Consult with our cybersecurity experts

Security Consulting & Professional Services

Design, implement, integrate, support and optimize

security policies, identity management and PKI systems.

Identity Management Solutions

Develop systems that stand up to the demand of today’s highly integrated digital environments. Cygnacom expertise covers the entire identity management lifecycle—from conceptualization and policy development through design, implementation and operations:
  • User provisioning
  • Certificate provisioning
  • Mobile device management & BYOD
  • Multi-factor authentication (MFA)
  • Role-based access control
  • Privileged account management
  • Single sign-on (SSO)
  • Cloud identity management

Identity & The Cloud

Migrate user keys from on-premises CAs to hosted environments—while meeting all relevant regulatory requirements—through a complete range of tools and expert guidance:
  • Planning services
  • Policy development
  • System architecture & design
  • Implementation services
  • Staff augmentation
  • Compliance reporting & audit

Public Key Infrastructure (PKI)

Achieve a broad range of PKI objectives with dedicated support from the pioneers of government PKI:
  • Design, install and configure PKI systems—on-premises or cloud-based—to issue and manage certificates
  • Enabling agencies to operate a Certificate Authority
  • Optimizing existing PKI deployments to maximize benefits
  • Migrating on-premises PKI to cloud-based services
  • Deploying digital certificates to mobile devices

Secure Mobility

Empower mobile productivity while maintaining complete assurance and security across your environment. Cygnacom provides deep expertise and proven strategies for solving the many challenges of enabling BYOD, CYOD and COPE workforces, including:
  • Deriving mobile credentials based on existing digital user IDs (i.e., government-issued PIV credential)
  • Deploying digital certificates to mobile devices
  • Comprehensive consulting for mobile security technologies, tools and enterprise mobility policies

Custom Development

Design, build and implement custom modules and proprietary applications for identity management and identity provisioning solutions, including:
  • Public key and certificate enablement (PKE)
  • SAML 2.0-compliant modules for custom applications
  • Java Authentication and Authorization Service (JAAS) modules
  • Custom Policy Agents and Rule Processors
  • Integrations with existing or new applications

Security Policies

Develop and audit security plans and policies with the guidance of our unmatched government InfoSec experience:
  • Organizational security policies
  • Mobile & BYOD policies
  • Disaster planning
  • Certificate policies
  • Certification & registration practices statements
  • PKI audits
  • HSPD-12 enablement and mobile-derived credential implementations
Card image cap
Mobile Derived Credentials Brochure
DOWNLOAD THE BROCHURE
Card image cap
Professional Services Brochure
DOWNLOAD THE BROCHURE