Click here

Past Performance

Client : DoD Organization

Problem

An agency’s network and customer base had grown at an incredible pace. In response to both demand and increased mission requirements, this organization sought Zeneth’s support for both the near and long term to establish a more mature cybersecurity program.

Solution

Zeneth helps maintain the organization’s enterprises security posture to meet its mission to proactively protect, detect, react, and recover its networked systems and services from the cyber threat; build in cyber resiliency; and train personnel on cybersecurity.

Services

Secure Mobility

Zeneth enables our client to take advantage and minimize risk posed by mobile devices by performing the following tasks:

  • Build secure coding guidelines around emerging technologies that are lacking standards and security practices.
  • Analyze security gaps within existing mobile operating systems that could hinder existing consumer and corporate mobile solutions.
  • Define, review, and enforce information security policy, standards, and guidelines for mobility operations and technology implementation.
  • Analyze security gaps within existing third-party and open-source mobile technologies and frameworks that lack standard validation methodologies and incorporate remediation practices to reduce risk posture of products and assets.

Cloud Security

Zeneth is conducting ongoing research activities on the engineering and implementation of systems and applications in the cloud to ensure compliance with DoD security standards. We provide research and analyze recommendations, make security-related changes to systems, and develop and maintain the security documents. Our team works with testers, engineers, and developers to ensure NIST and other guidelines are applied to the system.

Results

Zeneth worked with the client to expand its security architecture to meet the growth of the organization’s user base. In parallel, Zeneth tuned the security devices in their operations center to improve the quality of alerts generated by each device to reduce the amount of false positives—which translates into improved efficiency of the tier 1 and tier 2 analysts. Zeneth also modified and optimized the threat intelligence dashboards to improve the contextual information and identify threats in a much more efficient and expedient manner.

Client : A federal civilian agency focusing on safety and compliance for critical infrastructure in healthcare.

Problem

A federal agency responsible for safety and health requested support to revamp their information security program and bring it into compliance with a variety of federal and agency-specific regulations and policies.

Solution

Zeneth implemented an agile project management approach to tackle the competing objectives of continuing the day-to-day operations of the security program while designing and implementing new processes, documentation, and technology to bring the security program in line with current federal and agency requirements.

Services

Results

  • All systems in the environment had the proper security controls in place, and were able to receive authorization to operate (ATOs).
  • Improved the situational awareness of the security program by implementing a vulnerability management capability.
  • Reduced the number of Plans of Actions and Milestones (POAMs) by 80%.

Client : A federal government agency in the financial services sector.

Problem

An agency’s security program needed to expand its scope to cover the entire enterprise to improve the effectiveness of the program. They needed a solutions provider to implement standard practices across the various programs and offices located throughout the country.

Solution

Zeneth developed the enterprise security operating procedures, migrated the agency from NIST 800-53 Revision 3 to Revision 4, and refined and standardized the control selection process for the agency. Zeneth developed a process to capture key security metrics from across the entire security program to provide management with situational awareness and measure the effectiveness of controls. Zeneth also architected the Security Operations Center (SOC) by deploying and configuring network security devices to include a SIEM tool, and architecting the vulnerability scanning platform to cover the entire enterprise.

Services

Results

Zeneth improved their security posture by:

  • Improving visibility by deploying a combination of open-source and COTS security devices, which allowed our SOC team to detect and respond to threats that were previously undetected.
  • Reduced the amount of time it takes to perform vulnerability scans by 95%.
  • Helped standardize policies and procedures across the enterprise, reducing the number of (POAMs) older than 18 months by 100%.