Concordant provides cyber security planning and operations. Our process identifies risks, assesses potential impact, and develops executable solutions to protect customer operations and assets.
Concordant follows defined Security Assessment procedures for implementing assessment activities consistent with federal risk management frameworks, guidelines, directives, orders, and laws.
- National Institute of Science and Technology (NIST) Risk Management Framework (RMF)
- Federal Information Security Modernization Act (FISMA)
Our services include:
- Security and assessment planning
- Governance, risk, compliance, auditing, and certification
- Network security architecture and engineering
- Threat & vulnerability management
- Identity and access management
- Continuous diagnostic and mitigation (CDM)
- Network traffic analysis and traffic-based monitoring
- Zero Trust evaluation and implementation
- Cloud security
- Threat hunting
- Penetration testing