· Enterprise Services
· Application Development
· Information Assurance
· Consulting Services
Information Assurance

The goal of ETM's Information Assurance Programs (IAPs) is to ensure a cohesive alignment between the IT infrastructure, technical components, security programs and the customer's business goals. Through the construction of an IAP, ETM designs a specific solution for each customer. The IAP is the umbrella under which ETM employs its Enterprise Security Management (ESM) methodology. ESM examines each implemented security control (hardware, software, polices and procedures) and/or combination of controls in terms of the security function each is intended to implement and/or assure. All security controls are then collectively measured for interoperability, gap-analysis and to provide an overall picture of the organization's security readiness. Our Information Assurance Services includes the following: Systems Management, Security Technology Assessments, Public Key Infrastructure, Security Monitoring and Reporting, Security Control Center Management, Security Incidence Response, Intrusion Detection and Federal Information Security Management Act compliance.

Our Information Assurance/Information Security Services are integral with the critical IT infrastructure support services that we provide, such as the following:

  • Network and Information Security
  • Engineering and Technical Support
  • Firewall Implementation
  • Information Assurance/Security Product Development and Support
  • Intrusion Detection and Cyberterrorism Attack Preventions
  • Secure E-mail Management
  • User Security Administration and Awareness Training
  • Vulnerability and Threat Assessment

Information Assurance

  • Biometric Security for the IT Infrastructure
  • Certification and Accreditation
  • Computer Security Work Groups
  • Enterprise Security Architecture Solutions
  • FISMA Assessments and Compliance
  • Policy and Procedure Development and Implementation
  • Risk Assessment/Security Test and Evaluation

Information Security Services

  • Biometric Enabling Access
  • Digital Access Control (Digital Certificates/Signatures, Common Access Cards)
  • Encryption (PKI, DES)
  • Intrusion Detection and Mitigation
  • Secure e-Portals and Web Sites
  Home | Company Profile | Core Competencies | Empoyment Opportunities | Contract Vehicles | Contact Us | Site Map