COMSAT Cybersecurity Capabilities


COMSAT uses a baseline of controls and compliance objectives to consult with customers and tailor the implementation of any operational service.

The COMSAT cybersecurity plan is fully compliant with NIST 800-53 in both production and corporate networks, and continues to refresh processes in accordance with the latest standards Compliance in process of “refresh” to NIST 800-171.

COMSAT’s processes and procedures also follow NIST RMF (Risk Management Framework) as recommended for US Government agencies.

  • Geographic redundancy of Network Operations Center
  • Risk assessment and mitigation strategy for all customer and production networks

Detection & Control

The COMSAT engineering team will help customers tailor network configuration and firewall rules to prevent vulnerabilities.

  • Antivirus
  • Intrusion Prevention System
  • Data Filtering & File Blocking
  • Modern Malware Protection
  • Zero-day threat/exploit detection: Protection from targeted and unknown threats
  • URL Filtering

Risk Assessment

COMSAT works with each customer to determine the appropriate services based on their specific requirements, and will work with IT Managers in applying the appropriate controls to establish a baseline Security Posture

COMSAT goes through a complete Risk Valuation of customer implementation including:

  • Assessment:
    • Review Policy
    • Document Review
    • System Configuration Review
  • Penetration Testing:
    • Network Sniffing
    • Vulnerability Scanning
    • Wireless Scanning (Active and Passive)
    • Bluetooth Scanning
  • Target Vulnerability Validation:
    • Password Cracking
    • Port Scanning
    • Host Scaning
    • Social Engineering


COMSAT applies Government security strategy to Commercial services to ensure best security postures

  • Protect Servers and Infrastructure to enforce policies
    • STIG baselines and periodic vulnerability scans
  • Detect Baseline Deviation
    • Establish Change Control Procedures
    • Implement systems to track changes on network policies
  • Separation of duties to reduce OPSEC threats
    • Compartmentalization of information (billing, information store, customer network details and support infrastructure)

Contact Us
Call or contact COMSAT to learn more about our services.