top of page

b

Services, Tools, and

Templates for:

Welcome to i2 Compliance Tools

  • CMMC

  • DFARS

  • NIST

  • CNSSI

  • FIPS

  • RMF

  • DSS AAPM

Businessmen

LEARN MORE ABOUT CMMC

SIGN UP FOR THE NEXT CMMC WEBINAR

IS YOUR COMPANY CYBERSECURITY COMPLIANT?

 

TEMPLATES AND SERVICES FOR

CMMC | DFARS | NIST 800-171 | CNSSI | SUPPLY CHAIN AND OTHER CYBER REQUIREMENTS

WHO WE ARE AND WHAT WE DO:


Imprimis was started in 2004 and supported government customers in two major areas: defense training and engineering. The corporation has evolved over the years and now has a robust business in cybersecurity, is still active in training, and supports space programs to include space situational awareness (SSA) instrumentation and small satellites.
The cybersecurity practice includes Risk Management and Compliance with emphasis on the DFARS/FAR and NIST cybersecurity standards, and now the new DoD CMMC (Cybersecurity Maturity Model Certification).  Imprimis is also developing a cloud-based advanced intrusion detection system (IDS) for industrial control systems and is expanding this application to system monitoring.  Training is primarily focused on cybersecurity training for everyone – the cybercitizen, cyber executive, and the IS professionals.

CYBERSECURITY - WHY IT IS IMPORTANT:


Cybersecurity is everyone’s problem and everyone’s responsibility.  At the end of 2016, there were 326 million Americans.  Of these, 287 million “went to the internet” with a computer or mobile device.  That is 88% of all Americans including infants and senior citizens! At the same time there were about 2.8 million trained IT professionals in the US.  So, about 1 % were trained in IT and only a small fraction of the IT professionals is trained in security.  Hackers, thieves, and state actors all see the U.S. as a “target rich environment”.  
So, if freedom to continue using IT devices is important – and it is – then the responsibility must be shared by every citizen, organization, and government.  We not only have to protect ourselves and our businesses against criminal cyber activity, but we must also accept the responsibility for keeping our connections safe with our customers, stakeholders, personnel, and business partners by practicing good cyber-hygiene.


The core competencies of cybersecurity include basics like access control, network security (on-premises, cloud, and virtual), endpoint protection, application security, and encryption.   The standards being promulgated by the National Institute for Standards and Technology (NIST) and the new Cybersecurity Maturity Model Certification (CMMC) cover the core competencies and add process and procedural elements to improve security.  However, organizations not compelled to implement standards should still implement the basic core competencies or best practices. 


Imprimis has developed three Cybersecurity programs for this purpose.  They provide the core competencies of cybersecurity and lay a foundation for future compliance efforts as they are required.
 

WE ADAPT TO OUR CUSTOMERS:

Imprimis recognizes that every business is unique.  Even businesses of the same size in the same business vertical are very different and have different needs, policies, cultures and approaches to their business.  They also have different capability sets where some may have experienced IT and information security personnel, others outsource their IT and some very small companies may have no IT support at all.  


Imprimis believes in adapting to the needs of our clients in one of, or a combination of, the following ways:

  1. We provide ‘do it yourself’ templates and tools to assist our clients that plan to undertake the compliance effort by themselves. These are very cost effective and save a great deal of labor for our clients. 

  2. Imprimis can work with your company as a ‘team’ by using the Imprimis Express Packages which quickly allow completion of the planning phase of the compliance project.  The Express packages include NIST 800-171 Assessments, Policies and Procedures (P&P), the System Security Plan (SSP), the Incident Response Plan (IRP), and the Plan of Actions & Milestones (POA&M).  The client then decides on an approach to remediation implementation: use internal staff, Imprimis services, another third party, or any combination that fits their needs. Imprimis will provide as much or as little remediation support as the client wants and needs.  Once compliance is achieved, Imprimis is available to provide the needed sustainment support to include continuous monitoring, vulnerability scanning and management, training, incident response, CISO services and ongoing advisory. 

  3. The third option is the Imprimis “turn-key” process where the client commits to the entire program up front.  In this scenario, Imprimis will quickly develop a POA&M and complete remediation and then move the client into sustainment.  If desired, Imprimis will continue to support the client in sustaining their compliance. While bringing the client into compliance Imprimis will provide all documentation required including the completed final assessment, P&P, SSP, IRP, and a detailed “audit book” to support the new CMMC.

  4. Finally, Imprimis provides consulting whenever required by our clients.  This support can apply to strategic planning or technology and cybersecurity advisory.  Considering cybersecurity requirements during the acquisition of new technology is always recommended to avoid buying technology that does not support the client’s overall cybersecurity plan.

 
Let us help you become cybersecure today!

IMPRIMIS PRODUCTS, SERVICES, & SOLUTIONS

CMMC | NIST 800-171 | DSS AAPM

i2ACT 800 Cybersecurity Assessment Software Tools

  • i2ACT-800s

  • i2ACT-800 PRO

i2ACT Do It Yourself Templates

  • Policies & Procedures

  • System Security Plan

  • Incident Response Plan

DIY
DO IT YOURSELF
TEAM UP
WITH THE i2 TEAM

CMMC | NIST 800-171 | DSS AAPM

i2ACT 800 Cybersecurity Assessment Software Tools

  • i2ACT-800s

  • i2ACT-800 PRO

Express Packages - i2 Packaged Design

  • CMMC | NIST 800-171

  • Assessment Completed

  • Policies & Procedures

  • Completed POA&M

  • Completed SSP

  • Completed IRP

Remediation Support as Needed

Firewall, Segmentation, Managed Switch Support, etc.

Consultative Services as Needed

  • CISO

  • Incident Response

  • Risk Management

  • Supply Chain Support

HAVE IT DONE
BY THE i2 TEAM

CMMC | NIST 800-171 | DSS AAPM

i2ACT 800 Cybersecurity Assessment Software Tools

  • i2ACT-800s

  • i2ACT-800 PRO

Express Packages - i2 Packaged Design

  • CMMC | NIST 800-171

  • Assessment Completed

  • Policies & Procedures

  • Completed POA&M

  • Completed SSP

  • Completed IRP

CMMC | NIST 800-171 Turnkey Through Remediation

Remediation through Compliance

CMMC | NIST 800-171 Turnkey Through Sustainment

  • Monitoring, Scanning, Training

MSP Services

  • Automated Patch Management & support

  • IT Network Services

Consultative Services as Needed

  • CISO

  • Incident Response

  • Risk Management

  • Supply Chain Support

Cybersecurity Process Overview

TELL

YOUR

STORY

Testimonials

“Working with Imprimis tools and services has been productive, to say the least!  The friendliness of the i2ACT-800 tools and various templates provide an “expert system” on the path to compliance.  Imprimis’ support staff have provided stellar, just-in-time help when I’ve had questions.”

Steve Gleason

Micro Craft, Inc.

“Imprimis, Inc. (i2) was indispensable in launching our NIST 800-171 compliance effort.  The i2ACT-800 software platform turned the daunting task of assessment into a methodical and thoroughly documented process.  The on-site assessment support provided critical technical and regulatory guidance to help us interpret the controls in the specific context of our organization’s operational environment, and to ensure that our assessment was accurate and our remediation plan sufficient.  Thanks to Imprimis, we now have a clear understanding of our 800-171 status and a solid plan to efficiently achieve and maintain full compliance.”

Michael Kleemann

Variation Reduction Solutions, Inc.

1 / 1

Please reload

Demo
bottom of page