAN SYSTEMS
  • Home
  • CAPABILITIES
    • Software Maintenance Services
    • Program and Project Management
    • Cyber Security
    • Health Information Technology Services
  • ABOUT US
    • Our Community
    • Small Business Office >
      • Mentor-Protege-Program
  • CAREERS
    • Search Current Oppenings
    • Employee Benefits
    • Culture at TACAN CORPORATION
    • Students & New Grads
    • EEO
  • CONTACT US
Picture
Cyber-Security 
​Services


Risk Management Framework (RMF) Support and Security Assessment and Authorization
We provide full-lifecycle NIST Risk Management Framework (RMF) process support for Federal systems, applications, and common control programs, in accordance with Federal Information Security Modernization Act (FISMA) requirements. Our teams have extensive experience in guiding new system acquisitions and development efforts from initiation to Authorization To Operate (ATO), including supporting stakeholders in the design and implementation of appropriate cybersecurity and controls, and serving as independent assessors. We also perform more targeted security impact analyses and assessments for changes to existing systems.

We have successfully supported a number of Agencies in preparing for, supporting, and responding to Federal IT security audits and evaluations.
Additionally, we have deep experience helping ensure that solutions moved to FedRAMP Cloud Service Providers (CSP) are appropriately secured and monitored. Our services are tailored to the specific needs of each organization and engagement, and are continuously updated to reflect lessons learned from our projects with other organizations, as well as emerging technologies, requirements, and threats.

Cutting edge solutions to tackle your most complex tasks.

Security Governance
Tacan Systems provides security and consulting services that address risk from a holistic, organizational perspective and assist in designing and establishing security governance structures in accordance with Federal guidelines. This type of support includes the implementation of an organization’s risk management strategy; an assessment of risk tolerance; security awareness training; and continuous security policy development. Tacan Systems also aids in the development of a continuous monitoring plan that performs testing on common controls across an entire organization.

Information Security Continuous Monitoring/Ongoing Authorization (ISCM/OA) Transition
We provide support to Federal Agencies in planning for and implementing strategies and transition plans to Information System Continuous Monitoring (ISCM) and Ongoing Authorization (OA), in alignment with Office of Management and Budget (OMB) requirements and NIST guidelines. Our teams have worked with Federal Agencies to assess readiness for ISCM/OA transition through the three prisms of people, process, and technology, and to define ISCM strategies and implementation plans. We are also helping guide Federal Agency stakeholders and systems through the ISCM/OA transition, including providing oversight to the implementation of Continuous Diagnostics and Mitigation (CDM) capabilities.


Risk and Vulnerability Assessment
Tacan Systems provides a suite of Risk and Vulnerability Assessment (RVA) support services that can be delivered on a one-time, ad-hoc, or continuous basis, with services including operation system security assessments; vulnerability scanning; threat analysis and penetration testing support; and the development of risk metrics and risk mitigation strategies.

 



Picture
IT Security Managed Services
We provide cybersecurity and privacy consulting and operational support on-premises and offsite in a number of programmatic areas and at various organizational levels, including:
  • Security Asset Management & IT Component Inventory
  • Plan of Actions and Milestones (POAMs) Management
  • Data Call Assistance (FISMA Reports, Internal Reports)
  • Development, Modernization, & Enhancement Tasks
  • Security Documentation, Event, & Incident Management
  • Assessment & Authorization Support for Various Systems
  • Cybersecurity Awareness Training
  • Sensitive Information Management & Data Loss Prevention
  • Continuous Diagnostics and Mitigation Tools
Picture
​










Advanced Persistent Threat Detection & Mitigation

​Information Assurance

Intrusion Detection and Response

Network/System/Malware Analysis/Forensics

Cyber Threat/Vulnerability Analysis

Incident Handling and Response





DEVELOPMENT TEAM

Application Architecture  
Application Development
Application Management
Business Analysis and Intelligence
Business Process Improvement
Cloud Computing
Customer Relationship Mgmt (CRM)
Data Architecture
Picture