Our Company
AG Grace offers risk management services to provide the guidance and support to select, integrate and automate multiple risk management programs to improve IT governance, risk and compliance across the following services and sectors: Health Care, Information Technology, Finance, Privacy, Supply Chain Management, Cyber Security, Disaster Recovery and Back-Up Solutions.
AG Grace provides 24×7 information technology services and support to our customers, cloud services and integration. Our employees hold and maintain industry certifications from ITIL, COBIT, ISO, SANS, ISC2, & COMPTIA.
Developing the Future – Cyber Defense, Security & Intelligence
AG Grace Designs distributed automated and interoperable environments that satisfy 5 key objectives important to our customers: Security, Affordability, Ease of Use, Scalability and Interoperability.
We build secure capabilities into cyber device (computers, software and hardware) configurations that allow them to act preventively or defensively coordinating the response among fixed, mobile or global devices, providing near real time continuous monitoring and reporting. We help our customers thwart attacks in near real time thereby managing risk and building confidence in the integrity of your information and information systems; helping customers comply with federal laws and regulations.
AG Grace helps the Department of the Army achieve its goal to develop, provide, integrate and sustain the logistics and readiness of C4ISR systems and mission command capabilities for joint, interagency and multinational forces worldwide, we are committed to providing a broad array of software development solutions, products and services that foster a secure information technology infrastructure to help protect information and information systems. We take a holistic approach to managing risk to identify and eliminate threats long before they can do damage.
Adaptive Technology – Prevent Instead of React!
AG Grace and our partners have an arsenal of solutions and tools; once deployed provide software integrity protection, defense in depth, secure software provisioning, life cycle management, intrusion prevention, intrusion detection, continuous monitoring and reporting of key security metrics.
We believe that the future of cyber security rests upon the ability of our customers to adapt technologies and capabilities to allow for defensive and preventive courses of action that can be coordinated with other devices within the information technology infrastructure. Cyber defense can be an automated function in the future; meaning that cyber devices must have the ability to communicate in near real time with each other about attacks and have the ability to coordinate with each other in real time to harden the security response and prevent the attack.
Classifications:
DUNS # 788689607
UEI #: NF7UV6N37HP5
CAGE CODE 4LTK4
519190-All other information services
541511- Custom Computer Programming Services
541512- Computer System Design Services
541513-Computer Facilities Management Services
541519-Other Computer Related Services
541611- Administrative Management and General Management Consulting
541612-Human Resources Consulting Services
541614-Process, Physical Distribution, and Logistics Consulting Services
541618- Other Management Consulting Services
541690- Other Scientific and Technical Consulting Services
541990-All other professional and scientific technical services
561110- Office Administrative Services
561311-Employment Placement Agencies
561320- Temporary Help Services
611420- Computer Training
611430- Professional and Management Development Training
611669- All other miscellaneous Schools and Instruction
611710- Educational Support Services
Small Business Categories:
- Woman Owned Small Business (WoSB)
- Service-Disabled Veteran Owned Small Business (SDVoSB)
- Small Disadvantaged Business (SDB)
- Small Business (SB)
Security Services – Our Focus and Specialization
Our team includes security professionals possess DOD 8570.01-M Certifications and are experienced in:
- Project Management
- Information Assurance
- Certification and Accreditation
- Key Management
- PKI
- Risk Assessment
- Security Engineering
- Security Policy Management
- Vulnerability Assessment
- Penetration Testing
- Risk Management
- Configuration Management
- Security Testing and Evaluation
- Disaster Recovery/Business Continuity
- Incident Detection, Response & Reporting
- FISMA Audit and Compliance