Loading
picture

Cyber Solutions

ZelTech has been providing Information Security solutions for over a decade. This includes consulting, system studies, evaluations and assessments, and hardware and software design and development. 

We work closely with customers to identify core functions, and then we take clear, practical steps together to protect critical IT elements that support and sustain essential mission tasks.

picture

Core competencies include:

  • In-depth vulnerability and risk assessments and associated remediation activities
  • Daily administration and monitoring of essential networks
  • Systems engineering support to DOD, the Intelligence Community and local governments
  • Design and development of networks serving first responders
  • Research and development on a variety of network, enterprise, and information security and assurance solutions

TOP OF PAGE

Virginia Operational Integrated Cyber Center of Excellence (VOICCE)

ZelTech is helping the City of Hampton, Virginia and other municipalities improve their cyber security. The VOICCE program funded under a Department of Homeland Security grant will recommend affordable, effective technical measures as well as enhanced cyber processes. Under this program, ZelTech will also provide training, run evaluations and exercises, and serve as clearinghouse for critical cyber information. DHS is evaluating VOICCE as a model program to be used throughout the United States.

TOP OF PAGE

Cyber Support to Virginia International Terminal (VIT)

Under a DHS grant, ZelTech is helping Virginia International Terminals, Inc. strengthen their overall cyber security posture. We are updating and enhancing security policies and procedures. We are also conducting a technical vulnerability assessment of the cyber environment, including information systems, supporting networks, and automated systems. ZelTech will monitor the security of these networks for new vulnerabilities and track the remediation of potential security risks.

TOP OF PAGE

Automated Course of Action Modeler

ZelTech has developed the Automated Course of Action Modeler (ACAM), a tool that helps define the operational risks inherent in specific network vulnerabilities. ACAM helps document essential network components. Each node is linked to the mission or business activities it supports. The resulting mission map describes the dependencies between mission elements and the cyber infrastructure. This allows senior decision makers to understand more clearly the mission impact of any cyber incident. It also provides a vehicle to more effectively prioritize security investments and plan responses to cyber attacks.

TOP OF PAGE

For further information, please contact:

ZelTech Cyber Security
Scott Arnott
scott.arnott@zeltech.com
757-722-5565