ChandlerCG
ChandlerCG
  • Home
  • Who We Are
  • What We Do
  • Why ChandlerCG
  • Services
  • Our Clients
  • Join Us
  • Contact Us
  • Certifications
    • Home
    • Who We Are
    • What We Do
    • Why ChandlerCG
    • Services
    • Our Clients
    • Join Us
    • Contact Us
    • Certifications
  • Home
  • Who We Are
  • What We Do
  • Why ChandlerCG
  • Services
  • Our Clients
  • Join Us
  • Contact Us
  • Certifications

Services

Cloud Information System Security Officer (ISSO) Services

Standard

Standard

Standard



  • Support for 1 or 2 Systems, 2 Major Applications, or 1 General Support System
  • Support Development of Security Plan Contingency Plan, Contingency Plan Test, Privacy Threshold Assessment, Privacy Impact Assessment      
  • Support Development of Security   Authorization Documentation     
  • Development of POA&Ms
  • Participate in Monthly Meetings 
  • Cloud Based Systems Software As A Service (SAAS) and Platform As A Service (PAAS) 
  • Review and Comment on Risk Memos
  • Review and Comment on Waivers  

Pro

Standard

Standard



  • Support for 1 to 4 Systems, 2 General Systems, or 1 General Support System and 2 Major Applications, or 4 Major Applications 
  • Support Development of Security Plan Contingency Plan, Contingency Plan Test, Privacy Threshold Assessment, Privacy Impact Assessment      
  • Support Development of Security   Authorization Documentation     
  • Development of POA&Ms
  • Participate in Monthly Meetings 
  • Cloud Based Systems Software As A Service (SAAS) and Platform As A Service (PAAS) 
  • Review and Comment on Risk Memos
  • Review and Comment on Waivers
  • Client Server Based Systems Supported
  • POA&M Weakness Monitoring
  • Support Weakness Remediation
  • Participate In Bi-Weekly Meetings

Premium

Standard

Premium



  • Support for 1 to 6 Systems, 3 General Support Systems, and 1 Major Applications, and 2 General Support Systems and 2 Major Applications 
  • Support Development of Security Plan Contingency Plan, Contingency Plan Test, Privacy Threshold Assessment, Privacy Impact Assessment      
  • Support Development of Security   Authorization Documentation     
  • Development of POA&Ms
  • Participate in Monthly Meetings 
  • Cloud Based Systems Software As A Service (SAAS) and Platform As A Service (PAAS) 
  • Review and Comment on Risk Memos
  • Review and Comment on Waivers 
  • Client Server Based Systems Supported
  • POA&M Weakness Monitoring
  • Support Weakness Remediation
  • Participate In Bi-Weekly Meetings
  • Waiver Documentation Development 
  • Participate in Weekly Meetings 
  • Vulnerability Scanning of General Support Systems and Major Applications 
  • Development of Risk Memos
  • Weakness Scorecard Improvement Plans  

Protection of Critical Assets Plan

  

We will help you build commercial classified networks for protecting critical intellectual property and critical trade secrets. Help prevent and minimize the impacts of a hacker or data breach by running air-gapped

Small Network

Medium Network

Medium Network

  • Design and Project Oversight 
  • Security Architecture
  • Vulnerability Scanning 
  • Weakness Remediation Support 
  • Penetration Testing*

Medium Network

Medium Network

Medium Network

  • Design and Project Oversight 
  • Security Architecture
  • Vulnerability Scanning 
  • Weakness Remediation Support 
  • Penetration Testing*

Large Network

Medium Network

Large Network

  • Design and Project Oversight 
  • Security Architecture
  • Vulnerability Scanning 
  • Weakness Remediation Support 
  • Penetration Testing*

Rapid Security Assessment 60 Days

Standard

Standard

Standard



Support for 1 or 2 Systems, 2 Major Applications, or 1 General Support System 

Pro

Standard

Standard



Support for 1 to 4 Systems, 2 General Systems, or 1 General Support System and 2 Major Applications, or 4 Major Applications 

Premium

Standard

Premium



Support for 1 to 6 Systems, 3 General Support Systems, and 1 Major Applications, and 2 General Support Systems and 2 Major Applications 

Vulnerability Scans and Assessments

Nessus Tenable

Nessus Tenable

Nessus Tenable

Allow us to use one of the most trusted vulnerability assessment tools available to solve your vulnerability assessment needs.

Qualys

Nessus Tenable

Nessus Tenable

Run a deep, full scan of your project with Qualys Vulnerability Assessment and allow us to remediate any vulnerabilities.

Detectify

Nessus Tenable

OWASP Web Scanner

Run a deep, full scan of your project with Detectify and allow us to remediate any vulnerabilities.

OWASP Web Scanner

OWASP Web Scanner

OWASP Web Scanner

Run a full penetration test on your website with OWASP ZAP security tool and allow us to remediate any security flaws and vulnerabilities.

Sucuri SiteCheck

OWASP Web Scanner

Sucuri SiteCheck

Sucuri SiteCheck scanner will check your website for known malware, viruses, blacklisting status, website errors, out-of-date software, and malicious code, and we will remediate any issues.

Mozilla Observer

OWASP Web Scanner

Sucuri SiteCheck

Allow us to scan your URL and make the appropriate remediation methods.

AWS Inspector

Contrast Security

Contrast Security

Using AWS environments for your project? Allow us to use AWS Inspector to scan any findings in your environment(s), and make appropriate changes.

Contrast Security

Contrast Security

Contrast Security

Using .NET Framework? Contrast Security provides top-of-the-line application security. We can remediate any of your vulnerabilities in no time.

Rapid7

Contrast Security

Rapid7

Worried about cross-site scripting? Allow us to scan your domain with Rapid7 vulnerability scanner. 

For more pricing information, please contact us.

Contact us

Copyright © 2021 ChandlerCG - All Rights Reserved.