ics corporate overview presentation · corporate overview. ... juniper, microsoft, vmware, citrix...

41
Welcome to ICS, Inc. Corporate Overview

Upload: hacong

Post on 21-Aug-2018

237 views

Category:

Documents


0 download

TRANSCRIPT

Welcome to ICS, Inc.Corporate Overview

Welcome to ICS, Inc.About Integrated Computer Solutions

About ICS Integrated Computer Solutions, Inc. provides security-focused IT

solutions to proactively protect enterprises against threats to their business, customers, information and employees.

Utilizing proven consulting methods, proprietary processes and industry best practices, ICS provides military-grade information security and technology to organizations of all sizes and across all major industry verticals.

We specialize in helping organizations: • Decrease Information Security Risk Exposure • Boost Productivity • Make Smarter Infrastructure Investments

Welcome to ICS, Inc.About Integrated Computer Solutions

Founded 1997

Headquarters Montgomery, Alabama

Project Sites Montgomery, Alabama; Tallahassee, Florida; Denver, Colorado; Mechanicsburg, Pennsylvania; San Antonio, Texas

Employees • Heavily degreed and professionally trained • 100% hold one or more industry certifications • 70% with security clearances

Solutions • Risk Assessment • Business Continuity | Disaster Recovery • Technical Security • Solutions Management • Incident Response | Forensics • Staff Support | Augmentation • Project Management

• Information Assurance • Advisory & Assistance Services • Network Operations • Enterprise Computing Services • Network Protection Services: Offense | Defense | Operations

Performance Management •Project-Based Cost Accounting System •Project Management Methodology with Earned Value Management

Industry Partners • Unisys • ASI • Juniper • Safend • Riverbed

• Utimaco • Bluecoat • CA • HP/EDS

Welcome to ICS, Inc.About Integrated Computer Solutions

Streamline information & technical security efficiency efforts. The ICS team of skilled information security and technology professionals

understands the complexities involved with protecting critical enterprise information and maximizing efficiencies.

Leverage the best in the business. ICS places heavy emphasis on certification of our consultants and

managers. Most of our consultants hold multiple industry certifications, such as CISSP, CBCP and CISA; and technical certifications from vendors like Cisco, Juniper, Microsoft, VMWare, Citrix and others. Many of our consultants hold federal security clearances, and PMI-certified project managers are involved in delivering client solutions.

Maximize information security ROI. Many of the costs associated with information security can be reduced

simply by taking a systematic and proactive approach and working with qualified professionals that are security-focused. Let ICS show you how to maximize the return on your enterprise security investment.

Breadth of Knowledge ICS consultants are experts in multiple subject matter domains, and hold key industry credentials,such as CISSP, CBCP, PMP, ITIL, and CHS-III.

Security-Focused ICS has always been focused on enterprise technology and security services, and has exceptionally strong past performance references.

Successful Delivery ICS incorporates our Project Management Methodology (PMM) led by Project Management Professionals (PMP’s) to ensure all projects are delivered on time and on budget.

Cost-Competitive Security-focused IT solutions from ICS provide a balance of cost and quality, enabling our clients to maximize their return on IT investments.

Expert Advisors ICS employees are in-demand public speakers, frequently published in industry and trade journals.

The Need for Security-Focused, Business-MindedInformation Technology Security Solutions

DID YOU KNOW:

• 93% of organizations that have lost IT for more than 9 days reported bankruptcy within 12 months; 50% of these were bankrupt immediately.*

• 46% of businesses that suffer downtime estimate the cost of lost revenue exceeds $50,000, and 28% estimate it to be more than $250,000.**

• Of the 350 businesses operating in the World Trade Center before the Feb. 26, 1993, bombing, 150 were out of business a year later. For many, the reason was that they simply could not re-enter the building for several days after the attack.**

*National Archives & Records Administration **IDG Research Services Study of 215 CIOs and CSOs, 2007

“Small businesses that don’t have a plan in place generally don’t survive after a disaster, whether it’s a flood or a tornado. We see that anywhere from 40-60 percent of those that are hit like that simply don’t come back to business.”

David Paulison, former executive director of the Federal Emergency Management Agency (FEMA)

From: Experts Say Small Firms Lag In Disaster Planning, NU Online News Service, Nov. 11 2009

The Need for Security-Focused, Business-MindedInformation Technology Security Solutions

30-Day Data Loss Snapshot, October 2009*

In today’s e-business environment, worms, viruses and other highly sophisticated threats, both natural and man-made, have an increased potential to devastate operations.

Welcome to ICS, Inc.A Comprehensive Approach to IT Security

CyberSecurity | Technology Consulting | Application Services | Staff Augmentation

At ICS, we pride ourselves in our unique ability to integrate comprehensive strategy and cutting edge security into information operations.

As the information age advances by leaps and bounds, it is imperative that your organization take a proactive, holistic approach to information operations. By leveraging our comprehensive strategy of integrating information security tenets into every aspect of IT service delivery, your organization will be armed with the technology, processes and policies necessary to win the ever-evolving battle to ensure the continuous availability and integrity of your organization’s information.

Welcome to ICS, Inc.A Comprehensive Approach

Policy & Planning • Business Continuity • Continuity of Operations • Disaster Recovery Planning • Incident Response Planning • Policy development

Response • Incident Response • Forensics • Business Continuity Testing • Continuity of Operations Testing • Disaster Recovery Plan Testing

Audit & Assessment •Risk Assessment •Vulnerability Assessment •Penetration Testing (Pen Testing) •Web Application Assessment •Code review

CYBERSECURITY SERVICES CyberSecurity services from ICS, Inc. includes Policy & Planning services, risk assessment, web application assessments, code review, incident response and forensics.

Welcome to ICS, Inc.A Comprehensive Approach

Effective Business Continuity Planning will help ensure the security of your staff, visitors, and operations in the event of a crisis. In just 60 days, ICS will have your organization prepared to continue operations in virtually any unplanned event – from a minor interruption to a major disaster.

ICS’ certified business continuity planners will help your organization develop appropriate resilience strategies, recovery objectives, business continuity, and crisis management plans. These plans can be implemented in collaboration with an integrated and comprehensive risk management initiative for maximum efficacy.

ICS Business Continuity: •Federal Emergency Management Agency (FEMA) and US Guidelines (FCD-1 and CGC1) •ISO 22301 Business Continuity Management Systems •ISO 27031 Information Technology (Business Continuity) •National Fire Protection Standard (NFPA 1600: Standard on Disaster/Emergency Management and Business Continuity Programs)

CYBERSECURITY SERVICES Business Continuity / Continuity of Operations Planning

Plan Development | Business Impact Assessment (BIA) | Gap Analysis Studies | Hazard Analysis Studies Plan Testing | Alternate Site Operations Planning | Knowledge Transfer/Staff Training

Welcome to ICS, Inc.A Comprehensive Approach

Business Continuity Plan (BCP) testing will help validate your existing BCP/COOP plan to ensure the security of your staff, visitors, and operations in the event of a crisis.

ICS’ certified business continuity planners will assess your organization’s resilience strategies, recovery objectives, business continuity, and crisis management plans. Consider it like a fire drill. Following the BCP/COOP test, you will have a clear understanding of your plans strengths and weaknesses, and will be able to make adjustments BEFORE an emotionally significant event occurs.

If you do not already have a Business Continuity or Continuity of Operations Plan, ICS can create one for you.

CYBERSECURITY SERVICES Business Continuity / Continuity of Operations Plan Testing

Welcome to ICS, Inc.A Comprehensive Approach

Would your organization be able to continue critical business functions following a significant unplanned disaster? Or would an unexpected natural disaster or political event shut down operations entirely? Disaster Recovery Planning allows an organization to establish steps to continue operation at planned levels of service, despite events or interruptions.

Today’s political and environmental climate requires that an organization be prepared for just about anything. ICS utilizes time tested Disaster Recovery Planning methods based on the standards established by the Disaster Recovery Institute International. We combine these industry standard best practices with our own proven proprietary processes in Disaster Recovery Planning to allow business operations to resume following virtually any unplanned event.

Services Include: •Strategic Recovery Planning/Development •Backup and Recovery Strategy •Selection of Alternate Facilities •Alternate Site Operations Planning •Vendor Alignment •Knowledge Transfer/Staff Training

CYBERSECURITY SERVICES Disaster Recovery Planning

Welcome to ICS, Inc.A Comprehensive Approach

Today’s political and environmental climate requires that an organization be prepared for just about anything. ICS offers disaster recovery plan testing to evaluate an organization’s disaster recovery plan in advance of an event.

We can also evaluate actual disaster response and operations following an unplanned service outage or crisis in order to better position your organization the next time.

Both pre- and post- event evaluations will allow your organization to examine its response and document opportunities for improvement based on time tested Disaster Recovery Planning methods and standards established by the Disaster Recovery Institute International.

CYBERSECURITY SERVICES Disaster Recovery Plan Testing

Welcome to ICS, Inc.A Comprehensive Approach

A Risk Assessment from a qualified IT security firm is like checking the doors and windows on your network. With all of the confidential corporate and customer information in your database, you would never consider leaving those doors and windows open. But beyond the entryways that are easy to see, are there other access points that are not so obvious? Is your network at risk of experiencing a devastating breach?

Our Risk Assessment model delivers both quantitative and qualitative measures of organizational risk, allowing you to optimize your security spend and efficiently allocate resources to maximize business value. We have a 20-year history of delivering Risk Assessments against all major standards including NIST 800-series, ISO, Octave, COBIT, COSO and others.

An Information Security Risk Assessment is a means of examining your organization’s information security infrastructure to identify vulnerable areas in the network and provide steps to secure those weaknesses. Only then will your organization be able to prioritize which areas need to be addressed immediately, which are less urgent, and which ones are not urgent at all.

A Risk Assessment will provide your organization with an objective evaluation of the security of your information infrastructure.

CYBERSECURITY SERVICES Risk Assessment

Welcome to ICS, Inc.A Comprehensive Approach

ICS is available for code review projects with the goal of identifying security issues and weaknesses in the applications’ coding. We are able to conduct a systematic review of applications in scope for code review, which can include in excess of 1,000,000 lines of code.

Examples of programming languages involved are: •.NET 3.5 framework •VB.net •ASP.NET •C# •Javascript

By conducting a static review of application code as it exists at the time of the assessment, we are able to provide an assessment of each application’s architecture from a security perspective as well as remediation recommendations.

CYBERSECURITY SERVICES Code Review

Welcome to ICS, Inc.A Comprehensive Approach

ICS offers forensic services to discover, analyze and document information in both proactive and reactive forensic circumstances. Many of our clients have found this service to be vital during personnel action, court order, civil action, and incident response situations.

Evidentiary Integrity ICS has the knowledge and experience needed to achieve successful electronic evidence and data collection, protect evidentiary integrity, and provide factually accurate supporting documentation. As a technology security firm, we are well-qualified in this field and often provide supporting forensics documentation for clients to present to agencies such as the Department of Homeland Security, the Federal Bureau of Investigation, and state investigation agencies.

Litigation Support and Expert Testimony ICS also provides litigation support with expert testimony in the event of court proceedings or prosecution.

CYBERSECURITY SERVICES Forensics

Welcome to ICS, Inc.A Comprehensive Approach

In the event of an information security emergency, the ICS Incident Response team will step in to help your organization identify the source of the compromise, preserve critical information, and prevent the spread of contamination or unauthorized access to other systems and networks. Our on-site emergency response efforts will not cease until the incident has been eradicated and the systems and networks have been restored to normal operation.

ICS will provide knowledge transfer and reporting so your internal personnel are equipped to maintain protection of your information assets after the event.

Let ICS’ Emergency Response Consultants act as your primary response team.

CYBERSECURITY SERVICES Incident Response (Post-Event)

Welcome to ICS, Inc.A Comprehensive Approach

Organizations that are dependent on information systems are challenged by serious threats that can exploit both known and unknown vulnerabilities in systems. ICS offers incident response and forensics planning services that will allow your organization to have a clearly defined response plan with policies in place should a cyber incident occur.

A cyber incident can compromise the confidentiality, integrity, or availability of information being processed, stored, or transmitted by information systems, resulting in adverse impacts on the organization, its operations, assets, and people. The average cost of a data breach increases by 35% each year, costing unprepared organizations untold millions. A strategic incident response plan can give your organization the policies needed to ensure that an unexpected breach is handled properly and swiftly, while minimizing the potential harm.

A forensics response plan is a traditional component of an effective business continuity /continuity of operations plan.

CYBERSECURITY SERVICES Incident Response Planning

Welcome to ICS, Inc.A Comprehensive Approach

There are risks to your system everywhere, so the best way to keep your network safe is to let us hack it.

Yes, you read that right.

Penetration testing is often referred to as ethical hacking. Our certified ethical hackers take the basic vulnerability assessment a step further, verifying the findings of the vulnerability assessment and the impact a breach could have in your external and internal networks.

When we’re done, we will create a custom solution information security solution, tailored specifically for your organization.

Penetration testing should be performed bi-annually as an integral part of your larger security plan.

CYBERSECURITY SERVICES Penetration Testing (Pen Testing)

Welcome to ICS, Inc.A Comprehensive Approach

Well-established IT policies can help ensure an optimal network environment in which data is stable, secure, and available. Effective IT policies can also help ensure operations continue under adverse situations, such as a natural disaster or other unplanned event.

ICS can work with your organization to create clearly defined IT policies and procedures that provide a framework for treating information as real property to be protected from unauthorized access, modification, intrusion and destruction.

Policy and/or standards development can include items such as the following: •Information Classification •Acceptable Use •Security Awareness and Training

A well-written IT Policy will serve as a best practices handbook for all employees within the organization and encourage their participation in preventing information breaches. These policies will help ensure controls are in place to protect information and will set the tone both internally and externally with regards to the importance of protecting your organization’s information.

CYBERSECURITY SERVICES Policy Development

Welcome to ICS, Inc.A Comprehensive Approach

You can’t fix what you don’t know is broken, and it is impossible to ensure the security of your network without a clear picture of its strengths and its weaknesses. Regularly scheduled vulnerability assessments are an uncomplicated way to uncover potential hazards.

There are countless individuals and entities intent on accessing other organizations’ network resources and data for myriad reasons, and they’re using the latest technology and techniques to accomplish this goal. Without adequate protection, your organization can be easily compromised, resulting in anything from a minor inconvenience to a breach that seriously harms your operations and your bottom line. ICS can guide you through the process to properly safeguard any weak or exposed areas with an internal or external vulnerability assessment

By working with ICS you: •Catalog and prioritize vulnerabilities within your infrastructure •Implement quick, efficient and cost effective remediation solutions, created for your specific needs. •Give your customers confidence by ensuring their information is secure. •Satisfy regulatory compliance requirements.

CYBERSECURITY SERVICES Vulnerability Assessment

Welcome to ICS, Inc.A Comprehensive Approach

A web application assessment is a specific test designed to identify threats of unauthorized access, so you can keep your sensitive information safe and secure no matter how many web-based applications your organization is using.

The goal of the web application security assessment is to identify security issues and weaknesses in the web-based application as installed, configured, maintained, and used in the production environment.

Examples of the types of security issues assessed include: •Input/Output validation (e.g., cross site scripting, SQL Injection) •Application logic flaws (e.g., authentication bypass) •Server configuration errors/versions (e.g., directory traversal, missing patches)

The assessment is a dynamic review of the state of the application and infrastructure security at a point in time. Findings will be reflective of the current state of security. The deliverable will contain detailed information based on NIST 800-53, and will include the vulnerabilities discovered, the number of vulnerabilities, and detailed remediation recommendations.

CYBERSECURITY SERVICES Web Application Assessment

Welcome to ICS, Inc.A Comprehensive Approach

Network Design & Planning Well-designed network

architecture can greatly improve workflow, while allowing for future growth. ICS offers guidance in Network Design and Planning that will help ensure your network is built to last.

Executive Strategic Support An organization facing the

departure of a top executive is vulnerable in many ways, but yours does not have to be. ICS offers strategic executive staffing that will give your organization the support it needs to help ensure a smooth transition.

Vendor & Technology Evaluation Our in-depth reviews, vendor evaluations and product testing ensures the hardware, software, and service-based solutions we recommended will perform to your specifications AND save you money.

TECHNOLOGY SERVICES CyberSecurity services from ICS, Inc. includes Policy & Planning services, risk assessment, web application assessments, code review, incident response and forensics.

Welcome to ICS, Inc.A Comprehensive Approach

An organization that is facing the departure of a top executive is vulnerable in many ways, but yours does not have to be. ICS offers strategic executive staffing that will give your organization the support it needs to help ensure a smooth transition.

With ICS executive staffing support, your organization has access to interim executive staffing for roles such as Chief Security Officer, Chief Information Officer, Chief Operations Officer, and other key positions. These roles can be filled on site or in a virtual capacity, providing your organization with the surge capacity for projects, a consistent focus on strategic initiatives, flexible budgetary control, and adaptability to changes in priorities.

Additionally, many organizations need the expertise of a CISO, CIO, or IT Security expert but may not need someone 40 hours a week. ICS can help. ICS’s experts will work with your organization to provide the level of support your organization needs from 10 hours to 40 hours a week. This unique solution enables your organization to enjoy all the benefits of a highly qualified CISO, CIO, etc. without the expense of a full-time resource.

TECHNOLOGY SERVICES Executive Strategic Support

Welcome to ICS, Inc.A Comprehensive Approach

Having a well-designed enterprise network architecture can greatly improve organizational workflow, while allowing for future growth. ICS can offer guidance in the Network Design and Planning phase that will help ensure your network is built to last.

A well-designed network optimizes CapEx, OpEx and security tradeoffs to align with your risk appetite. ICS can create templates based on network design best practices that will increase efficiency, reduce errors and improve compliance standards for your organization. We will ensure your Network Design architecture allows for security, expansion and future overlay of new assets and applications.

TECHNOLOGY SERVICES Network Design/Planning

Welcome to ICS, Inc.A Comprehensive Approach

Vendor and Technology Evaluation Process •Requirements Definition Phase: During the first phase of the vendor and technology evaluation process, ICS will conduct an in-depth review of your organization’s needs, which will enable us to facilitate the most appropriate hardware, software, or service-based solutions. •Market Scan Phase: Phase two is the market scan phase. We will compile a list of available solutions/products that meet your needs and will begin pricing negotiation on your behalf. Once a vendor is chosen, we will begin the pilot test phase. •Pilot Test Phase: The pilot test phase allows us to test the most viable product(s) for your needs before they are implemented in the live environment. This helps ensure all potential problems or glitches are identified and resolved prior to deployment. •Implementation Phase: In the implementation phase, ICS is available to install and deploy the selected technologies into your network environment. We will conduct knowledge transfer, so your staff will have a full understanding of the products and any required maintenance plans. •ICS makes network security less complicated—and less expensive—by tailoring a program of security hardware and software solutions to meet the specific needs of your information infrastructure.

TECHNOLOGY SERVICES Vendor & Technology Evaluation

Welcome to ICS, Inc.A Comprehensive Approach

Application Development ICS has the ability to design and

implement custom applications and enhance legacy applications for commercial, public sector, and federal clients to help your organization enhance business processes and increase operational efficiency.

Legacy Modernization ICS understands the challenges

that can come with taking old applications to new platforms, and we offer software automated solutions that can significantly reduce both the time and budget needed to achieve the results you expect.

Application Maintenance & Support Is your IT team bogged down with application sustainment activities, leaving little time for activities that drive the business forward? Do you lack the internal resources to efficiently implement changes to your custom apps? It may be time to contact ICS.

APPLICATION SERVICES Application Services from ICS, Inc. includes application development, application maintenance & support, and legacy modernization.

Welcome to ICS, Inc.A Comprehensive Approach

ICS has a wide range of experience in application development, sustainment, modernization and support. Not only can we design and implement custom applications to enhance business processes and increase operational efficiency, but we are often able to save our clients money by enhancing legacy applications–both standard and proprietary.

Our team of IT professionals are proficient in technologies such as Java, Oracle, J2EE, .asp, and more. In addition, ICS utilizes a time-tested, proprietary project management methodology (based on PM-Bok) to deliver projects on-time, in-scope, and on-budget. In fact, ICS’ Forge.Mil program and the Quality Management group at ICS have been appraised at Level 3 of the CMMI Institute’s Capability Maturity Model Integration (CMMI)®.

Application Development Services Include: • Application Design, Integration, Migration • Application Sustainment, Maintenance and Support • Web Application Development • Legacy Application Enhancements and Support • eCommerce Application Development

APPLICATION SERVICES Application Development

ICS provides clients the assurance that the applications that we develop and manage will be built on state of the art platforms and secure from ever-evolving security threats.

Welcome to ICS, Inc.A Comprehensive Approach

Do you lack the internal resources to efficiently implement changes to your custom apps? Or has your business need evolved beyond the functionality of your legacy applications? ICS performs IT sustainment, integration, migration, and elements of Tiers 1, 2, and 3 support legacy and modernized systems. We also deliver application services integration and deployment activities in development, test, pre-production and production environments, executes regression testing and employs in-depth knowledge of security requirements.

We approach every project with information security in center focus. Experienced in all aspects of information security, infrastructure requirements, and development platforms, ICS is able to shore up areas vulnerability within your standard and/or proprietary applications.

Through our collaborative approach to application sustainment, we will join forces with your staff to gain a thorough understanding of the application requirements, integration components, and compliance needs in order to optimize your application’s usefulness for your organization.

APPLICATION SERVICES Application Maintenance and Support

Welcome to ICS, Inc.A Comprehensive Approach

Legacy modernization can be a very costly and time intensive process, but it doesn’t have to be. ICS understands the challenges that can come with taking old applications to new platforms, and we offer software automated solutions that can significantly reduce both the time and budget needed to achieve the results you expect.

ICS uses a technology suite that allows us to simplify modernization efforts in systems containing multiple applications and multiple languages, even when they are connected to multiple databases. Our turnkey modernization solution means your team doesn’t have to be bogged down for months updating business systems.

Primary modernization benefits include: • Rapid redevelopment of legacy code • Project scalability • Delivery of high quality code and SOA with clear documentation

APPLICATION SERVICES Legacy Modernization

Welcome to ICS, Inc.A Comprehensive Approach

Staff Augmentation ICS can supply your organization with the flexibility

and expertise necessary to meet even the most complex project and business goals. Our information technology and security consultants offer practical and affordable staff augmentation for both long and short term assignments.

Staff Recruitment Clients across the United States depend on Integrated Computer Solutions for information technology search services. ICS delivers only top-quality, highly-trained candidates to your organization in as little as ten business days.

STAFF AUGMENTATION SERVICES ICS can supply your organization with the flexibility and expertise necessary to meet even the most complex project and business goals through staff recruitment and staff augmentation services.

Welcome to ICS, Inc.A Comprehensive Approach

ICS can supply your organization with the flexibility and expertise necessary to meet even the most complex project and business goals. Our information technology and security consultants offer practical and affordable staff augmentation for both long and short term assignments.

By providing specialized technical staff support and staff augmentation to meet changing business demands, ICS offers your organization the best of both worlds: dedicated support and flexible cost control. Using dedicated resources from ICS to achieve defined objectives, in a sustained manner provides the momentum necessary to accomplish and maintain important strategic goals.

You organization is always in control of the scope, timing, and cost of each project. This gives you more flexibility in the timing of expenditures, resource availability, and balancing competing internal priorities.

Among the many benefits of this support model are: •Surge capacity for projects •Consistent focus on strategic initiatives •Flexible budgetary control

STAFF AUGMENTATION SERVICES Staff Augmentation

Welcome to ICS, Inc.A Comprehensive Approach

ICS is a leader in the information technology field, and our recruiters are armed with an in-depth understanding of the complexities of the IT industry. We are equipped to provide you with expert IT professionals with key industry credentials, such as CISSP, CBCP, PMP, ITIL and CHS-III, who can quickly and effectively deliver technology solutions and support to your organization.

Our placement practices ensure a synergistic fit, saving both time and money by reducing turnover and additional recruiting efforts.

IT RECRUITMENT PROCESS •STEP 1: Needs AssessmentSTEP 2: Candidate Identification •STEP 3: Screening Process •STEP 4: Candidate Presentation •STEP 5: Team Integration

Average time for recruitment process: 10 business days

STAFF AUGMENTATION SERVICES Staff Recruitment

Welcome to ICS, Inc.Business & Industry Spectrum

Commercial Sector ICS’ commercial sector clients include major financial institutions like

Regions Bank and Regulus. We support private educational institutions across the United States as well several insurance companies and healthcare clients.

Public Sector ICS consultants stay abreast of current legislative requirements, regulatory

compliance issues and standard industry best practices to meet the specialized information security needs of public sector agencies.

Federal Government, DoD ICS has a long history of serving our DoD and civilian federal clients. Nearly

75% of our employees are cleared, up to Top Secret, and our headquarters office has a Top Secret facility clearance.

Security-Focused IT Solutions from ICS suit a broad client base Federal, State & Local Government | Utilities | Finance | Insurance | Healthcare | Education Systems

Welcome to ICS, Inc.Business & Industry Spectrum

A Standard of Excellence Through years of experience running global datacenters, enterprise systems

management, global networking, and storage and application support, ICS can help prevent problems before they happen and give you back control of your information technology operations. It’s what we do best.

Our extensive client list includes:

Federal Government • Department of Defense • DISA • US Air Force • US Navy

Public Sector • Florida Senate • Lee County Port Authority • Montgomery Water Works • Georgia Technology Authority • Tennessee Department of Labor • State of Alabama

Education • Miami Dade College • Mississippi State University • Troy University • Tuskegee University

Healthcare • Baptist Health • North Florida Medical Centers

Finance • Choicepoint • Regions Bank • Regulus

Manufacturing • Mack Trucks • Rheem • ThyssenKrupp Steel USA

Insurance • Blue Cross Blue Shield of AL

Retail • Publix Super Markets, Inc.

Services • Verizon Federal, Inc. • Unisys

Information Security Solutions for thePUBLIC SECTOR

A Specialized Team In the rapidly changing world of e-government, public sector agencies have an

increasing need for information technology support that will provide the agility necessary to anticipate change and respond to it proactively. Is your agency consistently challenged to:

...meet increasing legislative requirements? ...maintain regulatory compliance? ...combat new information security vulnerabilities? ...provide increasing levels of service? ...manage ever-tightening budgetary constraints?

Achieving Efficiency ICS consultants stay abreast of current legislative requirements, regulatory

compliance issues and standard industry best practices to meet the specialized information security needs of public sector agencies. You can rest assured that ICS has what it takes to secure your critical information infrastructure and assure compliance while increasing enterprise network efficiency.

With new information security threats being discovered daily, the challenge to meet stringent regulatory compliance demands is becoming increasingly difficult.

Fortunately, there’s ICS. With a legacy in providing military-grade security to federal, state and local government, ICS is adept at providing secure IT solutions that meet the highest technical and policy standards.

Information Security Solutions for thePUBLIC SECTOR

Our Public Sector clients include: Alabama • Dept of Finance, Information Services Division • Dept of Industrial Relations • Dept of Mental Health • State Courthouse • State Personnel Board • State Treasury Department • Water Works & Sanitary Sewer, Montgomery • Alabama A&M University • Auburn University, Montgomery • Jacksonville State University • Tuskeegee University • University of South Alabama

Arkansas • Employment Security Department

California • Community Health Agency, Riverside County

Delaware • Office of Information Technology Services

Georgia • Georgia Technology Authority

Florida • Agency for Workforce Innovation • City of Sanibel • Enterprise Information Technology Services • Dept of Children & Families • Dept of Environmental Protection (DEP) • DEP Waste Management Division • Dept of Management Services • Dept of Revenue • Dept of State • Florida Senate • Hillsborough County Aviation Authority • Lee County Port Authority • Office of the State Courts Administrator • Miami Dade College • Tallahassee Community College • Tallahassee Board of Education • University of Florida

Mississippi • Mississippi State University Tennessee • Department of Labor & Workforce Development

Information Security Solutions for thePUBLIC SECTOR

Available Contract Vehicles

STATE OF ALABAMA • Statewide IT Consulting Services

STATE OF DELAWARE • Statewide Cyber Services Contract

STATE OF FLORIDA • Statewide IT Consulting Services

• Statewide Project Management Services

• Statewide Risk Assessment Contract

STATE OF GEORGIA • Statewide Business Continuity Planning Services Contract

STATE OF MISSISSIPPI • Statewide IT Consulting Services

STATE OF NORTH CAROLINA • Statewide Encryption Software Contract

Network Security Support so you can focus on what

really matters: The Business of Government

Information Security Solutions for theCOMMERCIAL SECTOR

Securing Your Business Integrated Computer Solutions, Inc. is a security-focused information technology

solutions provider. We supply five-star, military-grade information security and technology services to large state, national and global enterprises, and we do it with a proactive approach.

A Proactive Approach Integrated network security solutions from ICS will not only help enable your

organization to decrease information security risk exposure and boost productivity, but they can also help you to maximize your current IT resources and make smarter infrastructure investments.

Through years of experience running global datacenters, enterprise systems management, global networking, and storage and application support, ICS is equipped to meet your most complex critical information infrastructure challenges.

Information Security Solutions for theFEDERAL GOVERNMENT

ICS is a security focused IT solutions provider with over twelve years of service to our DoD and civilian federal clients providing information assurance, technical, advisory, and operations support services. ICS is unique in the market because we also have a long track record of providing enterprise technology and security services to clients in commercial, public sector and education markets. This brings a fresh perspective and industry best practice to our federal clients.

The ICS Approach ICS leverages our proven project management methodology, project

managers and highly trained consultants to accurately scope, manage and deliver solutions to our clients. Our integrated approach to service delivery results in higher levels of client satisfaction than many of our peers deliver.

Contract Vehicles:

• GSA schedule 70 • US Navy Seaport-e • DISA Encore II • Dept. of Homeland Security EAGLE contract • US Air force Netcents II

Information Security Solutions for theFEDERAL GOVERNMENT

ISO 9001:2000 Certified Our ISO 9001:2000 certification demonstrates our commitment to

quality, repeatable processes with documented policies, procedures and processes that comprise our commitment to product and service quality in all of our activities.

Mature Project Management Methodology (PMM) Our PMM follows Project Management Institute Project Management

Body of Knowledge standards and ensures on-time and on-budget delivery of our services. Our PMM is used on every engagement over 80 hours in duration.

Certified Project Managers (PMI-PMP’s) ICS has a team of certified project managers used to manage our

client projects. Coupled with our project management methodology, project risk is greatly reduced and impacts are identified early in the process. In addition, our application of earned value management (EVM) provides our clients with project status transparency.

Effective Performance Our Forge.Mil program and Quality Management group have been

appraised at Level 3 of the CMMI Institute’s Capability Maturity Model Integration (CMMI®).

Broad Industry Experience ICS has a 10 year history of serving our DoD and civilian federal

clients. However, we also have a deep history of providing enterprise technology and security services to clients in commercial, public sector and education markets. This brings a fresh perspective and industry best practice to our federal clients.

Clearances Nearly 75% of our employees are cleared, up to Top Secret.

Consultant Quality

Our employees are heavily degreed and professionally trained: 40% BS degrees, 10% MS degrees, 3% post graduate degrees