Resolution1 Security

Public Sector

Public Sector

Detect cybercriminal activity, conduct digital investigations, and respond quickly to suspicious behavior to resolve the issue at hand.


Focus on the incidents that matter.

The public sector poses a unique challenge.  Being the principal holder of sensitive and confidential information such as tax records, health information, intellectual property, military information, citizen’s financial records and other types of data makes it a desirable target for cybercriminals at all levels - federal, state and local.  The public sector also grapples with heightened risk due to the enormous amount of information sharing that takes place between agencies as well as with the private sector, contractors, and other third party vendors that they engage with on a daily basis.

Resolution1 delivers the critical capabilities necessary to detect, analyze and resolve any data event - from security breaches to e-discovery and other governance, risk and compliance (GRC) issues.  It integrates network, endpoint, malware analysis and remediation capabilities into a single, scalable platform that enables agencies to easily identify, prioritize, and remedy potential external threats, insider threats, and unauthorized behavior.

  • Build integrated maps of particular assets or users, using network forensics.
  • Schedule ongoing information assurance sweeps to identify classified data spillage and unauthorized applications.
  • Track access to sensitive data repositories in real time.
  • Monitor endpoints and network communications (including SSL- and SSH-encrypted traffic).
  • Monitor off-network laptops, including Internet activity.
  • Automatically correlate endpoint and network data with ThreatBridge™, the source-agnostic threat intelligence library, to establish context and gain actionable intelligence.
  • How Resolution1 aligns to the CDM.

    The Resolution1 Platform - meets or exceeds - several of the critical Continuous Diagnostics and Mitigation (CDM) tool functional area requirements, including:

  • Functional Area 7: Manage Security Related Behavior
  • Functional Area 10: Prepare for Contingencies and Incidents
  • Functional Area 11: Respond to Contingencies and Incidents
  • Functional Area 14: Manage Audit Information
  • For more information on how we address each of these areas, download the Weaponizing CDM datasheet.

    Let’s Get Started