Cybersecurity

Perspecta / Offerings / Cybersecurity

Cybersecurity

As threats grow in breadth and sophistication, the old defense in-depth approach often generates unclear priorities, drains resources and leaves gaps in protection. At Perspecta, we help customers migrate to a defense in-context strategy. We bring transformative cyber expertise and mission-enabled solutions to the forefront of operations.

Our security solutions predict attacks, proactively respond to threats, ensure compliance and protect data, applications, infrastructure and endpoints.

Key offerings include:

  • Cybersecurity engineering, integration and advisory services:
    Using an iterative Cyber Systems Engineering (CSE) process, identify security prerequisites, develop security reference architectures and perform requirements traceability analysis to fully understand your system and its dependencies
  • Cybersecurity training, planning and exercises:
    Train your workforce on how to protect their environment from cyber intrusions
  • Computer network exploitation:
    Identify specific networks or systems to target for attempted exploitation using industry standard tools
  • Security Operations Center (SOC) services:
    Assure mission performance is maintained while reducing the threat of malicious activity by proactively managing network connectivity 
  • Platform, network and critical infrastructure protection:
    Protect your networks, platforms and critical infrastructures against cyber intrusions and malicious attacks
  • Advanced cybersecurity tools and solutions:
    Protection for your environments, as well as your databoth at rest and in transit
  • Identity, credentialing and access management (ICAM):
    Control who has access to your systems and resources, how they interact with them and verify that they are in fact, who they say they are
  • Threat prevention, detection, analytics and response:
    Identify, assess and remediate security threats and weaknesses that enable attackers to steal data, gain access to intellectual property and damage your organization 
  • Security policy, risk management and compliance:
    As an accredited Third Party Assessment Organization (3PAO)  under FedRAMP, we perform initial and periodic assessments of security and privacy controls deployed in cloud information systems
     

Advantages


  • Security industry experts
    We have extensive industry and professional expertise. Our experts hold industry certifications such as CISSP and CISA, and have a working knowledge of requirements and standards that include NIST 800-53r4, HIPAA, PCI DSS, ISO27001, DISA and CIS
  • Accredited
    Perspecta holds accredited Third Party Assessment Organization (3PAO)status under FedRAMP
  • Delivery “DNA”
    Perspecta has been integrating and delivering infrastructure and applications services for decades by partnering with delivery teams to assess IT environments and implement solutions
  • Industry leading partnerships
    We partner with established industry leaders, like Micro Focus Fortify and CA Veracode, to identify security defects and weaknesses in applications
  • Flexible pricing models
    We can deliver our service through a variety of pricing models, including consumption-based “as a service” models that are simple and easy to consume