Intelligent Questions. Intelligent Answers.

The threat envelope has widened and new vectors must be addressed across people, processes, and networks.

We take an integrated approach to building and managing healthy security environments for our clients.

If you’re ready to transform your cybersecurity posture, CAS Severn can help you plan, build, and manage an integrated and proactive strategy that will protect, detect, prioritize, respond, address, and control security breaches. The team of highly experienced professionals has successfully implemented security solutions for organizations of all sizes, including education, healthcare, and state, and federal government.

Consulting and Professional Services


IBM Trusteer helps organizations seamlessly establish identity trust across the omnichannel customer journey. Through cloud-based intelligence, backed by AI and machine learning, Trusteer provides a holistic platform to help you welcome in new and existing customers, while protecting against malicious users. The full lifecycle of customer engagement, from onboarding to daily productive use, is now an omnichannel process. While there are great benefits to offering services in a completely digital fashion, it can leave organizations more susceptible to identity-based threats. The challenge becomes knowing if new and existing customers are truly legitimate, without creating a painful user experience.


IBM Cloud Identity helps you secure user productivity with cloud-delivered Single Sign-On (SSO), multifactor authentication, and identity governance. It comes with thousands of pre-built connectors to help you quickly provide access to popular SaaS apps; and pre-built templates to help integrate in-house apps.

  • Cloud Identity Verify includes authentication as a service and a subset of the features that are available in the Cloud Identity Connect
  • The Cloud Identity Connect subscription includes all of the Cloud Identity features except for conditional access and two-factor authentication


If your organization is like most, you have a diverse mix of endpoints, desktops, laptops, servers, point-of-sale devices and more, connecting to your corporate network. Only a handful of these endpoints run on the same platform. We see many organizations with multiple point solutions performing different tasks on different devices, like asset discovery, patching, software usage and OS deployment. CAS Severn can help you secure your organization’s endpoints from laptops, desktops and servers to point-of-sale devices, ATMs and kiosks, including 90+ platforms and operating systems with scalable and comprehensive solutions for today’s distributed networks.


IBM and Carbon Black have partnered to design an integrated offering, which links Carbon Black’s endpoint activity data with public common vulnerabilities and exposures databases to deliver a prioritized list of actively exploited vulnerabilities that’s tailored to each organization. Combining IBM BigFix and Carbon Black lets security professionals identify and patch the endpoint exploits that are most threatening to their particular organizations. This process increases enterprise-wide visibility and speeds response time.

The integration also uses IBM QRadar which, together with BigFix, provides threat prioritization of vulnerabilities at network level. The IBM BigFix and Carbon Black integration allows administrators to deploy a full endpoint security solution to detect, contain, investigate, and remediate security threats and attacks on endpoints across the enterprise.


CAS Severn helps clients safeguard critical data wherever it resides, across a full range of environments – from databases to big data, cloud, file systems, and more with a step-by-step, holistic strategy to data security and governance using IBM Security Guardium and Key Lifecycle Manager.

IBM Security Guardium is a comprehensive data security platform that provides a full range of capabilities: discovery and classification of sensitive data; vulnerability assessment; data and file activity monitoring; and masking, encryption, blocking, alerting and quarantining to protect sensitive data.


Managing identities and access privileges is at the heart of solving any security issue. IBM’s Identity Access Management (IAM) products and services help customers define their identity governance strategy, centralize identity management, and reduce cost associated with user provisioning and access management. IAM products also audit, monitor and report on user compliance with acceptable use policy.

Privileged Identity Manager provides a single integrated product that helps thwart insider threats by protecting and tracking the use of user credentials with elevated access privileges.


IBM Resilient Incident Response Platform (IRP) is the leading platform for orchestrating and automating incident response processes. IBM Resilient IRP quickly and easily integrates with your organization’s existing security and IT investments. The CAS Severn cybersecurity experts can help you go from hours to minutes in responding to emerging threats.


MaaS360 is a comprehensive enterprise mobility management platform that enables apps and content with trust on any device anytime, anywhere, by delivering mobile security for the way people work. Whether you need basic mobile device management or are looking to support the full gamut of iOS, MacOS, Android, and Windows, CAS Severn can help you secure your mobile workforce.


CAS Severn works with clients to protect the integrity of their network and data. We work with hardware and software partners to create the most secure solutions for targeting threats and stopping them from entering and spreading on networks. Feature partners include:

Forcepoint: Network security is an ongoing challenge as organizations become more distributed, applications move to the cloud and threats rapidly evolve. Forcepoint protects your enterprise’s datacenters, edges, branch offices, cloud networks and the people that use them with the world’s best network security solution while saving you valuable time and resources.

Cisco Enterprise Network Security: Integrates security into the Cisco Digital Network Architecture (Cisco DNA) to provide one trusted architecture. The solutions enable you to deepen the level of your network intelligence; give simple, centralized access control across your network; and provide comprehensive automation to streamline your tools and process to reduce risk, cost and complexity.


Over the past decade, we’ve partnered with clients, fortifying our cyber security defenses, and the ransomware attackers keep coming up with novel ways to defeat the castles and moats we have built. Now all our clients are building out their Recovery Strategy – empowering themselves NOT to pay the ransom and recover their environment promptly, minimizing impact to the business in the event of a security incident. 

CAS Severn has been a leader in backup and recovery for over 20 years and works with every leading platform in the space to ensure YOU are ready for the next zero-day incident.

Whether it’s simply adding un-editable (i.e., immutable) data copies or creating a completely automated incident response and recovery architecture – we are here to enable you to have best-in-class tooling to ensure you can recover WHEN Ransomware hits your organization. 

In addition, we are consulting with customers to help comply with new Cyber Liability Insurance requirements, which are updated every week, and provide guidance to government and education clients on obtaining funding for these cybersecurity improvements.  


IBM QRadar: The most intelligent, integrated and automated SIEM system in the industry, and recognized as a leader by multiple independent analyst firms, IBM QRadar provides value before, during and after an attack because it incorporates behavior and context. This means better security profiling, advanced detection and complete forensics. IBM QRadar leverages the threat intelligence expertise of the IBM X-Force dynamic database to provide a preemptive approach to security with early threat detection, forensic analysis, log management, and vulnerability management.

Splunk: Named a Leader in 2017 Gartner Magic Quadrant for SIEM for the fifth straight year, Splunk Solutions transform machine-generated data into valuable insights that can help make your business more productive, profitable and secure. It’s the easy, fast, and secure way to search, analyze and visualize the massive streams of machine data generated by your IT systems and technology infrastructure—physical, virtual and in the cloud. The leading platform for real-time operational intelligence, you can troubleshoot application problems and investigate security incidents in minutes instead of hours or days, avoid service degradation or outages, deliver compliance at lower cost and gain new business insights.


We understand what compliance means for your business. Our team of experts are well versed on the following:

  • COBiT: Control Objectives for Information and related Technology
  • CIS: Center for Internet Security
  • DISA: Defense Information Security Agency
  • DOD 8500.X: Department of Defense
  • FISMA: Federal Information Security Management Act
  • GDPR: General Data Protection Regulation
  • HIPAA: Health Insurance Portability and Accountability Act
  • HIPAA HITECH: Health Information Technology for Economic and Clinical Health
  • ISO: International Standard Organization 2700X
  • ITIL: IT Infrastructure Library
  • NERC: North American Electric Reliability Corporation
  • NIST: National Institute of Standard 800-53
  • PCI: Payment Card Industry
  • SSAE 16 (SAS70): Statement Standards for Attestation Engagements
  • SOX: Sarbanes Oxley
  • TOGAF: The Open Group Architecture Framework


CAS Severn has developed an integrated demonstration of multiple security products that work in tandem and mirror a typical organization’s environment. The security platform is anchored by IBM’s QRadar SIEM toolset.

Demonstrations cover the primary security domains integrated within QRadar:

  • SIEM: QRadar SIEM, QRadar Log Manager, QRadar Vulnerability Manager
  • EndPoint: BigFix (Compliance, Inventory, Core Protection, LifeCycle), MaaS360, Carbon Black
  • Application: AppScan
  • Data: Guardium Suite (DB Access Manager – File Activity Manager)
  • Network: IPS/XGS, ForeScout, QRadar Vulnerability Manager, QRadar Risk Manager

Have a specific question or project you’d like to discuss with an expert? Send us a note or just give us a call at 800.252.4715.