Technology News Update

10/13/2021 – Security is always at the forefront of everything we do.

At Fortior Solutions, we know that our customers count on us to help strengthen their security. We take that trust seriously, starting with our own systems. We implement numerous measures designed to ensure our systems remain secure, compliant and in a hardened state at all times. We continuously monitor our servers, hardware, software and security systems so that our customers have access to the most efficient and secure access control solutions available on the market.

We are no stranger to meeting the most stringent information security requirements, including under the U.S. Department of Defense (DoD) Information Assurance Certification and Accreditation Process (DIACAP) and its successor Risk Management Framework (RMF). We are poised for the next-generation Cybersecurity Maturity Model Certification (CMMC) as the DoD finalizes the requirements.

Following the highest information security practices is embedded in our culture. Our systems are designed and maintained with security in mind, which is why we have employees who are Certified Information Systems Security Professionals (CISSP) on both our engineering and IT/cybersecurity teams.

Fortior Solutions uses NIST SP 800-171r2 security controls for our Information System to maintain Federal government security compliance. We also follow the standards in FIPS 140-2 encryption technology guidelines. Our system has been evaluated several times by the Federal Bureau of Investigation (FBI), Department of Justice (DOJ) and DoD for information security and data privacy considerations, and we have passed all audits. Our system’s servers are hosted in a SOC II certified co-location datacenter. The practices we follow, combined with our team’s subject matter expertise, allow us to be security stewards in the identity management and access control space for our customers.

“Our company motto is to ‘Stay Secure’,” says Dave Byrum, Senior Director of Information Technology. “This starts and ends with the people, processes, tools, technology, and monitoring systems we have in place today.” We are proud of our commitment to security and the steps we have taken, and continue to take – to safeguard data, assets and people.