enterprise services to prevent, prepare, and protect against cyber risk.
Anchor provides a full spectrum of cybersecurity services assisting our clients with all aspects of cybersecurity risk planning, identification, management, and monitoring.
Services by Engagement Type
Anchor provides varying engagements depending on your organization’s budget, risk profile and requirements. Many options can be assembled into larger or smaller customized offerings. Our solutions consultants can help you choose which engagements best fit your needs.
Risk planning services provide your organization with an appropriate and tuned approach to securing its brand and assets. Without a plan for security, elements in your program may be incomplete or may be misaligned with your risk profile. Anchor’s solutions include atStrategy, atCISO and atPlan.
- atStrategy | Formally defines strategic objectives and prioritizes them according to the mission and budget of the organization.
- atCISO | The virtual Chief Information Security Officer provides a resource to help guide and execute the strategic plan.
- atPlan | These provide key plans supporting compliance and best practice requirements, including the Information Security Policy, IR Plan, BC/DR.
Assessment services provide your organization with a map to cyber risk present in the environment. These offereings allow you to identify the risk in advance so that you can remediate that risk before an attacker exploits the weakness.
- atVuln | An investigative process to identify and review any technical vulnerabilities that are found on the network. Focusing on both an external (Internet) and internal perspectives, ATI reviews all IP addresses on the network.
- atAssess | atAssess is designed to provide a snapshot of your organization’s current implementation of security controls and policies. It provide a perspective on current operatonal maturity as it relates to your cybersecurity program.
- atArch |An Architecture Review evaluates an organization’s networks and relationship among them from a security perspective. It also reviews the various security zones and the data flows among them. The goal of this review is to identify weaknesses being created or exacerbated by network architecture elements.
- atTech | The Technical Controls Review focuses on all of your technical security controls and systems including firewalls, intrusion detection/prevention systems, anti-malware, mobile device management systems and endpoint protection solutions. Each control is individually reviewed and scored providing detailed findings and recommendations.
Risk testing services provide your organization with an real world evaluation of the performance of configuration, staff and technical cyber security controls. These are ethical hacking exercises designed to replicate real-world hacking techniques and methodologies. Typically, you want to test your environment after you have remediated known weakness discovered previously in an assessment.
- atAttack | Penetration testing is offered in various forms focusing on specific areas, such as the network, wireless, an application or the people. All testing follows the accepted PTES or OWASP standards for thorough and safe testing.
- atRedTeam | The Red Teaming exercise is a Penetration with fewer boundaries relating to safety and scope. These are generally specifically designed for the envionment and desired outcomes. These exercises are often run without advance staff knowledge or participation and test controls as well as staff reaction and response capability.
Compliance services provide your organization with an understanding or current state complaince with a standard or regulation. Currently, Anchor offers Risk and Complaince assessments for the following standards:
– Center for Internet Security’s 20 Critical Security Standards (CIS CSC)
– NIST Cyber Security Framework (NIST CSF)
– NIST FISMA suite of requirements including the SSP and PoAM
– ISO/IEC 27001
– PCI DSS Sections 11.2 & 11.3
– HIPAA / HITECH
– NIST 800-53
– NIST 800-171
– CMMC v.07+
– AICPA SSAE16 SOC2 Type II
- atComply | The compliance assessment reviews all controls defined in the target standard or regulation and score each control and sub control against 8 different characteristics providing a very detailed current state analysis and a detailed remediation plan to achieve full compliance.
- atPlan | These provide key plans supporting compliance and best practice requirements, including the Information Security Policy, IR Plan, BC/DR. Theses offereings can also include plans specific to the requirements in a standard or regulation such as a Systems Security Plan or a Statement of Applicability for example.
Outsourced technical expertise to augment your IT staff.
From installation to configuration to patch management. As needed, on demand.
Anchor has deep experience with most industries and leverages this experience to provide a tailored and custom fit with engagements that meet your specific needs.
Design and Procurement Services
We offer best of breed solutions and security controls from most of the leading manufacturers in the cybersecurity space as well as additional vendors, such as VMware, Microsoft and Cisco. Our design engineers maintain top level manufacturer certifications and design small and large product solutions. We support many procurement vehicles including leasing options, credit card, government, check or wire transfer.
Integration Engineering and Support
Once you have procured your new security controls it is important to implement the products as completely and correctly as possible. Our engineers implement these products every day and have experience in many different size environments as well as special circumstances, such as “zero” down time environments and highly controlled environments.
Security Control Check-up
Ensuring that your technical security controls and products are properly implemented and secured is a foundational step to securing your environment. We offer an engagement to review the current control(s) and their implementation completeness, control selection appropriateness as well as six additional dimensions of review. This engagement ensures that your cybersecurity products are really providing the security you think they are.
Cybersecurity is ever evolving; keep pace with education and training.
Our live, online instructor led classes are taught remotley from our Authorized Training Center. Comprehensive education and training to expand your security knowledge.
Check Point Technical Certification Training
Check Point security training aligns with the Check Point Core training as well as additional speciality classes (Product Training) focused on advanced skills. The Check Point certified administrator, engineering and Maestro classes run monthly and the additional classes run as demand supports them. Please let us know if you are interested in classes beyond the CCSA, CCSE or Maestro. email@example.com
CompTIA Certification Training
CompTIA offers many certifications and our program focuses on the cybersecurity cirruclum. Specifically the Network+ and the Security+. Both of these serve as great foundational courses for security practioners. These courses are taught by experienced security consultants and network engineers with each over 15 years of real world field experience.
Check Point Cybersecurity Administrator (CCSA)
The CCSA course is essential for security administrators who want to configure security policies, secure communications across the Internet, defend against network threats, and manage a secure network. This course covers concepts and skills necessary to implement, configure and maintain Check Point Software Blades including Firewall, IPSEC VPN, IPS, IPSO, network policy management, logging, status and monitoring, URL filtering, anti-virus, anti-malware, anti-spam & email security. Attendees should have working knowledge of windows, UNIX< networking technology, the Internet, and TCP/IP.
Check Point Cybersecurity Expert (CCSE)
Validate and enhance your skills and optimally manage Check Point advanced security management systems. The advanced course teaches how to build, modify, deploy and troubleshoot Check Point Security Systems on the GAiA operating system. Hands-on lab exercises teach how to debug firewall processes, optimize VPN performance and upgrade Management Servers. Attendees should have CCSA training and certification with a working knowledge of Windows and/or UNIX, networking technology, the Internet, and TCP/IP.
This technical training course teaches theoretical and practical skills of Scalable Platform Expert. Learn in-depth understanding of Maestro architecture and infrastructure. Hands-on lab exercises teach how to build setups for deployment in production environments. Attendees should have CCSE training and certification.
Certified Cloud Specialist (CCCS)
Technical professionals who support, install, deploy, or administer Check Point products in cloud environments will learn the basic concepts and skills necessary to administer Check Point CloudGuard security solutions. Attendees should have working knowledge of Cloud Native Deployment using Microsoft Azure and Amazon Web Services, TCP/IP Networking, and Check Point security products.
Check Point Troubleshooting Administrator (CCTA)
This course is designed for security administrators and Check Point resellers who need to manage and monitor issues that may occur within their Security Management environment. Gain an understanding of the concepts and skills necessary to troubleshoot issues which may occur when managing the Check Point Security Management architecture and Security Gateways. Attendees should have working knowledgeof UNIX and/or Windows operating systems, as well as Networking TCP/IP. Attendees should also have advanced knoweldge of Check Point Security products and CCSA training/certification.
Check Point Troubleshooting Expert (CCTE)
This course is designed for security experts and Check Point resellers who desire to obtain the necessary knowledge required to perform more advanced troubleshooting skills while managing their security environments. Learn advanced troubleshooting skills to investigate and resolve more complex issues that may occur while managing your Check Point Security environment. Attendees should have working knowledge of UNIX and/or Windows operating systems, as well as Networking TCP/IP. Advanced knowledge of Check Point Security Products are also recommended.
Technical professionals who support, install, deploy, or administer Check Point products will learn basic concepts and develop skills necessary to administer Harmony Endpoint security solutions. Attendees should have working knowledge of Windows, UNIX, networking technology, the Internet, and TCP/IP security solutions.
Why Train with Anchor?
We are engineers like you and know what it takes to pull away from the office to focus on taking a class. Why not enjoy the experience? Why not train with engineers that use and implement the technology they teach? We are 20 minutes from BWI airport and half way between Washington, DC and Baltimore located in beautiful Columbia, MD.
We provide a great breakfast, lunch, snacks, sodas, coffee and water. Lunches are from popular well-known restaurants, such as as Jimmy John’s, Chik-fil-a, Chipotle, Little Caesar’s, Dunkin’ Donuts and Panera. No hotel food.
Our instructors have over 15 years experience with the technology they teach. They are real engineers that have implemented the solutions in 100’s of organizations.
Anchor training facilities are purpose built for advanced technical training. The equipment is new and powerful. No waiting for screens to load, or dealing with hotel room setups thrown together.
Start Your Path to Protection Today
True cybersecurity is a journey. Threats and vulnerabilities are ever evolving. Define your strategy, identify your risk, and manage that risk today — before its too late.