General enquiries :
+44 (0)20 7602 6000


TSS- Security

A security breach can have a potentially devastating impact on your business. Consequently, organisations face more pressure than ever before to ensure that their IT estate is secure using a range of tools. With domain expertise in designing, deploying and managing secure networks, CACI has a thorough understanding of Information Security risk management issues and best practices. This not only gives our clients the reassurance they need, but also enables us to provide them with the security expertise and infrastructure knowledge required to identify the most appropriate solution. 
CACI’s security offering covers vulnerability assessment and penetration testing, social engineering, risk management, IT strategy and Infrastructure remediation services.
To enable you to proactively identify and reduce the IT security risks in your environment, we can provide a thorough IT governance, risk and compliance assessment. This will leave no stone unturned, covering firewall versions and configurations, software revisions, intrusion prevention and detection (IPS/IDS) and denial of service (DDoS) potential.
In addition, CACI can audit your wider networking environment to provide visibility and a complete understanding of the entry points, distributed network and overall security position of the current IT estate.
Once you have the full picture CACI can help build the right solution with the design, deployment and management of the complete security infrastructure to support your business goals – benefits include: 
  • Identification and quantification of potential threats associated with Malware, Ransomware and other software exploits.
  • Protection of your IPR, assets and brand reputation
  • IT compliance with relevant security policies and standards
  • Creation of a security infrastructure with the appropriate policies, processes and architecture for your business needs
  • The ability to report risks and the ROI from security projects
  • A Managed Services approach to Information Security, including end-to-end operational management of the IT and security assets. This enables proactive, multi-vendor support and maintenance services to ensure the availability of the IT estate whilst minimising operational risks, reducing supplier overheads, and optimising total IT support budgets  
A non-exhaustive list of the security products and technologies we support include:   
Cisco – ASA, ISE, FirePOWER & FireSIGHT
Check Point – 1400 to 61000 Series 
Juniper – SRX Series
Fortinet – FortiGate NGFW 100-900 & 1000-7000 Series

What's New

Network Security Trends 2019
From data centres to centres of data

Interested in our services?

+44 (0)20 7602 6000