full
image
#666666
https://www.mathcraft.com/wp-content/themes/smartbox-installable/
https://www.mathcraft.com/
#3691ad
style2
access commander fso software
access commander fso software
FSO Software, NISPOM compliant software, Security Management Software

Personnel Management

Manages information of all cleared personnel as required by NISPOM, such as:

  • Clearance and Special Accesses
  • Foreign Travel
  • Background Investigations/Reinvestigations
  • Assigned Documents, Properties & Secured Areas
risk assessment, FSO Software, NISPOM compliant software, Security Management Software

Contract Management

Maintains information on all classified contracts including each contract’s associated:

  • Personnel
  • Property
  • Documents
  • DD254s
FSO Software, NISPOM compliant software, Security Management Software

Document Management

Track classified documents for each contract as well as document:

  • Transmittal
  • Destruction
  • Custodian Management
top security management software

Facility Management

Manages all customer and company locations, including:

  • Self Inspection
  • FOCI
  • Insider Threat Management Requirements
security information management system

Asset Management

Tracks all assigned properties and equipment that require accountability. The three related modules are:

  • Property Management
  • Locks and Keys
  • Decals
fISMA, insider threat management, security solutions

Secured Area Management

Track all Secured Areas including:

  • Closed Areas, SCIFs and SAPF
  • Accreditation/Co Use
  • Inspection Details
  • Assigned Documents, Properties and Personnel
  • DSS147
Top Insider Threat Management

Inventory Processing

Tracks classified resources and automates DSS inventory requirements, recording:

  • Item Type
  • Status
  • Location
  • Barcoding
Security management software

Advanced Insider Threat Analysis

Provides a data visualization and ad-hoc report generation dashboard, allowing ITPSOs and other Insider Threat professionals the information needed to analyze the effectiveness of their Insider Threat Program (ITP) by identifying:

  • Potential Threats
  • Trends and Gaps
  • Risk Mitigation Opportunities
FSO Software, NISPOM compliant software, Security Management Software

Incident Management

Supports the tracking of all incidents, including those associated with the Adjudicative Guidelines for Insider Threat reporting, including:

  • Associated Personnel
  • Incident Details
  • Investigations
  • Corrective Actions
Top Managed Security Service

CONUS Incoming Visit

Manages visiting domestic guests to your facility, presenting:

  • Dates
  • Clearance Details
  • Point of Contact (POC) Information
  • External Visit Authorization Letters (VALs)
FSO Software, NISPOM compliant software, Security Management Software

CONUS Outgoing Visit

Tracks data for domestic visit requests for employees, including:

  • Dates
  • Clearance Details
  • Point of Contact (POC) Information
  • Visit Authorization Letters (VALs)
foreign travel requirements

OCONUS Incoming Visit

Manages incoming VARs for international visitors, recording:

  • Dates
  • Clearance Details
  • Contact Information
Top Security Information Management

OCONUS Outgoing Visit

Tracks all the logistics FSOs need to send employees outside of the US, like:

  • Dates
  • Requestor Data
  • Visit Authorization Requests (VARs)
FSO Software, NISPOM compliant software, Security Management Software

External Personnel Management

Manages information of all contractors working on site, such as:

  • Clearance and Special Accesses
  • Foreign Travel
  • Background Investigations/Reinvestigations
  • Assigned Documents, Properties and Secured Areas
FSO Software, NISPOM compliant software, Security Management Software

International Personnel Management

Maintains information regarding international guests who visit your facility, such as:

  • Name
  • Date of Birth
  • Citizenship
  • Clearance Details
fso software, risk management

Risk Management Framework

Provides a platform for the Risk Management Framework (RMF) process outlined in the DCSA Assessments and Authorization Process Manual (DAAPM), recording:

  • System Details
  • Plan Information
  • Mobility Descriptions
FSO Software, NISPOM compliant software, Security Management Software

Foreign Travel

Collects every detail for international trips and temporary duty assignments (TDYs), recording:

  • Dates
  • Approval Information
  • Per Diem
  • Restrictions
FSO Software, NISPOM compliant software, Security Management Software

Foreign Contacts

Maintains interaction details for every foreign national encounter, recording:

  • Employee Data
  • Identifying Information
  • Meeting Specifics
  • Special Remarks
top insider threat software

Suspicious Contacts

Collect detailed contact information and profiles.

Visitor management system

Suspicious Contact Reporting

Supports the SEAD 3 requirements of tracking cleared individuals suspected of foreign associations, and illegal or otherwise suspicious activities. Included is data such as:

  • Severity
  • Location
  • Method of Contact
security information management system

Reportable Information

Collects employee self-reporting information, such as:

  • Counter-Intelligence Issues
  • Legal Issues
  • Citizenship Issues
  • Life Circumstances
  • Foreign Travel
  • Foreign Interaction
FSO Software, NISPOM compliant software, Security Management Software

Training and Conference Management

Tracks visitors and employees attending:

  • Training and Security Classes
  • Meetings
  • Conferences
  • Indoctrination Briefings

Schedule A Demo

default
Loading posts...
link_magnifier
#6f7274
on
fadeInDown
loading
#6f7274
off
Back