{"id":6274,"date":"2020-04-10T17:40:15","date_gmt":"2020-04-10T17:40:15","guid":{"rendered":"http:\/\/allbatross.com\/radiant\/?page_id=6274"},"modified":"2020-06-07T20:03:14","modified_gmt":"2020-06-07T20:03:14","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/radiantllc.com\/index.php\/cyber-security\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; overlay_strength=&#8221;0.3&#8243; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_link_target=&#8221;_self&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; overlay_strength=&#8221;0.3&#8243; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221;][page_submenu alignment=&#8221;center&#8221; bg_color=&#8221;#c34000&#8243; link_color=&#8221;#ffffff&#8221;][page_link link_url=&#8221;https:\/\/radiantllc.com\/\/index.php\/software-development\/&#8221; title=&#8221;Software Development&#8221; id=&#8221;1591560004726-0&#8243; tab_id=&#8221;1591560004728-9&#8243;] [\/page_link][page_link link_url=&#8221;https:\/\/radiantllc.com\/\/index.php\/data-management\/&#8221; title=&#8221;Data Management&#8221; id=&#8221;1591560004828-8&#8243; tab_id=&#8221;1591560004829-9&#8243;] [\/page_link][page_link title=&#8221;Cloud Infrastructure &amp; DevOps&#8221; id=&#8221;1591560004856-10&#8243; tab_id=&#8221;1591560004857-6&#8243; link_url=&#8221;https:\/\/radiantllc.com\/\/index.php\/cloud-infrastructure\/&#8221;][\/page_link][page_link title=&#8221;Cyber Security&#8221; id=&#8221;1591560004903-4&#8243; tab_id=&#8221;1591560004905-9&#8243; link_url=&#8221;https:\/\/radiantllc.com\/index.php\/cyber-security\/&#8221;][\/page_link][\/page_submenu][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;20px&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; top_padding=&#8221;40px&#8221; overlay_strength=&#8221;0.3&#8243; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;padding-5-percent&#8221; column_padding_position=&#8221;top&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_link_target=&#8221;_self&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; overlay_strength=&#8221;0.3&#8243; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221;][vc_column_text]<strong>Radiant<\/strong> offers comprehensive support for security offerings and Information Assurance (IA) programs. We assess and implement integrated solutions for physical, technical, operations, personnel, computer and communication security requirements. From vulnerability assessments to monitoring and traffic analysis, Radiant\u2019s integrated cybersecurity solutions safeguard mission-critical systems against the widest range of internal and external threats. Radiant\u2019s end-to-end defense solutions continuously monitor and protect against breach, fraud, theft and sabotage. No matter how complex the system or threat, Radiant is trusted to deliver a proven, powerful line of cyber defense solutions. Radiant provides expertise in the following areas:<\/p>\n<ul>\n<li>FISMA, NIST 800 series, DoD 8500+, CNSS<\/li>\n<li>Risk Management Framework (RMF)<\/li>\n<li>Security Assessment and Authorization<\/li>\n<li>FedRAMP&amp; Cloud Security<\/li>\n<li>Vulnerability Assessments<\/li>\n<li>Security Development Lifecycle<\/li>\n<li>Security Architecture &amp; Design<\/li>\n<li>Security Verification &amp; Validation<\/li>\n<li>Computer Network Defense (CND)<\/li>\n<li>Incident Response<\/li>\n<li>Security Awareness and Training<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; overlay_strength=&#8221;0.3&#8243; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_link_target=&#8221;_self&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; overlay_strength=&#8221;0.3&#8243; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221;][page_submenu alignment=&#8221;center&#8221; bg_color=&#8221;#c34000&#8243; link_color=&#8221;#ffffff&#8221;][page_link link_url=&#8221;https:\/\/radiantllc.com\/\/index.php\/software-development\/&#8221; title=&#8221;Software&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-6274","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/radiantllc.com\/index.php\/wp-json\/wp\/v2\/pages\/6274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/radiantllc.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/radiantllc.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/radiantllc.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/radiantllc.com\/index.php\/wp-json\/wp\/v2\/comments?post=6274"}],"version-history":[{"count":11,"href":"https:\/\/radiantllc.com\/index.php\/wp-json\/wp\/v2\/pages\/6274\/revisions"}],"predecessor-version":[{"id":6295,"href":"https:\/\/radiantllc.com\/index.php\/wp-json\/wp\/v2\/pages\/6274\/revisions\/6295"}],"wp:attachment":[{"href":"https:\/\/radiantllc.com\/index.php\/wp-json\/wp\/v2\/media?parent=6274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}