CyberSecurity

Intelligent Questions. Intelligent Answers.

The threat envelope has widened and new vectors must be addressed across people, processes, and networks.

We take an integrated approach to building and managing healthy security environments for our clients.

If you’re ready to transform your cybersecurity posture, CAS Severn can help you plan, build, and manage an integrated and proactive strategy that will protect, detect, prioritize, respond, address, and control security breaches. The team of highly experienced professionals has successfully implemented security solutions for organizations of all sizes, including education, healthcare, and state, and federal government.

Consulting and Professional Services

ADVANCED FRAUD

IBM Trusteer helps organizations seamlessly establish identity trust across the omnichannel customer journey. Through cloud-based intelligence, backed by AI and machine learning, Trusteer provides a holistic platform to help you welcome in new and existing customers, while protecting against malicious users. The full lifecycle of customer engagement, from onboarding to daily productive use, is now an omnichannel process. While there are great benefits to offering services in a completely digital fashion, it can leave organizations more susceptible to identity-based threats. The challenge becomes knowing if new and existing customers are truly legitimate, without creating a painful user experience.

CLOUD IDENTITY

IBM Cloud Identity helps you secure user productivity with cloud-delivered Single Sign-On (SSO), multifactor authentication, and identity governance. It comes with thousands of pre-built connectors to help you quickly provide access to popular SaaS apps; and pre-built templates to help integrate in-house apps.

  • Cloud Identity Verify includes authentication as a service and a subset of the features that are available in the Cloud Identity Connect
  • The Cloud Identity Connect subscription includes all of the Cloud Identity features except for conditional access and two-factor authentication

ENDPOINT MANAGEMENT

If your organization is like most, you have a diverse mix of endpoints, desktops, laptops, servers, point-of-sale devices and more, connecting to your corporate network. Only a handful of these endpoints run on the same platform. We see many organizations with multiple point solutions performing different tasks on different devices, like asset discovery, patching, software usage and OS deployment. CAS Severn can help you secure your organization’s endpoints from laptops, desktops and servers to point-of-sale devices, ATMs and kiosks, including 90+ platforms and operating systems with scalable and comprehensive solutions for today’s distributed networks.

CARBON BLACK AND BIGFIX INTEGRATION

IBM and Carbon Black have partnered to design an integrated offering, which links Carbon Black’s endpoint activity data with public common vulnerabilities and exposures databases to deliver a prioritized list of actively exploited vulnerabilities that’s tailored to each organization. Combining IBM BigFix and Carbon Black lets security professionals identify and patch the endpoint exploits that are most threatening to their particular organizations. This process increases enterprise-wide visibility and speeds response time.

The integration also uses IBM QRadar which, together with BigFix, provides threat prioritization of vulnerabilities at network level. The IBM BigFix and Carbon Black integration allows administrators to deploy a full endpoint security solution to detect, contain, investigate, and remediate security threats and attacks on endpoints across the enterprise.

DATA SECURITY

CAS Severn helps clients safeguard critical data wherever it resides, across a full range of environments – from databases to big data, cloud, file systems, and more with a step-by-step, holistic strategy to data security and governance using IBM Security Guardium and Key Lifecycle Manager.

IBM Security Guardium is a comprehensive data security platform that provides a full range of capabilities: discovery and classification of sensitive data; vulnerability assessment; data and file activity monitoring; and masking, encryption, blocking, alerting and quarantining to protect sensitive data.

IDENTITY ACCESS MANAGEMENT

Managing identities and access privileges is at the heart of solving any security issue. IBM’s Identity Access Management (IAM) products and services help customers define their identity governance strategy, centralize identity management, and reduce cost associated with user provisioning and access management. IAM products also audit, monitor and report on user compliance with acceptable use policy.

Privileged Identity Manager provides a single integrated product that helps thwart insider threats by protecting and tracking the use of user credentials with elevated access privileges.

INCIDENCE RESPONSE

IBM Resilient Incident Response Platform (IRP) is the leading platform for orchestrating and automating incident response processes. IBM Resilient IRP quickly and easily integrates with your organization’s existing security and IT investments. The CAS Severn cybersecurity experts can help you go from hours to minutes in responding to emerging threats.

MOBILE DEVICE MANAGEMENT

MaaS360 is a comprehensive enterprise mobility management platform that enables apps and content with trust on any device anytime, anywhere, by delivering mobile security for the way people work. Whether you need basic mobile device management or are looking to support the full gamut of iOS, MacOS, Android, and Windows, CAS Severn can help you secure your mobile workforce.

SECURITY INTELLIGENCE AND EVENT MANAGEMENT (SIEM)

IBM QRadar: The most intelligent, integrated and automated SIEM system in the industry, and recognized as a leader by multiple independent analyst firms, IBM QRadar provides value before, during and after an attack because it incorporates behavior and context. This means better security profiling, advanced detection and complete forensics. IBM QRadar leverages the threat intelligence expertise of the IBM X-Force dynamic database to provide a preemptive approach to security with early threat detection, forensic analysis, log management, and vulnerability management.

CAS SEVERN COMPLIANCE EXPERTISE

We understand what compliance means for your business. Our team of experts are well versed on the following:

  • COBiT: Control Objectives for Information and related Technology
  • CIS: Center for Internet Security
  • DISA: Defense Information Security Agency
  • DOD 8500.X: Department of Defense
  • FISMA: Federal Information Security Management Act
  • GDPR: General Data Protection Regulation
  • HIPAA: Health Insurance Portability and Accountability Act
  • HIPAA HITECH: Health Information Technology for Economic and Clinical Health
  • ISO: International Standard Organization 2700X
  • ITIL: IT Infrastructure Library
  • NERC: North American Electric Reliability Corporation
  • NIST: National Institute of Standard 800-53
  • PCI: Payment Card Industry
  • SSAE 16 (SAS70): Statement Standards for Attestation Engagements
  • SOX: Sarbanes Oxley
  • TOGAF: The Open Group Architecture Framework

SECURITY DEMONSTRATIONS

CAS Severn has developed an integrated demonstration of multiple security products that work in tandem and mirror a typical organization’s environment. The security platform is anchored by IBM’s QRadar SIEM toolset.

Demonstrations cover the primary security domains integrated within QRadar:

  • SIEM: QRadar SIEM, QRadar Log Manager, QRadar Vulnerability Manager
  • EndPoint: BigFix (Compliance, Inventory, Core Protection, LifeCycle), MaaS360, Carbon Black
  • Application: AppScan
  • Data: Guardium Suite (DB Access Manager – File Activity Manager)
  • Network: IPS/XGS, ForeScout, QRadar Vulnerability Manager, QRadar Risk Manager

Have a specific question or project you’d like to discuss with an expert? Send us a note or just give us a call at 800.252.4715.