Torch uses industry and DoD best practices and processes to help provide DoD with Information System Security Management (ISSM), Security Control Assessor (SCA) support and Computer Network Defense. Torch prepares for and conducts Vulnerability Assessments, data analysis, risk assessments, and Risk Management Framework (RMF) reports. The reports are used to support connection decisions such as; Authorization to Operate (ATO), Authorization to Connect (ATC), and Interim Authorization to Test (IATT). Data from tests and authorization decisions are collected, organized, stored, and shared using DoD standard tools such as Assured Compliance Assessment Solution (ACAS), enterprise Mission Assurance Support System (eMASS) and an enhanced Enterprise SharePoint solution.
System Security and Network Defense
Specialized Scientific Environments
Providing Network Security within a Complex Scientific System
Torch provides IT solutions for data management and scientific computing applications. Torch personnel have database development, web application programming, and enterprise software development experience. We apply a CMMI Level 3 software development environment to perform design and requirements analysis, implementation, quality assurance, training, documentation, and deployment. This experience is used to develop and maintain data warehouses, enterprise reporting systems, data analysis tools, and management information systems. We also develop and support enterprise-wide information systems to include designing, developing, installing, modifying, and maintaining computer hardware, software, and associated peripherals and licensing agreements. We manage routine upgrades, system security scans and configuration, security accreditation, and disaster recovery programs. Torch is also responsible for network support for classified and unclassified systems.