Small business showcase network security services llc
1 / 38


  • Updated On :

SMALL BUSINESS SHOWCASE NETWORK SECURITY SERVICES LLC. Small Business Size: SBA Certified 8(a), HUBZone, WO, SDB Niche Areas: Computer Forensics & Managed Security IRS/Treasury Contracts: Subcontractor on IRS MITS Cyber Security, Office of the ACIO

Related searches for SMALL BUSINESS SHOWCASE

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'SMALL BUSINESS SHOWCASE' - Anita

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Small business showcase network security services llc l.jpg

  • Small Business Size: SBA Certified 8(a), HUBZone, WO, SDB

  • Niche Areas: Computer Forensics & Managed Security

  • IRS/Treasury Contracts:

    • Subcontractor on IRS MITS Cyber Security, Office of the ACIO

    • Prime contractor on IRS Cyber Security Training, Electronic Crimes Unit

    • Largest award: $415,000

  • Largest Company Award:

    • Amount: Incrementally funded; currently at $415,000

    • Customer: Govt: SPAWAR Charleston. Prime: Honeywell Technology Solutions, Inc.

Who we are l.jpg
Who We Are

  • SBA Certified 8(a) and HUBZone, Woman-Owned small business

  • GSA Schedule 70 Prime Contractor

  • Seaport-E Prime Contractor

  • Provider of highest level of IT security solutions

Who we are3 l.jpg
Who We Are

  • Security Team’s Qualifications

    • Backgrounds in:

      • Law Enforcement/Military Intelligence

      • Federal Agencies

      • Prestigious Commercial Businesses

    • High levels of education & certifications

Nss founder background l.jpg
NSS Founder Background

  • Law Enforcement Officer (19 years experience)

  • Detective

    • Computer Crime Investigations

  • Commercial Field

    • DCITP, Lead Instructor for Network Investigations & Intrusions

    • Ernst & Young, Director of Incident Response, National Forensics Lab

    • Fiderus Inc., Director of Incident Response & Penetration Testing

Core competencies l.jpg
Core Competencies

  • Information Assurance Services

  • Managed Enterprise Security Services

  • Computer Forensics

  • Network Investigations

  • Computer Forensics Training

What we offer l.jpg
What We Offer

  • Information Assurance Services

    • Certification and Accreditation

    • Risk & Vulnerability Assessments

    • Disaster Recovery and Policy Development

  • Managed Security Services

    • Firewalls/Routers

    • IDS/IPS

    • Incident Response

  • Computer Forensic Investigative Services

  • Computer Crime Investigative Training

Information assurance services l.jpg
Information Assurance Services

  • Information Assurance (IA)

    • Certification & Accreditation

    • Vulnerability Assessments

    • Penetration Testing

    • Application Testing

Slide9 l.jpg

  • The Federal Information Security Management Act (FISMA)

  • Compliance with FISMA requires expert security analysis and evaluation skills and a thorough understanding of the FISMA requirements

Slide10 l.jpg

  • NSS Security Experts assist and guide in the compliance of efforts for the following standards:

    • FISMA

    • NIST 800 series

    • FIPS 199,200


    • NIACAP

    • HIPAA

  • ST&E Testing of the above standards

Slide11 l.jpg

  • Life Cycle Certification Support

    • Definition

    • Verification

    • Validation

    • Post-Accreditation

  • Certification Audit Support

Vulnerability scanning l.jpg
Vulnerability Scanning

Checks for known vulnerabilities

Work closely with customer to identify scope and depth of scanning

Generally, systems are checked for known exploits and vulnerabilities

Work with customer to mitigate and mediate identified risks

Assist in solution development and implementation

Penetration testing l.jpg
Penetration Testing

In depth probing and testing

Exploit unknown or unpublished vulnerabilities

Requires more time and higher skilled people

Application testing l.jpg
Application Testing

Achilles heel of service-oriented architecture

Applications are key to leveraging benefits of information systems

Create the greatest risk

Extensive code

Chance of insecure or exploitable code being created

Managed enterprise security services16 l.jpg
Managed Enterprise Security Services



Intrusion Detection Systems

Intrusion Prevention Systems

Incident Response

Firewalls and routers l.jpg
Firewalls and Routers

  • Monitoring & Compliance

    • Log analysis

    • Configuration review and assessment

  • Configuration updates and adjustments

  • Rule testing and evaluation

Intrusion detection systems intrusion prevention systems l.jpg
Intrusion Detection Systems & Intrusion Prevention Systems

  • Manage and monitor IPS/IDS

    • Monitor network traffic for:

    • Hostile network activity

    • Ex-fill of sensitive information

    • Policy enforcement and violation

      • PII disclosure

      • Plain Text

    • Respond to alerts (IR)

Computer forensic services l.jpg
Computer Forensic Services

Mobile Forensics

Network Forensics

Intrusion Investigations

Incident Response

Network forensics l.jpg
Network Forensics


Packet analysis

Server data acquisition

Live data collection

Data validation


Computer crime investigative training l.jpg
Computer CrimeInvestigative Training

Multiple training courses l.jpg
Multiple Training Courses

Computer Forensics

Linux Forensics

Mobile Forensics

Network Forensics

Intrusion Investigations

Internet Investigations

Wire Taps

Training clients l.jpg
Training Clients

DCITP- Defense Computer Investigations Training Program for DoD

Department of State

George Washington University

Internal Revenue Service

Regional Computer Forensics Group

Federal Bureau of Investigations



Slide26 l.jpg

  • SPAWAR Systems Center Charleston

    • Performing ST&E

    • Testing:

      • FISMA Standards

      • NIST 800-53, 800-53A

      • FIPS 199, 200 

      • Technology: Cisco, Unix, Microsoft, MSSQL 2000, MSSQL 2005, and Oracle 10.1(g)

Department of navy l.jpg
Department of Navy

  • SPAWAR - Navy Medicine Enterprise Security Operations Center

    • Router and Firewall security

    • Management and monitoring support

    • Policy compliance with SOP

    • Develop and document operating policies and procedures

Work experience l.jpg
Work Experience

  • IRS

  • USDA

  • Department of Navy


  • SAIC

  • Commercial Banks

  • Unions

Work experience29 l.jpg
Work Experience

  • FBI

  • OIG Philadelphia

  • Philadelphia PD IA

  • Large Prime Contractors

  • Law Firms & Private Investigative Firms

  • Commercial Banks

  • Commercial Businesses


Certifications education l.jpg










CCNP + Security

MA Sociology/Criminology

MS Information Systems

Certifications & Education

Expert testimony l.jpg
Expert Testimony

  • Certified Expert Computer Forensics

  • Certified Expert Mobile Forensics

  • Certified Witness Edged Weapons


Customer satisfaction l.jpg
Customer Satisfaction

  • We have had outstanding performance reviews from our customers

  • We place appropriately skilled, technically proficient security engineers

  • We have several teaming opportunities on large, upcoming projects

Upcoming projects l.jpg
Upcoming Projects

  • Support C&A efforts for Marine Corps

  • Increase support on Navy Medicine Enterprise Security Operations Center

  • Intrusion Prevention/Detection

  • Incident Response

  • Manage Computer Forensics Lab

  • Provide computer forensic and incident response support to government SOC/NOC

Goals l.jpg

  • Achieve prime contractor status

    • Start small and grow

  • Stay up-to-date on certifications and education

  • Continue to provide our customers with

    Quality of Service and Customer Satisfaction

Why choose nss l.jpg
Why Choose NSS

  • Network Security is in our name & is what we do

  • Skilled and Certified Security Engineers

  • Strong Past Performance & Notable Responsiveness

Our contact information l.jpg
Our Contact Information

VA office: 2106 Harbor Drive, Greenbackville, VA 23356

SC office:1156 Bowman Rd, #200, Mt. Pleasant, SC 29464

Phone: 703-319-0411 or 843-416-1196

Fax: 866-670-1961

President: (Ms) Alexei Haughom

Email: [email protected]