Symtrex Inc.

Cyber Security Specialist

Call - 866-431-8972 | Send an Email | Request a Quote
Visit Us On FacebookVisit Us On TwitterVisit Us On Linkedin

Profile

 [metaslider id=2951] … Read More

  • Home
  • Profile
    • Contact Us
    • Security News
    • White Papers
  • Services
    • Compliance Regulations
      • PCI DSS Suite of Products
      • HIPAA/Hitech
      • SOX – Sarbanes Oxley
      • DCID 6/3/NISPOM Chapter 8/JAFAN DoD
      • NERC/FERC
    • Industry Consulting and Implementation
      • Banking and Financial
      • Energy/Utilities
      • Healthcare
      • Retail/Hospitality
    • Security Assessment
  • Security Solutions
    • Sophos
    • Endpoint Security Solutions
      • Bitdefender Business Solutions
      • Sophos Endpoint Protection
    • Forensic Solution – Threat Hunter
    • Network Access Control
      • NetShield
        • NetShield
    • NGFW – UTM – Perimeter Security
      • Sophos Network Protection
    • Security Awareness Training
      • KnowBe4 – Security Awareness Training
      • Sophos Phish Threat
  • White Papers
    • Sophos Webinar Series
  • Security News
    • Blog
    • Sophos Webinar Series
  • Free Security Tools
You are here: Home / Services / Compliance Regulations / DCID 6/3/NISPOM Chapter 8/JAFAN DoD

DCID 6/3/NISPOM Chapter 8/JAFAN DoD

While we lump these requirements into one, they are subtle difference.  Most of these regulations now fall FISMA (Federal Information Security Management Act of 2002.) As with most compliance regulations it is the need to protect sensitive data, and as with most there is a need to protect the perimeter, use an Antivirus product, etc.  One of the biggest difference between these and other compliance regulations is the fact that some areas are classified areas, and do not connect to the internet.  This posses a bit of a challenge when it comes to monitoring the activity within these classified areas.

We have the  Solarwinds Log & Event Manager tool, which again does not require an internet connection, and provides a robust library of reports, file integrity monitoring and more.

Another tool that may be of some benefit is  the network monitoring tools Hexis NetBeat MON.  This tool is describe as a Network Hygiene Tool, and includes some of the industry best of breed including wireshark, Ntop, and Snorby.

We have extensive experience in this area, and invite you to contact us for more information.

 

Let us help answer any questions you may have

requestmoreinformation.fw

Security News and Updates

  • Was my information part of a breach?
  • Phishing and stolen credentials
  • Ransomware is the Biggest Threat for Small to Medium Businesses

RSS SecurityWeek

  • Italy Temporarily Blocks ChatGPT Over Privacy Concerns
  • FDA Announces New Cybersecurity Requirements for Medical Devices
  • Report: Chinese State-Sponsored Hacking Group Highly Active

Contact

  • Contact Us

Request More Info

  • Request Quote

Site Map

  • Site Map

© Copyright 2016 Symtrex Inc. ; All Rights Reserved · Privacy Statement