Acasta has significant information assurance experience within all major UK Government departments and Service Providers. Acasta provides Accreditation Planning, Security Management, Risk Assessments, Auditing, and, PSN CoCo compliance.
All Acasta Associates are BSi certified ISO/IEC 27001 and CSTAR Lead Auditors. We will manage implementation and certification projects across small or large complex organisations ensuring that your security environment is tailored to fit your business.
We have access to excellent designers and content management tools so your site will certainly look good. But our competitive advantage is our experience of helping to secure large and complex systems against cyber attack.
We are able to apply and adapt our experience with customers that require that little bit extra peace of mind through our bespoke web site design, hosting and hardening services.
Acasta provides a comprehensive range of Enterprise Security Architecture design services, including: Network/Server infrastructure design, Web Security solutions, Remote Access, Secure Email/Messaging, Firewalls, Content Filtering, and, UNIX/Windows hardening.
Acasta has extensive experience of proposal writing and bid evaluation within OJEU and EU regulated procurement projects. Acasta is proficient in the use of the Government Procurement Service e-sourcing and e-procurement portals for requirements definition, tendering, and, negotiation.
Acasta delivers qualified tailored technical assurance services. Acasta will directly offer vulnerability assessments and technical solution assurance, and where necessary, complement its own in-house testing operations with UK government approved (CHECK) specialists.
Acasta helps to build in-house Information Security expertise through the design and delivery of bespoke Information Security education programmes using accelerated learning techniques. Acasta trainers hold recognised teaching qualifications, and, have considerable classroom experience.
By virtue of working across mutliple organisations, markets and regulated environments, Acasta has acquired substantial knowledge and experience of applying the leading methodologies adopted within all major Information Technology transition and transformation programmes. Acasta applies: