Information Assurance



Comtech’s certified team of security engineers delivers cost-effective, end-to-end solutions for information assurance that are designed to meet the customer’s specific needs.

  1. Solutions designed and deployed are based on vulnerability assessment testing and certification requirements
  2. Tested and validated, best-of-class products ensure reliability and performance
  3. Managed security services monitor network status on a 24/7/365 basis and alerts

The need to mitigate risks to critical IT infrastructures and information resources has never been greater. Certification requirements, data privacy regulations, blended malware threats, organized criminal hacking, operator errors, and insider threats all attribute to this need. For business and government enterprises alike, ensuring the availability, integrity, authentication, confidentiality and non-repudiation of its information and information systems are both a strategic requirement and a measure of commitment to operational excellence.
Comtech offers deep expertise in providing superior quality, innovative information assurance solutions and managed services. Taking an organization-wide perspective of services and networks, our team of certified information systems security professionals provides custom solutions that maximize the value of IT investments and minimize the management of security system operations. Comtech’s extensive experience in supporting government security programs - one of the highest service level agreements (SLAs) in the industry – combined with our history of satisfied customers guarantee our ability to deliver results.


The successful deployment of security services designed to support widespread, complex organizations requires a team of engineers with a breadth of skills and in-depth knowledge of the latest technologies. Comtech’s team of experts has the experience and knowledge required to deliver end-to-end solutions that cover:

  • Risk Assessment Evaluation
  • Security Architecture Design
  • Solution Testing, Deployment and Certification
  • Program Management and Support
  • Incident Response and Disaster Recovery

Using tested and validated technologies, Comtech solutions integrate best-of-class products that assure the highest level of success and minimal disruption. Layers of security appropriate to the sensitivity of systems and data are architected to meet the objectives for risk mitigation with consideration for budgetary constraints.


Comtech information assurance solutions are designed to meet government guidelines defined by:

  • OMB M-04-04
  • PDD-63
  • NIST Special Publication
  • HSPD-12


Technology solutions supported by Comtech include:

  • Perimeter Security
    1. Firewalls
    2. Intrusion Detection Systems (IDS)
    3. Intrusion Prevention Systems (IPS)
  • Host Intrusion Prevention Systems (HIPS)
  • Identity Management
  • e-Authentication
    1. Security Assertion Markup Language (SAML)-based technologies
    2. Public Key Infrastructure (PKI) technologies
    3. Credential Service Provider (CSP) certification and processes
    4. Event Correlation

Comtech Information Assurance Services

Risk Assessment Audit
Comtech’s comprehensive security audit methodology covers all the critical elements of the organizational control environment: People, Technology and Operations.
  • Business and Information Security Assessment: A thorough research of current policies, training practices and operational procedures includes:
    1. Critical Asset Identification
    2. Data Classification
    3. Operational Control Assessment
  • Vulnerability Assessment: Weaknesses in the security environment that provide an opportunity for exploitation are identified through deep scanning and penetration testing.
  • Security Program Requirements: Given the identified assets, vulnerabilities, threats and potential for consequences, a security program that maximizes the investment value is recommended that can cover:
    1. Security Organization Proposal
    2. Roadmap to ISO 17799 Compliance
    3. General Support System Certification and Accreditation
    4. Security Policy Development
    5. Online Security Policy Training
    6. Users Guide to Security
Managed Services
Comtech’s Managed Services Group provides complete security solutions based on the ISO 17799 information security standard. Systems integrating Comtech Certified components are designed, tested, installed, maintained and managed by our solution-certified professionals to meet the customer’s specific requirements. Managed information assurance solutions include:

Secure Telecommuting Access
  • Nationwide DSL, ISDN or Satellite Connections
  • Personal Firewalls and VPN Management
  • Virus Protection
  • Automated Offsite PC/Laptop/Server Backup
Vulnerability Assessment & Intrusion Detection
  • Baseline Measurements
  • Daily Intranet and Internet Intruder Assessments
  • Concise Management Reporting
  • Detailed Trending Analysis Reporting
  • Remediation Recommendations and Support
  • Firewall Service
  • Installation and Configuration of Firewalls
  • Maintenance and Management
With the ability to provide comprehensive, integrated systems and a complete set of managed IT services, Comtech delivers innovative, quality solutions for all your information assurance needs.

Identity Management Solutions

Comtech enables GSA to consolidate application passwords, streamline provisioning and comply with homeland security requirements.


General Services Administration (GSA)


GSA’s IT environment needed to improve system security, reduce its management overhead and streamline its user provisioning process.

  1. User provisioning enhancements have expedited setup time and improved process controls for system security.
  2. Dispersed user identities from different data sources are consolidated into a centralized data store, enhancing security.
  3. Accessing applications require only a single password, reducing user support costs and risks.
  4. Adherence to Homeland Security Presidential Directive (HSPD-12) requirements for a common identification standard.

Customer Profile

U.S. General Services Administration (GSA) is a widespread organization with over 13,000 employees in 11 regional offices. Agency workers are responsible for procuring offices, equipment and supplies for over one million federal workers in approximately 8,300 buildings in 2,000 U.S. communities and overseas.

Customer Challenges

Fulfilling the GSA mission requires support for hundreds of software applications across the organization. Provisioning agency employees and contractors, and supporting password sign-on for each of the required applications have required considerable IT security overhead. The heterogeneous sign-on process also creates opportunities for a security breach, should the access permissions of transitioning workers not be thoroughly deprovisioned. Moreover, Federal Homeland Security Directive 12 (HSPD-12) has required that federal agencies comply with a common identification standard for employees and contractors.

Comtech Solution

By working with GSA to understand its objectives and requirements for Single Sign-on (SSO) and E-Authentication, Comtech was able to put together a plan for evaluating products and leading edge technologies. The initial scope of the project was to develop an architecture to support SSO and Identity Management. The goal was later broadened to include providing workers with SSO passwords for all applications.
This expanded scope required looking at password synchronization, directory services, Identity Management, LDAP services, SSO and Public Key Infrastructure (PKI), all within the framework of the HSPD-12 initiative.
Meeting GSA’s objectives required Comtech to integrate leading-edge technologies into their environment.

Phase One:

The first stage focused on testing and deploying E-Authentication, SSO, Meta Directory and Identity Management solutions, with backend architecture to integrate these technologies. A simulation test environment provided Comtech with the data they needed to recommend a proven and tested solution, which would permit backend replication for SSO with no user downtime, and integrate well in the entire architecture. This backend architecture solution has been rolled out at federal headquarters and is being extended to their Continuity of Business Operation (COOP) site.

Phase Two:

With the completion of Phase One, Comtech will be rolling out SSO, Identity Management, and Password Sync across the organization, as well as PKI. The evaluation process for these technology solutions is currently in advanced stages in Comtech’s test lab environment.

Support Services:

As part of an end-to-end solution, the Comtech Network Operations Center (NOC) is playing a critical role in delivering support services for system management. In addition, Comtech is providing training for GSA’s administrative staff so that they can provide training for their system users.

Business Benefits

Comtech’s identity management for GSA is enabling the agency to reduce IT administrative costs while meeting their system security objectives. Specifically, Comtech is delivering the following benefits to the agency:

  1. A streamlined user setup process greatly reduces the amount of IT resources required to enable new agency IT users and adjust the access permissions for transitioning or departing employees.
  2. By accessing many applications with just one authentication step, confusion over multiple passwords and the possibility of an application-level security breach have been greatly reduced. This further reduces support costs and risks to IT assets.
  3. GSA is able to comply with the aggressive requirements set out by HSPD-12 for meeting a common identification standard.

Through provisions of advanced technology evaluations, deployments and management services, Comtech is assisting GSA in obtaining their Identity Management system objectives. Application sign-on for users is reduced from many to just one password, providing cost reductions and time efficiencies for IT administration, an improved work flow for all IT systems users and a reduction in system security vulnerabilities. The sustenance of such reductions and efficiencies has allowed the federal government to move forward effectively.