Alion Science and Technology Website Home Button

Home Button

  Cart
Cart
 
Next Steps

 

Other Trust Topics

 

 

 

Vault

Security

Alion believes in delivering high confidentiality, integrity, and availability hosting for our CounterMeasures® users’ enterprise risk management solutions. We use a comprehensive approach to protect client data by continuously monitoring and improving our software, hardware and processes to meet the ever evolving world of information security.

Secure Data Centers
Our servers are hosted in a dedicated server on, modern data centers that are evaluated to the National Institute of Standards in Technology standards for recommended security controls. The data centers have the following attributes:

 

Access Control and Physical Security  
  • Controlled access building with brick & concrete construction
  • Electronically controlled access to dedicated Data Center rooms
  • Computing equipment in access-controlled steel cages
  • Video surveillance throughout facility
 
Network  
  • Digicert iconNetwork redundant; connects to both At&t and Verizon
  • High bandwidth capacity
  • Secure transmission and sessions
  • Connection to the CounterMeasures® environment is via SSL 3.0/TLS 1.0, using global step-up certificates from Verisign, ensuring that our users have a secure connection from their browsers to our service
  • Individual user sessions are identified and re-verified with each transaction, using a unique token created at login
 
Network Protection  
  • Perimeter firewalls and edge routers block unused protocols
  • Internal firewalls segregate traffic between the application and database tiers
  • Intrusion detection sensors throughout the internal network report events to a security event management system for logging, alerts, and reports
  • Network operation center personnel continuously scans the network externally and alerts changes in baseline configuration
 
Testing and Assessments  
  • Countermeasures.com tests all code for security vulnerabilities before release, and regularly scans our network and systems for vulnerabilities
  • Application vulnerability threat assessments
  • Network vulnerability threat assessments
  • Selected penetration testing and code review
  • Security control framework review and testing
 
Security Monitoring  
  • Our IT Security department monitors notification from various sources and alerts from internal systems to identify and manage threats
 
Fire Detection and Suppression  
  • VESDA (very early smoke detection apparatus)
  • Dual-alarmed, dual-interlock, multi-zone, pre-action dry pipe water-based fire suppression
  • Environmental controls
  • Humidity and temperature control
  • Redundant (N+1) cooling system

 


 
Copyright © Alion Science and Technology Corporation ׀ Privacy Policy ׀ Legal Notice ׀ Section 508 Notice