Services

Services Image
Services Image
Services Image
Services Image

Professional Services

PKI Services

PKI and Authentication Services

As an industry forerunner and a trusted provider for the U.S. Federal Government, Cygnacom understands the challenges that its customers face designing, implementing, and migrating PKI infrastructures. Cygnacom’s experiences building large scale PKI infrastructures on premise and hosting a managed services PKI has produced a unique and advanced skillset. Cygnacom has helped to define and execute the standards, and has 15 years of proven experience supporting U.S. Federal Government PKI Programs.

Some of the PKI and authentication services we provide include:

  • Design, install and configure PKI systems and components to issue and manage certificates in an organization
  • Implement multi-factor and federated Authentication systems to protect customer systems, networks and resources at the customer’s facilities
  • Deployment of digital certificates to mobile devices
  • Provide consulting for organizations that want to utilize cloud-based PKI or Authentication services
  • Develop and implement migration strategies to move organizations with an existing PKI from their current provider to a cloud-based provider
  • Implement multi-factor and federated Authentication systems to protect customer systems, networks and resources in the cloud

Cloud Services

Cygnacom’s experiences building large scale PKI infrastructures and hosting a managed services PKI has produced a unique and advanced skillset that is critical for customers that are exploring a cloud based solution offering. Cygnacom, as an Entrust Datacard company, is the certificate provider for the GSA Managed Service Offering which provides HSPD-12 credentials to 90+ agencies and is also the certificate provider for the U.S. Treasury offering, which has issued PIV certificates to over 450,000 federal employees, including those at U.S. Department of Homeland Security, U.S. Department of Treasury, Social Security Administration, NASA and others.

Cygnacom has assisted several government agencies successfully migrate user keys from on premises legacy CAs to a hosted environment. These qualifications make Cygnacom a unique and highly qualified partner in support of cloud based migration services.

Some of the services we provide include:

  • Deployment and migration of existing systems to PKI and Authentication cloud services
  • Provide consulting for organizations that want to utilize cloud-based PKI or Authentication services
  • Develop and implement migration strategies to move organizations with an existing PKI from their current provider to a cloud-based provider
  • Implement multi-factor and federated Authentication systems to protect customer systems, networks and resources in the cloud
  • Implementation of cloud-based and highly available systems
  • Consulting services for moving physical infrastructures into virtual environments
  • Design and implementation of cloud-based environments
  • Automated deployment of cloud-based systems
Cloud Services
Policy Services

Security Policies

Confused about security policies? Cygnacom can help. We have been assisting the National Security Agency’s (NSA’s) United States (US) Department of Defense (DoD) Public Key Infrastructure (PKI) Program Management Office (PMO) and others since 1995 in the areas of PKI Certificate Policies (CP), Certification Practice Statement (CPS), PKI technology, PKI standards, PKI enabled application interoperability, certificate, Certificate Revocation List (CRL) and Online Certificate Status Protocol (OCSP) profiles, compliance analysis and compliance audits.

Cygnacom has provided consulting and comment on the various HSPD-12 related drafts from the National Institute of Standards and Technology (NIST) including FIPS 201, SP 800-73-4, SP 800-79-2, and SP 800-157 for Derived Credentials. We have also provided consulting services related to Homeland Security Policy Directive-12 (HSPD-12) related documents and Office of Management and Budget (OMB) Memorandum M-11-11, and HSPD-12 related aspects of OMB Memoranda M-12-20 and M-14-04.

Some of the services we provide include:

  • Development of security plans and policies, including:
    • Organizational Security Policies
    • Policies around Mobile and Bring-Your-Own Devices
    • Disaster planning
    • Certificate Policies
    • Certification Practices Statements
    • Registration Practices Statements
  • Audit services including PKI audits and triennial audits
  • HSPD-12 readiness consulting

Security Consulting

Cygnacom provides innovative services that speed time to market for security solutions. Cygnacom’s Professional Services team has worked with the world's leading federal agencies to address PKI security needs. Entrust employs highly skilled resources to address customer’s requirements minimize development time, cost, and impact on end users. Our Professional Services staff all hold a minimum of top secret clearance.

Some of the services we provide include:

  • Design, installation, and configuration of PKI and authentication systems and customer premises
  • Implement multi-factor and federated Authentication systems to protect customer systems, networks and resources at the customer’s facilities
  • Deployment and migration of existing systems to PKI and Authentication cloud services
  • Security-related Application development including PKI enablement and customized application
  • Development of security plans and policies
  • Implementation of cloud-based and highly available systems
  • Threat and vulnerability assessments
  • Security audits
  • Staff augmentation services
Consulting Services
Mobile Services

Securing Mobile Technologies

Mobile devices are becoming the new enterprise desktop. But mobile devices require the same security considerations to access corporate intranets or securely send and receive email. Cygnacom can help you support and solve some of the most common challenges related to mobile technologies

Some of the services we provide include:

  • Deriving a credential for a mobile device based on a user’s existing digital ID such as a government-issued PIV credential
  • Deployment of digital certificates to mobile devices
  • Security consulting as it relates to mobile technologies
Our experts are ready to work with you. Talk to Us.
https://www.facebook.com/Cygnacom