Cyber Security Automation
hero_pattern.png

Welcome to VPS Solutions

Cyber Security Automation Solutions

Implementing Cyber Security Solutions across a wide variety of organizations, from the Fortune 100 to government agencies.

VPS Solutions assists organizations in developing an integrated cycle of Governance, Risk, and Compliance (GRC) initiatives. In addition to working directly with our clients, we work to develop strategic partnerships with leading security, compliance, and risk assessment organizations as an enhancement of our service offerings.


VPS Solutions specializes in IT Governance, Risk Assessment, audit, and regulatory compliance with specific focus on FISMA, Sarbanes Oxley (SOX),Gramm-Leach Bliley Act(GBLA), Payment Card Industry (PCI), and Health Insurance Portability and Accountability Act (HIPAA) regulations.

Our trained and certified staff have a thorough understanding of the GRC best practices and configurations. Certifications include CISSP, HCISPP, RSA Archer Certified Professional, and more.

 

Partners:

RSA-SecureWorld-RGB-Horizontal.png
RSA-Public-Sector-Solutions-RGB-Horizontal.png
RSA-NetWitness-Suite-RGB-Horizontal.png
RSA-Fraud-and-Risk-Intelligence-Suite-RGB-Horizontal.png
 

Areas of Expertise


Cyber Incident & Breach Response

  • RSA Archer Security Operations Center integration with security event sources such as Heat Ivanti, Splunk, Trip-wire etc. using Rest and Web Services API

  • Implement Incident Tracking using RSA Archer 6.x Advanced Workflows


Custom Applications Development

  • RSA Archer On Demand Applications

  • RSA Archer Data Feeds

  • REST API Integrations

  • Web Services API Integrations

  • RSA Archer Custom Objects

  • RSA Archer 6.x Advanced Workflows Development

  • Data Driven Events and Calculations


FISMA Certification and Accreditation

  • Assessment and Authorization - Control Selections Automation

  • Continuous Monitoring - Customized Dashboard Development

  • Plan of Action & Milestones (POA&M) Management
     


Custom PROGRAMMING

  • Algorithm Development

  • Artificial Intelligence and Data Analytics

  • Python, C#, C++, JAVA, JavaScripts


Security Vulnerability Management

  • Integrating RSA Archer with Vulnerability Scanning tools such as Qualys, Nessus etc. using JavaScript Transport Data Feeds

  • Developing RSA Archer Data Feeds for the National Vulnerability Database


Third Party Governance

  • Third Party Information Repository

  • Third Party Risk Management

  • Third Party Engagement

  • Third Party Governance

 
 

 
 
‘Compliance’ is just a subset of ‘governance’ and not the other way around.
— Pearl Zhu
 
 

 
 
 

Let's Chat.

Use the form below to contact us regarding your GRC requirements. Please be as detailed as possible. Include your industry along with any specific document requests. To help us best service your specific needs, we recommend that you first describe the issue you’re having before telling us what you want to achieve. You may also email or call us to make an appointment.

For job opportunities, please email us your resume. We’re always looking for new and exceptional talent to lead the firm into uncharted fields of GRC.