Home > Solutions
System Monitoring
Talino understands that the job of providing security for an information system is one that is never complete until that system is decommissioned. Once an information system has been certified and accredited, the system must be diligently monitored for events that may compromise the system: new vulnerabilities are identified; modifications are required for the system; personnel and operational requirements change. For this reason, Talino's Information Assurance (IA) experts are fluent in the steps necessary for monitoring and sustaining an accredited system's security posture. Some of the services we offer for System Monitoring include:
As changes are made to systems, we keep security and procedural documentation current.
Talino can provide qualified personnel to fill many of the required IA roles needed in order to keep your system accredited. Talino has personnel that satisfy the Level III certification requirements.
We keep track of the accredited hardware, software, and network profiles and ensure that changes take place according to a standardized and accepted change control process. We perform periodic configuration audits to ensure that only approved hardware, software, and network configurations exist on the accredited system.
We actively monitor IA Vulnerability Alerts (IAVA) by watching for relevant vulnerability announcements and ensuring that notifications and corrections are performed quickly and according to established change control procedures.
We perform periodic IA audits on accredited systems - scanning systems, reviewing system configurations, and reviewing IA policies - to ensure that they continue to meet DIACAP standards.