Dnet Security has worked with Federal, State and Local Agencies as well as a Commercial Businesses to make sure their systems are safeguarded. To Dnet our tagline of “Making Security a Reality” is more than just a slogan and our clients can attest to that.

Our clients include:


U.S Census Bureau

U.S Census Bureau

As a Subcontractor to a large company, Dnet is providing the Census Bureau with security engineering support for the design, development and deployment of an infrastructure that includes cloud and on premise environments. The infrastructure will include solutions for endpoint security, intrusion detection/prevention, Security Information and Event Management (SIEM), and supporting with the roll out of Encryption and key management solutions for Decennial projects. Dnet is responsible for planning, designing and implementing tools, technologies and methods that meet Federal security control requirements. We provide subject matter expertise throughout the system development lifecycle to ensure that the infrastructure maintains a strong security posture capable of countering current and emerging threats.


U.S. Courts Office of Administration

U.S. Courts Office of Administration

Dnet Security was contracted by a large business to provide Firewall Migration Support and Network Engineering Services for the U.S. Courts Office of Administration. We performed project-based engineering, design, installation and the troubleshooting of data/security networks. Dnet worked with the engineering team to successfully implement secure network solutions. We supported the U.S. Courts through planning, design and implementation of clustered network security tools to over 600 sites. This included developing comprehensive graphical and text-based design documentation. Dnet successfully configured and managed the deployment of security tools in cluster to various court sites.


Bureaus of Labor Statistics

Bureaus of Labor Statistics

Dnet Security provided the Bureaus of Labor Statistics with security tools management through a subcontract with a large business. It was our role to manage a five-member team to maintain and support Bureau of Labor Statistic’s (BLS) PKI, Firewalls, IPS/IDS, and Endpoint servers. Dnet configured, installed and maintained network/endpoint security and key management tools. We also provided the Network Operations Team with guidance and leadership on how to enforce the Agency’s information security policy.


OIG/HHS

OIG/HHS

Dnet Security was subcontracted to design and implement an endpoint solution for OIG/HHS. This task included designing and implementing mobility access and site-to-site solution for OIG/HHS. This implementation helped the OIG to save costs associated with existing T1 lines. Dnet recommended changes that improved performance of the Firewall gateways. We also validated and updated configurations on all software blades. This enabled us ensure that the fully implemented solution met industry standards and conformed to customer requirement.


FDIC

FDIC

As a subcontractor, Dnet led a team of three Security Engineers at the FDIC. We provided subject matter expertise on Firewalls and successfully managed the deployment of security tools in cluster to replace existing tools. Dnet directly led and provided oversight for multiple complex infrastructure projects and represented Information Security on infrastructure governing boards. As a representative, we developed future roadmaps, provided recommendations on projects, processes and policies and ensured continuous monitoring for the deployed firewalls for unauthorized access attempts.


Olympus

Olympus

Dnet Security set the overall Information Security strategy for Olympus Corporation of the Americas. We worked in conjunction with Olympus Tokyo to define and implement global security initiatives. Dnet maintained responsibility for all security matters, ensuring compliance, remediation and security of application information. As part of the process Dnet conducted periodic security risk/vulnerability assessments, assessed overall exposures and identified the actions required to address any gaps. We took that information and created a process to manage and approve exceptions to the security policy. This included leading cross-functional teams to design and implement new security solutions, such as identity management, data leakage protection, Full Disk Encryption, Endpoint and Advanced threat protection.


Other clients include: