Full Scope Cybersecurity Solutions
Across the spectrum of identify, protect, detect, respond, and recover, AIT’s Cyber Mission Assurance Capabilities (CMAC) Teams have you covered.
Critical Infrastructure Cybersecurity
From building automation systems to process control systems…
AIT protects you
Weapons Systems
Cybersecurity
From mission assurance through weapons systems cybersecurity…
AIT defends you
Information Technology Cybersecurity
From information assurance and information security…
AIT shields you
AIT Cybersecurity Service Offerings
AIT organizes our cybersecurity offerings around the NIST Cybersecurity Framework as listed below:
Identify
- Asset Identification
- Vulnerability Assessments
- Penetration Testing
- Vulnerability Research
- Policy Creation and Maintenance
- Risk Management & Program Metrics
- Acquisition Advisory Service
Protect
- Mitigation Planning
- Strategic Planning
- Remediation
- RMF / NIST CSF
- Cyber Commissioning
- Secure System Design
- Third Party Design Reviews
- Product Evaluation
- Virtual Testbed
Detect
- Security Monitoring
- Threat Intelligence
Respond
- Incident Response
- Incident Response Playbooks
- Case Management
- Evidence Collection
- Integration with your Incident Response Teams
- Supplemental Incident Response Personnel
- Cyber Exercises
Recover
- Recovery Planning
- Recovery Kits
- Lessons Learned Improvements
- Communications Planning
As a streamlined acquisition option, we also offer all of our cybersecurity services through our GSA contract vehicle under the Highly Adaptive Cybersecurity Services (HACS) Multiple Award Schedule.
GSA HACS contract number: 47QTCA20D0095