ics corporate overview presentation · corporate overview. ... juniper, microsoft, vmware, citrix...
TRANSCRIPT
Welcome to ICS, Inc.About Integrated Computer Solutions
About ICS Integrated Computer Solutions, Inc. provides security-focused IT
solutions to proactively protect enterprises against threats to their business, customers, information and employees.
Utilizing proven consulting methods, proprietary processes and industry best practices, ICS provides military-grade information security and technology to organizations of all sizes and across all major industry verticals.
We specialize in helping organizations: • Decrease Information Security Risk Exposure • Boost Productivity • Make Smarter Infrastructure Investments
Welcome to ICS, Inc.About Integrated Computer Solutions
Founded 1997
Headquarters Montgomery, Alabama
Project Sites Montgomery, Alabama; Tallahassee, Florida; Denver, Colorado; Mechanicsburg, Pennsylvania; San Antonio, Texas
Employees • Heavily degreed and professionally trained • 100% hold one or more industry certifications • 70% with security clearances
Solutions • Risk Assessment • Business Continuity | Disaster Recovery • Technical Security • Solutions Management • Incident Response | Forensics • Staff Support | Augmentation • Project Management
• Information Assurance • Advisory & Assistance Services • Network Operations • Enterprise Computing Services • Network Protection Services: Offense | Defense | Operations
Performance Management •Project-Based Cost Accounting System •Project Management Methodology with Earned Value Management
Industry Partners • Unisys • ASI • Juniper • Safend • Riverbed
• Utimaco • Bluecoat • CA • HP/EDS
Welcome to ICS, Inc.About Integrated Computer Solutions
Streamline information & technical security efficiency efforts. The ICS team of skilled information security and technology professionals
understands the complexities involved with protecting critical enterprise information and maximizing efficiencies.
Leverage the best in the business. ICS places heavy emphasis on certification of our consultants and
managers. Most of our consultants hold multiple industry certifications, such as CISSP, CBCP and CISA; and technical certifications from vendors like Cisco, Juniper, Microsoft, VMWare, Citrix and others. Many of our consultants hold federal security clearances, and PMI-certified project managers are involved in delivering client solutions.
Maximize information security ROI. Many of the costs associated with information security can be reduced
simply by taking a systematic and proactive approach and working with qualified professionals that are security-focused. Let ICS show you how to maximize the return on your enterprise security investment.
Breadth of Knowledge ICS consultants are experts in multiple subject matter domains, and hold key industry credentials,such as CISSP, CBCP, PMP, ITIL, and CHS-III.
Security-Focused ICS has always been focused on enterprise technology and security services, and has exceptionally strong past performance references.
Successful Delivery ICS incorporates our Project Management Methodology (PMM) led by Project Management Professionals (PMP’s) to ensure all projects are delivered on time and on budget.
Cost-Competitive Security-focused IT solutions from ICS provide a balance of cost and quality, enabling our clients to maximize their return on IT investments.
Expert Advisors ICS employees are in-demand public speakers, frequently published in industry and trade journals.
The Need for Security-Focused, Business-MindedInformation Technology Security Solutions
DID YOU KNOW:
• 93% of organizations that have lost IT for more than 9 days reported bankruptcy within 12 months; 50% of these were bankrupt immediately.*
• 46% of businesses that suffer downtime estimate the cost of lost revenue exceeds $50,000, and 28% estimate it to be more than $250,000.**
• Of the 350 businesses operating in the World Trade Center before the Feb. 26, 1993, bombing, 150 were out of business a year later. For many, the reason was that they simply could not re-enter the building for several days after the attack.**
*National Archives & Records Administration **IDG Research Services Study of 215 CIOs and CSOs, 2007
“Small businesses that don’t have a plan in place generally don’t survive after a disaster, whether it’s a flood or a tornado. We see that anywhere from 40-60 percent of those that are hit like that simply don’t come back to business.”
David Paulison, former executive director of the Federal Emergency Management Agency (FEMA)
From: Experts Say Small Firms Lag In Disaster Planning, NU Online News Service, Nov. 11 2009
The Need for Security-Focused, Business-MindedInformation Technology Security Solutions
30-Day Data Loss Snapshot, October 2009*
In today’s e-business environment, worms, viruses and other highly sophisticated threats, both natural and man-made, have an increased potential to devastate operations.
Welcome to ICS, Inc.A Comprehensive Approach to IT Security
CyberSecurity | Technology Consulting | Application Services | Staff Augmentation
At ICS, we pride ourselves in our unique ability to integrate comprehensive strategy and cutting edge security into information operations.
As the information age advances by leaps and bounds, it is imperative that your organization take a proactive, holistic approach to information operations. By leveraging our comprehensive strategy of integrating information security tenets into every aspect of IT service delivery, your organization will be armed with the technology, processes and policies necessary to win the ever-evolving battle to ensure the continuous availability and integrity of your organization’s information.
Welcome to ICS, Inc.A Comprehensive Approach
Policy & Planning • Business Continuity • Continuity of Operations • Disaster Recovery Planning • Incident Response Planning • Policy development
Response • Incident Response • Forensics • Business Continuity Testing • Continuity of Operations Testing • Disaster Recovery Plan Testing
Audit & Assessment •Risk Assessment •Vulnerability Assessment •Penetration Testing (Pen Testing) •Web Application Assessment •Code review
CYBERSECURITY SERVICES CyberSecurity services from ICS, Inc. includes Policy & Planning services, risk assessment, web application assessments, code review, incident response and forensics.
Welcome to ICS, Inc.A Comprehensive Approach
Effective Business Continuity Planning will help ensure the security of your staff, visitors, and operations in the event of a crisis. In just 60 days, ICS will have your organization prepared to continue operations in virtually any unplanned event – from a minor interruption to a major disaster.
ICS’ certified business continuity planners will help your organization develop appropriate resilience strategies, recovery objectives, business continuity, and crisis management plans. These plans can be implemented in collaboration with an integrated and comprehensive risk management initiative for maximum efficacy.
ICS Business Continuity: •Federal Emergency Management Agency (FEMA) and US Guidelines (FCD-1 and CGC1) •ISO 22301 Business Continuity Management Systems •ISO 27031 Information Technology (Business Continuity) •National Fire Protection Standard (NFPA 1600: Standard on Disaster/Emergency Management and Business Continuity Programs)
CYBERSECURITY SERVICES Business Continuity / Continuity of Operations Planning
Plan Development | Business Impact Assessment (BIA) | Gap Analysis Studies | Hazard Analysis Studies Plan Testing | Alternate Site Operations Planning | Knowledge Transfer/Staff Training
Welcome to ICS, Inc.A Comprehensive Approach
Business Continuity Plan (BCP) testing will help validate your existing BCP/COOP plan to ensure the security of your staff, visitors, and operations in the event of a crisis.
ICS’ certified business continuity planners will assess your organization’s resilience strategies, recovery objectives, business continuity, and crisis management plans. Consider it like a fire drill. Following the BCP/COOP test, you will have a clear understanding of your plans strengths and weaknesses, and will be able to make adjustments BEFORE an emotionally significant event occurs.
If you do not already have a Business Continuity or Continuity of Operations Plan, ICS can create one for you.
CYBERSECURITY SERVICES Business Continuity / Continuity of Operations Plan Testing
Welcome to ICS, Inc.A Comprehensive Approach
Would your organization be able to continue critical business functions following a significant unplanned disaster? Or would an unexpected natural disaster or political event shut down operations entirely? Disaster Recovery Planning allows an organization to establish steps to continue operation at planned levels of service, despite events or interruptions.
Today’s political and environmental climate requires that an organization be prepared for just about anything. ICS utilizes time tested Disaster Recovery Planning methods based on the standards established by the Disaster Recovery Institute International. We combine these industry standard best practices with our own proven proprietary processes in Disaster Recovery Planning to allow business operations to resume following virtually any unplanned event.
Services Include: •Strategic Recovery Planning/Development •Backup and Recovery Strategy •Selection of Alternate Facilities •Alternate Site Operations Planning •Vendor Alignment •Knowledge Transfer/Staff Training
CYBERSECURITY SERVICES Disaster Recovery Planning
Welcome to ICS, Inc.A Comprehensive Approach
Today’s political and environmental climate requires that an organization be prepared for just about anything. ICS offers disaster recovery plan testing to evaluate an organization’s disaster recovery plan in advance of an event.
We can also evaluate actual disaster response and operations following an unplanned service outage or crisis in order to better position your organization the next time.
Both pre- and post- event evaluations will allow your organization to examine its response and document opportunities for improvement based on time tested Disaster Recovery Planning methods and standards established by the Disaster Recovery Institute International.
CYBERSECURITY SERVICES Disaster Recovery Plan Testing
Welcome to ICS, Inc.A Comprehensive Approach
A Risk Assessment from a qualified IT security firm is like checking the doors and windows on your network. With all of the confidential corporate and customer information in your database, you would never consider leaving those doors and windows open. But beyond the entryways that are easy to see, are there other access points that are not so obvious? Is your network at risk of experiencing a devastating breach?
Our Risk Assessment model delivers both quantitative and qualitative measures of organizational risk, allowing you to optimize your security spend and efficiently allocate resources to maximize business value. We have a 20-year history of delivering Risk Assessments against all major standards including NIST 800-series, ISO, Octave, COBIT, COSO and others.
An Information Security Risk Assessment is a means of examining your organization’s information security infrastructure to identify vulnerable areas in the network and provide steps to secure those weaknesses. Only then will your organization be able to prioritize which areas need to be addressed immediately, which are less urgent, and which ones are not urgent at all.
A Risk Assessment will provide your organization with an objective evaluation of the security of your information infrastructure.
CYBERSECURITY SERVICES Risk Assessment
Welcome to ICS, Inc.A Comprehensive Approach
ICS is available for code review projects with the goal of identifying security issues and weaknesses in the applications’ coding. We are able to conduct a systematic review of applications in scope for code review, which can include in excess of 1,000,000 lines of code.
Examples of programming languages involved are: •.NET 3.5 framework •VB.net •ASP.NET •C# •Javascript
By conducting a static review of application code as it exists at the time of the assessment, we are able to provide an assessment of each application’s architecture from a security perspective as well as remediation recommendations.
CYBERSECURITY SERVICES Code Review
Welcome to ICS, Inc.A Comprehensive Approach
ICS offers forensic services to discover, analyze and document information in both proactive and reactive forensic circumstances. Many of our clients have found this service to be vital during personnel action, court order, civil action, and incident response situations.
Evidentiary Integrity ICS has the knowledge and experience needed to achieve successful electronic evidence and data collection, protect evidentiary integrity, and provide factually accurate supporting documentation. As a technology security firm, we are well-qualified in this field and often provide supporting forensics documentation for clients to present to agencies such as the Department of Homeland Security, the Federal Bureau of Investigation, and state investigation agencies.
Litigation Support and Expert Testimony ICS also provides litigation support with expert testimony in the event of court proceedings or prosecution.
CYBERSECURITY SERVICES Forensics
Welcome to ICS, Inc.A Comprehensive Approach
In the event of an information security emergency, the ICS Incident Response team will step in to help your organization identify the source of the compromise, preserve critical information, and prevent the spread of contamination or unauthorized access to other systems and networks. Our on-site emergency response efforts will not cease until the incident has been eradicated and the systems and networks have been restored to normal operation.
ICS will provide knowledge transfer and reporting so your internal personnel are equipped to maintain protection of your information assets after the event.
Let ICS’ Emergency Response Consultants act as your primary response team.
CYBERSECURITY SERVICES Incident Response (Post-Event)
Welcome to ICS, Inc.A Comprehensive Approach
Organizations that are dependent on information systems are challenged by serious threats that can exploit both known and unknown vulnerabilities in systems. ICS offers incident response and forensics planning services that will allow your organization to have a clearly defined response plan with policies in place should a cyber incident occur.
A cyber incident can compromise the confidentiality, integrity, or availability of information being processed, stored, or transmitted by information systems, resulting in adverse impacts on the organization, its operations, assets, and people. The average cost of a data breach increases by 35% each year, costing unprepared organizations untold millions. A strategic incident response plan can give your organization the policies needed to ensure that an unexpected breach is handled properly and swiftly, while minimizing the potential harm.
A forensics response plan is a traditional component of an effective business continuity /continuity of operations plan.
CYBERSECURITY SERVICES Incident Response Planning
Welcome to ICS, Inc.A Comprehensive Approach
There are risks to your system everywhere, so the best way to keep your network safe is to let us hack it.
Yes, you read that right.
Penetration testing is often referred to as ethical hacking. Our certified ethical hackers take the basic vulnerability assessment a step further, verifying the findings of the vulnerability assessment and the impact a breach could have in your external and internal networks.
When we’re done, we will create a custom solution information security solution, tailored specifically for your organization.
Penetration testing should be performed bi-annually as an integral part of your larger security plan.
CYBERSECURITY SERVICES Penetration Testing (Pen Testing)
Welcome to ICS, Inc.A Comprehensive Approach
Well-established IT policies can help ensure an optimal network environment in which data is stable, secure, and available. Effective IT policies can also help ensure operations continue under adverse situations, such as a natural disaster or other unplanned event.
ICS can work with your organization to create clearly defined IT policies and procedures that provide a framework for treating information as real property to be protected from unauthorized access, modification, intrusion and destruction.
Policy and/or standards development can include items such as the following: •Information Classification •Acceptable Use •Security Awareness and Training
A well-written IT Policy will serve as a best practices handbook for all employees within the organization and encourage their participation in preventing information breaches. These policies will help ensure controls are in place to protect information and will set the tone both internally and externally with regards to the importance of protecting your organization’s information.
CYBERSECURITY SERVICES Policy Development
Welcome to ICS, Inc.A Comprehensive Approach
You can’t fix what you don’t know is broken, and it is impossible to ensure the security of your network without a clear picture of its strengths and its weaknesses. Regularly scheduled vulnerability assessments are an uncomplicated way to uncover potential hazards.
There are countless individuals and entities intent on accessing other organizations’ network resources and data for myriad reasons, and they’re using the latest technology and techniques to accomplish this goal. Without adequate protection, your organization can be easily compromised, resulting in anything from a minor inconvenience to a breach that seriously harms your operations and your bottom line. ICS can guide you through the process to properly safeguard any weak or exposed areas with an internal or external vulnerability assessment
By working with ICS you: •Catalog and prioritize vulnerabilities within your infrastructure •Implement quick, efficient and cost effective remediation solutions, created for your specific needs. •Give your customers confidence by ensuring their information is secure. •Satisfy regulatory compliance requirements.
CYBERSECURITY SERVICES Vulnerability Assessment
Welcome to ICS, Inc.A Comprehensive Approach
A web application assessment is a specific test designed to identify threats of unauthorized access, so you can keep your sensitive information safe and secure no matter how many web-based applications your organization is using.
The goal of the web application security assessment is to identify security issues and weaknesses in the web-based application as installed, configured, maintained, and used in the production environment.
Examples of the types of security issues assessed include: •Input/Output validation (e.g., cross site scripting, SQL Injection) •Application logic flaws (e.g., authentication bypass) •Server configuration errors/versions (e.g., directory traversal, missing patches)
The assessment is a dynamic review of the state of the application and infrastructure security at a point in time. Findings will be reflective of the current state of security. The deliverable will contain detailed information based on NIST 800-53, and will include the vulnerabilities discovered, the number of vulnerabilities, and detailed remediation recommendations.
CYBERSECURITY SERVICES Web Application Assessment
Welcome to ICS, Inc.A Comprehensive Approach
Network Design & Planning Well-designed network
architecture can greatly improve workflow, while allowing for future growth. ICS offers guidance in Network Design and Planning that will help ensure your network is built to last.
Executive Strategic Support An organization facing the
departure of a top executive is vulnerable in many ways, but yours does not have to be. ICS offers strategic executive staffing that will give your organization the support it needs to help ensure a smooth transition.
Vendor & Technology Evaluation Our in-depth reviews, vendor evaluations and product testing ensures the hardware, software, and service-based solutions we recommended will perform to your specifications AND save you money.
TECHNOLOGY SERVICES CyberSecurity services from ICS, Inc. includes Policy & Planning services, risk assessment, web application assessments, code review, incident response and forensics.
Welcome to ICS, Inc.A Comprehensive Approach
An organization that is facing the departure of a top executive is vulnerable in many ways, but yours does not have to be. ICS offers strategic executive staffing that will give your organization the support it needs to help ensure a smooth transition.
With ICS executive staffing support, your organization has access to interim executive staffing for roles such as Chief Security Officer, Chief Information Officer, Chief Operations Officer, and other key positions. These roles can be filled on site or in a virtual capacity, providing your organization with the surge capacity for projects, a consistent focus on strategic initiatives, flexible budgetary control, and adaptability to changes in priorities.
Additionally, many organizations need the expertise of a CISO, CIO, or IT Security expert but may not need someone 40 hours a week. ICS can help. ICS’s experts will work with your organization to provide the level of support your organization needs from 10 hours to 40 hours a week. This unique solution enables your organization to enjoy all the benefits of a highly qualified CISO, CIO, etc. without the expense of a full-time resource.
TECHNOLOGY SERVICES Executive Strategic Support
Welcome to ICS, Inc.A Comprehensive Approach
Having a well-designed enterprise network architecture can greatly improve organizational workflow, while allowing for future growth. ICS can offer guidance in the Network Design and Planning phase that will help ensure your network is built to last.
A well-designed network optimizes CapEx, OpEx and security tradeoffs to align with your risk appetite. ICS can create templates based on network design best practices that will increase efficiency, reduce errors and improve compliance standards for your organization. We will ensure your Network Design architecture allows for security, expansion and future overlay of new assets and applications.
TECHNOLOGY SERVICES Network Design/Planning
Welcome to ICS, Inc.A Comprehensive Approach
Vendor and Technology Evaluation Process •Requirements Definition Phase: During the first phase of the vendor and technology evaluation process, ICS will conduct an in-depth review of your organization’s needs, which will enable us to facilitate the most appropriate hardware, software, or service-based solutions. •Market Scan Phase: Phase two is the market scan phase. We will compile a list of available solutions/products that meet your needs and will begin pricing negotiation on your behalf. Once a vendor is chosen, we will begin the pilot test phase. •Pilot Test Phase: The pilot test phase allows us to test the most viable product(s) for your needs before they are implemented in the live environment. This helps ensure all potential problems or glitches are identified and resolved prior to deployment. •Implementation Phase: In the implementation phase, ICS is available to install and deploy the selected technologies into your network environment. We will conduct knowledge transfer, so your staff will have a full understanding of the products and any required maintenance plans. •ICS makes network security less complicated—and less expensive—by tailoring a program of security hardware and software solutions to meet the specific needs of your information infrastructure.
TECHNOLOGY SERVICES Vendor & Technology Evaluation
Welcome to ICS, Inc.A Comprehensive Approach
Application Development ICS has the ability to design and
implement custom applications and enhance legacy applications for commercial, public sector, and federal clients to help your organization enhance business processes and increase operational efficiency.
Legacy Modernization ICS understands the challenges
that can come with taking old applications to new platforms, and we offer software automated solutions that can significantly reduce both the time and budget needed to achieve the results you expect.
Application Maintenance & Support Is your IT team bogged down with application sustainment activities, leaving little time for activities that drive the business forward? Do you lack the internal resources to efficiently implement changes to your custom apps? It may be time to contact ICS.
APPLICATION SERVICES Application Services from ICS, Inc. includes application development, application maintenance & support, and legacy modernization.
Welcome to ICS, Inc.A Comprehensive Approach
ICS has a wide range of experience in application development, sustainment, modernization and support. Not only can we design and implement custom applications to enhance business processes and increase operational efficiency, but we are often able to save our clients money by enhancing legacy applications–both standard and proprietary.
Our team of IT professionals are proficient in technologies such as Java, Oracle, J2EE, .asp, and more. In addition, ICS utilizes a time-tested, proprietary project management methodology (based on PM-Bok) to deliver projects on-time, in-scope, and on-budget. In fact, ICS’ Forge.Mil program and the Quality Management group at ICS have been appraised at Level 3 of the CMMI Institute’s Capability Maturity Model Integration (CMMI)®.
Application Development Services Include: • Application Design, Integration, Migration • Application Sustainment, Maintenance and Support • Web Application Development • Legacy Application Enhancements and Support • eCommerce Application Development
APPLICATION SERVICES Application Development
ICS provides clients the assurance that the applications that we develop and manage will be built on state of the art platforms and secure from ever-evolving security threats.
Welcome to ICS, Inc.A Comprehensive Approach
Do you lack the internal resources to efficiently implement changes to your custom apps? Or has your business need evolved beyond the functionality of your legacy applications? ICS performs IT sustainment, integration, migration, and elements of Tiers 1, 2, and 3 support legacy and modernized systems. We also deliver application services integration and deployment activities in development, test, pre-production and production environments, executes regression testing and employs in-depth knowledge of security requirements.
We approach every project with information security in center focus. Experienced in all aspects of information security, infrastructure requirements, and development platforms, ICS is able to shore up areas vulnerability within your standard and/or proprietary applications.
Through our collaborative approach to application sustainment, we will join forces with your staff to gain a thorough understanding of the application requirements, integration components, and compliance needs in order to optimize your application’s usefulness for your organization.
APPLICATION SERVICES Application Maintenance and Support
Welcome to ICS, Inc.A Comprehensive Approach
Legacy modernization can be a very costly and time intensive process, but it doesn’t have to be. ICS understands the challenges that can come with taking old applications to new platforms, and we offer software automated solutions that can significantly reduce both the time and budget needed to achieve the results you expect.
ICS uses a technology suite that allows us to simplify modernization efforts in systems containing multiple applications and multiple languages, even when they are connected to multiple databases. Our turnkey modernization solution means your team doesn’t have to be bogged down for months updating business systems.
Primary modernization benefits include: • Rapid redevelopment of legacy code • Project scalability • Delivery of high quality code and SOA with clear documentation
APPLICATION SERVICES Legacy Modernization
Welcome to ICS, Inc.A Comprehensive Approach
Staff Augmentation ICS can supply your organization with the flexibility
and expertise necessary to meet even the most complex project and business goals. Our information technology and security consultants offer practical and affordable staff augmentation for both long and short term assignments.
Staff Recruitment Clients across the United States depend on Integrated Computer Solutions for information technology search services. ICS delivers only top-quality, highly-trained candidates to your organization in as little as ten business days.
STAFF AUGMENTATION SERVICES ICS can supply your organization with the flexibility and expertise necessary to meet even the most complex project and business goals through staff recruitment and staff augmentation services.
Welcome to ICS, Inc.A Comprehensive Approach
ICS can supply your organization with the flexibility and expertise necessary to meet even the most complex project and business goals. Our information technology and security consultants offer practical and affordable staff augmentation for both long and short term assignments.
By providing specialized technical staff support and staff augmentation to meet changing business demands, ICS offers your organization the best of both worlds: dedicated support and flexible cost control. Using dedicated resources from ICS to achieve defined objectives, in a sustained manner provides the momentum necessary to accomplish and maintain important strategic goals.
You organization is always in control of the scope, timing, and cost of each project. This gives you more flexibility in the timing of expenditures, resource availability, and balancing competing internal priorities.
Among the many benefits of this support model are: •Surge capacity for projects •Consistent focus on strategic initiatives •Flexible budgetary control
STAFF AUGMENTATION SERVICES Staff Augmentation
Welcome to ICS, Inc.A Comprehensive Approach
ICS is a leader in the information technology field, and our recruiters are armed with an in-depth understanding of the complexities of the IT industry. We are equipped to provide you with expert IT professionals with key industry credentials, such as CISSP, CBCP, PMP, ITIL and CHS-III, who can quickly and effectively deliver technology solutions and support to your organization.
Our placement practices ensure a synergistic fit, saving both time and money by reducing turnover and additional recruiting efforts.
IT RECRUITMENT PROCESS •STEP 1: Needs AssessmentSTEP 2: Candidate Identification •STEP 3: Screening Process •STEP 4: Candidate Presentation •STEP 5: Team Integration
Average time for recruitment process: 10 business days
STAFF AUGMENTATION SERVICES Staff Recruitment
Welcome to ICS, Inc.Business & Industry Spectrum
Commercial Sector ICS’ commercial sector clients include major financial institutions like
Regions Bank and Regulus. We support private educational institutions across the United States as well several insurance companies and healthcare clients.
Public Sector ICS consultants stay abreast of current legislative requirements, regulatory
compliance issues and standard industry best practices to meet the specialized information security needs of public sector agencies.
Federal Government, DoD ICS has a long history of serving our DoD and civilian federal clients. Nearly
75% of our employees are cleared, up to Top Secret, and our headquarters office has a Top Secret facility clearance.
Security-Focused IT Solutions from ICS suit a broad client base Federal, State & Local Government | Utilities | Finance | Insurance | Healthcare | Education Systems
Welcome to ICS, Inc.Business & Industry Spectrum
A Standard of Excellence Through years of experience running global datacenters, enterprise systems
management, global networking, and storage and application support, ICS can help prevent problems before they happen and give you back control of your information technology operations. It’s what we do best.
Our extensive client list includes:
Federal Government • Department of Defense • DISA • US Air Force • US Navy
Public Sector • Florida Senate • Lee County Port Authority • Montgomery Water Works • Georgia Technology Authority • Tennessee Department of Labor • State of Alabama
Education • Miami Dade College • Mississippi State University • Troy University • Tuskegee University
Healthcare • Baptist Health • North Florida Medical Centers
Finance • Choicepoint • Regions Bank • Regulus
Manufacturing • Mack Trucks • Rheem • ThyssenKrupp Steel USA
Insurance • Blue Cross Blue Shield of AL
Retail • Publix Super Markets, Inc.
Services • Verizon Federal, Inc. • Unisys
Information Security Solutions for thePUBLIC SECTOR
A Specialized Team In the rapidly changing world of e-government, public sector agencies have an
increasing need for information technology support that will provide the agility necessary to anticipate change and respond to it proactively. Is your agency consistently challenged to:
...meet increasing legislative requirements? ...maintain regulatory compliance? ...combat new information security vulnerabilities? ...provide increasing levels of service? ...manage ever-tightening budgetary constraints?
Achieving Efficiency ICS consultants stay abreast of current legislative requirements, regulatory
compliance issues and standard industry best practices to meet the specialized information security needs of public sector agencies. You can rest assured that ICS has what it takes to secure your critical information infrastructure and assure compliance while increasing enterprise network efficiency.
With new information security threats being discovered daily, the challenge to meet stringent regulatory compliance demands is becoming increasingly difficult.
Fortunately, there’s ICS. With a legacy in providing military-grade security to federal, state and local government, ICS is adept at providing secure IT solutions that meet the highest technical and policy standards.
Information Security Solutions for thePUBLIC SECTOR
Our Public Sector clients include: Alabama • Dept of Finance, Information Services Division • Dept of Industrial Relations • Dept of Mental Health • State Courthouse • State Personnel Board • State Treasury Department • Water Works & Sanitary Sewer, Montgomery • Alabama A&M University • Auburn University, Montgomery • Jacksonville State University • Tuskeegee University • University of South Alabama
Arkansas • Employment Security Department
California • Community Health Agency, Riverside County
Delaware • Office of Information Technology Services
Georgia • Georgia Technology Authority
Florida • Agency for Workforce Innovation • City of Sanibel • Enterprise Information Technology Services • Dept of Children & Families • Dept of Environmental Protection (DEP) • DEP Waste Management Division • Dept of Management Services • Dept of Revenue • Dept of State • Florida Senate • Hillsborough County Aviation Authority • Lee County Port Authority • Office of the State Courts Administrator • Miami Dade College • Tallahassee Community College • Tallahassee Board of Education • University of Florida
Mississippi • Mississippi State University Tennessee • Department of Labor & Workforce Development
Information Security Solutions for thePUBLIC SECTOR
Available Contract Vehicles
STATE OF ALABAMA • Statewide IT Consulting Services
STATE OF DELAWARE • Statewide Cyber Services Contract
STATE OF FLORIDA • Statewide IT Consulting Services
• Statewide Project Management Services
• Statewide Risk Assessment Contract
STATE OF GEORGIA • Statewide Business Continuity Planning Services Contract
STATE OF MISSISSIPPI • Statewide IT Consulting Services
STATE OF NORTH CAROLINA • Statewide Encryption Software Contract
Network Security Support so you can focus on what
really matters: The Business of Government
Information Security Solutions for theCOMMERCIAL SECTOR
Securing Your Business Integrated Computer Solutions, Inc. is a security-focused information technology
solutions provider. We supply five-star, military-grade information security and technology services to large state, national and global enterprises, and we do it with a proactive approach.
A Proactive Approach Integrated network security solutions from ICS will not only help enable your
organization to decrease information security risk exposure and boost productivity, but they can also help you to maximize your current IT resources and make smarter infrastructure investments.
Through years of experience running global datacenters, enterprise systems management, global networking, and storage and application support, ICS is equipped to meet your most complex critical information infrastructure challenges.
Information Security Solutions for theFEDERAL GOVERNMENT
ICS is a security focused IT solutions provider with over twelve years of service to our DoD and civilian federal clients providing information assurance, technical, advisory, and operations support services. ICS is unique in the market because we also have a long track record of providing enterprise technology and security services to clients in commercial, public sector and education markets. This brings a fresh perspective and industry best practice to our federal clients.
The ICS Approach ICS leverages our proven project management methodology, project
managers and highly trained consultants to accurately scope, manage and deliver solutions to our clients. Our integrated approach to service delivery results in higher levels of client satisfaction than many of our peers deliver.
Contract Vehicles:
• GSA schedule 70 • US Navy Seaport-e • DISA Encore II • Dept. of Homeland Security EAGLE contract • US Air force Netcents II
Information Security Solutions for theFEDERAL GOVERNMENT
ISO 9001:2000 Certified Our ISO 9001:2000 certification demonstrates our commitment to
quality, repeatable processes with documented policies, procedures and processes that comprise our commitment to product and service quality in all of our activities.
Mature Project Management Methodology (PMM) Our PMM follows Project Management Institute Project Management
Body of Knowledge standards and ensures on-time and on-budget delivery of our services. Our PMM is used on every engagement over 80 hours in duration.
Certified Project Managers (PMI-PMP’s) ICS has a team of certified project managers used to manage our
client projects. Coupled with our project management methodology, project risk is greatly reduced and impacts are identified early in the process. In addition, our application of earned value management (EVM) provides our clients with project status transparency.
Effective Performance Our Forge.Mil program and Quality Management group have been
appraised at Level 3 of the CMMI Institute’s Capability Maturity Model Integration (CMMI®).
Broad Industry Experience ICS has a 10 year history of serving our DoD and civilian federal
clients. However, we also have a deep history of providing enterprise technology and security services to clients in commercial, public sector and education markets. This brings a fresh perspective and industry best practice to our federal clients.
Clearances Nearly 75% of our employees are cleared, up to Top Secret.
Consultant Quality
Our employees are heavily degreed and professionally trained: 40% BS degrees, 10% MS degrees, 3% post graduate degrees