

PRODUCED AND DEVELOPED BY IMPRIMIS INC
b

IS YOUR COMPANY CYBERSECURITY COMPLIANT?
TEMPLATES AND SERVICES FOR
CMMC | DFARS | NIST 800-171 | CNSSI | SUPPLY CHAIN AND OTHER CYBER REQUIREMENTS
WHO WE ARE AND WHAT WE DO:
Imprimis was started in 2004 and supported government customers in two major areas: defense training and engineering. The corporation has evolved over the years and now has a robust business in cybersecurity, is still active in training, and supports space programs to include space situational awareness (SSA) instrumentation and small satellites.
The cybersecurity practice includes Risk Management and Compliance with emphasis on the DFARS/FAR and NIST cybersecurity standards, and now the new DoD CMMC (Cybersecurity Maturity Model Certification). Imprimis is also developing a cloud-based advanced intrusion detection system (IDS) for industrial control systems and is expanding this application to system monitoring. Training is primarily focused on cybersecurity training for everyone – the cybercitizen, cyber executive, and the IS professionals.
CYBERSECURITY - WHY IT IS IMPORTANT:
Cybersecurity is everyone’s problem and everyone’s responsibility. At the end of 2016, there were 326 million Americans. Of these, 287 million “went to the internet” with a computer or mobile device. That is 88% of all Americans including infants and senior citizens! At the same time there were about 2.8 million trained IT professionals in the US. So, about 1 % were trained in IT and only a small fraction of the IT professionals is trained in security. Hackers, thieves, and state actors all see the U.S. as a “target rich environment”.
So, if freedom to continue using IT devices is important – and it is – then the responsibility must be shared by every citizen, organization, and government. We not only have to protect ourselves and our businesses against criminal cyber activity, but we must also accept the responsibility for keeping our connections safe with our customers, stakeholders, personnel, and business partners by practicing good cyber-hygiene.
The core competencies of cybersecurity include basics like access control, network security (on-premises, cloud, and virtual), endpoint protection, application security, and encryption. The standards being promulgated by the National Institute for Standards and Technology (NIST) and the new Cybersecurity Maturity Model Certification (CMMC) cover the core competencies and add process and procedural elements to improve security. However, organizations not compelled to implement standards should still implement the basic core competencies or best practices.
Imprimis has developed three Cybersecurity programs for this purpose. They provide the core competencies of cybersecurity and lay a foundation for future compliance efforts as they are required.
WE ADAPT TO OUR CUSTOMERS:
Imprimis recognizes that every business is unique. Even businesses of the same size in the same business vertical are very different and have different needs, policies, cultures and approaches to their business. They also have different capability sets where some may have experienced IT and information security personnel, others outsource their IT and some very small companies may have no IT support at all.
Imprimis believes in adapting to the needs of our clients in one of, or a combination of, the following ways:
-
We provide ‘do it yourself’ templates and tools to assist our clients that plan to undertake the compliance effort by themselves. These are very cost effective and save a great deal of labor for our clients.
-
Imprimis can work with your company as a ‘team’ by using the Imprimis Express Packages which quickly allow completion of the planning phase of the compliance project. The Express packages include NIST 800-171 Assessments, Policies and Procedures (P&P), the System Security Plan (SSP), the Incident Response Plan (IRP), and the Plan of Actions & Milestones (POA&M). The client then decides on an approach to remediation implementation: use internal staff, Imprimis services, another third party, or any combination that fits their needs. Imprimis will provide as much or as little remediation support as the client wants and needs. Once compliance is achieved, Imprimis is available to provide the needed sustainment support to include continuous monitoring, vulnerability scanning and management, training, incident response, CISO services and ongoing advisory.
-
The third option is the Imprimis “turn-key” process where the client commits to the entire program up front. In this scenario, Imprimis will quickly develop a POA&M and complete remediation and then move the client into sustainment. If desired, Imprimis will continue to support the client in sustaining their compliance. While bringing the client into compliance Imprimis will provide all documentation required including the completed final assessment, P&P, SSP, IRP, and a detailed “audit book” to support the new CMMC.
-
Finally, Imprimis provides consulting whenever required by our clients. This support can apply to strategic planning or technology and cybersecurity advisory. Considering cybersecurity requirements during the acquisition of new technology is always recommended to avoid buying technology that does not support the client’s overall cybersecurity plan.
Let us help you become cybersecure today!
IMPRIMIS PRODUCTS, SERVICES, & SOLUTIONS
CMMC | NIST 800-171 | DSS AAPM
i2ACT 800 Cybersecurity Assessment Software Tools
-
i2ACT-800s
-
i2ACT-800 PRO
i2ACT Do It Yourself Templates
-
Policies & Procedures
-
System Security Plan
-
Incident Response Plan
DIY
DO IT YOURSELF
TEAM UP
WITH THE i2 TEAM
CMMC | NIST 800-171 | DSS AAPM
i2ACT 800 Cybersecurity Assessment Software Tools
-
i2ACT-800s
-
i2ACT-800 PRO
Express Packages - i2 Packaged Design
-
CMMC | NIST 800-171
-
Assessment Completed
-
Policies & Procedures
-
Completed POA&M
-
Completed SSP
-
Completed IRP
Remediation Support as Needed
Firewall, Segmentation, Managed Switch Support, etc.
Consultative Services as Needed
-
CISO
-
Incident Response
-
Risk Management
-
Supply Chain Support
HAVE IT DONE
BY THE i2 TEAM
CMMC | NIST 800-171 | DSS AAPM
i2ACT 800 Cybersecurity Assessment Software Tools
-
i2ACT-800s
-
i2ACT-800 PRO
Express Packages - i2 Packaged Design
-
CMMC | NIST 800-171
-
Assessment Completed
-
Policies & Procedures
-
Completed POA&M
-
Completed SSP
-
Completed IRP
CMMC | NIST 800-171 Turnkey Through Remediation
Remediation through Compliance
CMMC | NIST 800-171 Turnkey Through Sustainment
-
Monitoring, Scanning, Training
MSP Services
-
Automated Patch Management & support
-
IT Network Services
Consultative Services as Needed
-
CISO
-
Incident Response
-
Risk Management
-
Supply Chain Support
Cybersecurity Process Overview
TELL
YOUR
STORY
Testimonials

“Working with Imprimis tools and services has been productive, to say the least! The friendliness of the i2ACT-800 tools and various templates provide an “expert system” on the path to compliance. Imprimis’ support staff have provided stellar, just-in-time help when I’ve had questions.”
Steve Gleason
Micro Craft, Inc.
“Imprimis, Inc. (i2) was indispensable in launching our NIST 800-171 compliance effort. The i2ACT-800 software platform turned the daunting task of assessment into a methodical and thoroughly documented process. The on-site assessment support provided critical technical and regulatory guidance to help us interpret the controls in the specific context of our organization’s operational environment, and to ensure that our assessment was accurate and our remediation plan sufficient. Thanks to Imprimis, we now have a clear understanding of our 800-171 status and a solid plan to efficiently achieve and maintain full compliance.”
Michael Kleemann
Variation Reduction Solutions, Inc.
◄
1 / 1
►