Our Services

Are your everyday activities being conducted in compliance within the latest industry guidelines or government rules?

Were your information systems designed to meet and adjust to your current and future security needs?

Is your system vulnerable to hacking?

QuestTech Systems delivers solutions to meet these Information Security needs and more. Our offerings include:


Information Assurance Support

•Compliance Monitoring - determines whether your IT practices are being implemented in the early developmental stages

•Disaster Recovery/Business Continuity Planning - assists in developing and maintaining a comprehensive plan to recover quickly from a disaster and to resume business operations efficiently

•Risk Assessments (Privacy & Security) - analyzes risk related to assets, operations, or specific processes and functions

•Awareness & Organizational Planning - ensures networks are effectively protected and properly maintained

•Policy & Procedure Development - assists in drafting Information Security policies and procedures that align with corporate strategy, regulatory standards, legal compliance, and industry best practices


Certification & Accreditation

Our C&A activities test your systems abilities to meet government regulations, including

• Federal Information Security Management Act (FISMA)

•DoD Information Assurance Certification & Accreditation Process (DIACAP)

•Federal Information Processing Standard (FIPS) 140-2 & 140-3

•National Institute of Standards & Technology (NIST) 800 Series

•And other mandates driven by industry


Vulnerability Management Program

Our vulnerability management program begins with initial internal and external assessments. We provide detailed analysis and recommendations to ensure compliance with network best practices and regulatory guidelines.

•Vulnerability Assessments - Internal and/or external assessments conducted to determine where your network, systems, applications, and users stand in regards to their integrity and reliability.

•Security Management & Monitoring

  • Network Monitoring and Analysis – We use the latest tools and technology to monitor and
    analyze your network traffic

  • Risk Assessments - provide a review of IT systems and applications to determine the level and scope of risk as well as the effectiveness of current controls. We provide a detailed report with recommendations to ensure that all risks are properly identified and mitigated.

  • Penetration Testing - serves as an active analysis of the system for any potential vulnerabilities that could result from poor, improper system configuration or weaknesses


Home | About | Services & Solutions | Company News | Contact Us
QuestTech Systems © 2004