full
image
#666666
https://www.mathcraft.com/wp-content/themes/smartbox-installable/
https://www.mathcraft.com/
#3691ad
style2
access commander fso software
access commander fso software
FSO Software, NISPOM compliant software, Security Management Software

Personnel Management

Manages information of all cleared personnel as required by NISPOM, such as:

risk assessment, FSO Software, NISPOM compliant software, Security Management Software

Contract Management

Maintains information on all classified contracts including each contract’s associated:

FSO Software, NISPOM compliant software, Security Management Software

Document Management

Track classified documents for each contract as well as document:

top security management software

Facility Management

Manages all customer and company locations, including:

top security information management system

Asset Management

Tracks all assigned properties and equipment that require accountability. The three related modules are:

fISMA, insider threat management, security solutions

Secured Area Management

Track all Secured Areas including:

Top Insider Threat Management

Inventory Processing

Tracks classified resources and automates DSS inventory requirements, recording:

foreign travel requirements, Security management software

Advanced Insider Threat Analysis

Provides a data visualization and ad-hoc report generation dashboard, allowing ITPSOs and other Insider Threat professionals the information needed to analyze the effectiveness of their Insider Threat Program (ITP) by identifying:

FSO Software, NISPOM compliant software, Security Management Software

Incident Management

Supports the tracking of all incidents, including those associated with the Adjudicative Guidelines for Insider Threat reporting, including:

Top Managed Security Service

CONUS Incoming Visit

Manages visiting domestic guests to your facility, presenting:

FSO Software, NISPOM compliant software, Security Management Software

CONUS Outgoing Visit

Tracks data for domestic visit requests for employees, including:

foreign travel requirements

OCONUS Incoming Visit

Manages incoming VARs for international visitors, recording:

Top Security Information Management

OCONUS Outgoing Visit

Tracks all the logistics FSOs need to send employees outside of the US, like:

FSO Software, NISPOM compliant software, Security Management Software

External Personnel Management

Manages information of all contractors working on site, such as:

FSO Software, NISPOM compliant software, Security Management Software

International Personnel Management

Maintains information regarding international guests who visit your facility, such as:

fso software, risk management

Risk Management Framework

Provides a platform for the Risk Management Framework (RMF) process outlined in the DCSA Assessments and Authorization Process Manual (DAAPM), recording:

FSO Software, NISPOM compliant software, Security Management Software

Foreign Travel

Collects every detail for international trips and temporary duty assignments (TDYs), recording:

FSO Software, NISPOM compliant software, Security Management Software

Foreign Contacts

Maintains interaction details for every foreign national encounter, recording:

top insider threat software

Suspicious Contacts

Collect detailed contact information and profiles.

Visitor management system

Suspicious Contact Reporting

Supports the SEAD 3 requirements of tracking cleared individuals suspected of foreign associations, and illegal or otherwise suspicious activities. Included is data such as:

security information management system

Reportable Information

Collects employee self-reporting information, such as:

FSO Software, NISPOM compliant software, Security Management Software

Training and Conference Management

Tracks visitors and employees attending:

ACCESS COMMANDER MODULES

 

 

 

[vc_row][vc_column width=”1/3″][vc_single_image image=”1045″ img_size=”full” alignment=”center” style=”vc_box_outline”][vc_column_text]

Personnel Management

Manages information of all cleared personnel as required by NISPOM, such as:

 

– Clearance and Special Accesses

– Foreign Travel

– Background Investigations/Reinvestigations

– Assigned Documents, Properties & Secured Areas

[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_single_image image=”1042″ img_size=”full” alignment=”center” style=”vc_box_outline”][vc_column_text]

Contract Administration

Maintains information on all classified contracts including each contract’s associated:

 

– Personnel

– Property

– Documents

– DD254s

[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_single_image image=”1043″ img_size=”full” alignment=”center” style=”vc_box_outline”][vc_column_text]

Document Management

Track classified documents for each contract as well as document:

 

– Transmittal

– Destruction

– Custodian Management

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column width=”1/3″][vc_single_image image=”1046″ img_size=”full” alignment=”center” style=”vc_box_outline”][vc_column_text]

Property Management

Inventory control subsystem that tracks all assigned properties and equipment that require accountability, both company owned and government furnished equipment (GFE) such as:

 

– Containers/Safes

– SCIFs

– Decals

[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_single_image image=”1047″ img_size=”full” alignment=”center” style=”vc_box_outline”][vc_column_text]

Secured Area Management

Track all Secured Areas including:

 

– Closed Areas, SCIFs and SAPF

– Accreditation/Co Use

– Inspection Details

– Assigned Documents, Properties and Personnel

– DSS147

[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_single_image image=”1044″ img_size=”full” alignment=”center” style=”vc_box_outline”][vc_column_text]

Information Systems Management

Track classified systems including:

 

– Hardware

– Software

– Users

– Seal Logs

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column width=”1/3″][vc_single_image image=”1049″ img_size=”full” alignment=”center” style=”vc_box_outline”][vc_column_text]

Visitor Control

Manages security information of all visitors to a classified facility, such as:

 

– Clearance and Special Accesses

– Violations

– Visit Authorizations

– Assigned Properties and Documents

[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_single_image image=”1050″ img_size=”full” alignment=”center” style=”vc_box_outline”][vc_column_text]

Outgoing Visit Request

Tracks all employees outgoing visit requests including:

 

– Visit Authorization Letters (VALs) for employees

– All customer templates supported

 

Incoming Visit Request

Manages visit request activity for visitors to the facility. An easy-to-use screen allows users to quickly assign and unassign visitors to each visit

[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_single_image image=”1048″ img_size=”full” alignment=”center” style=”vc_box_outline”][vc_column_text]

Training & Conferences

Tracks visitors and employees attending:

 

– Training and Security Classes

– Meetings

– Conferences

– Indoctrination Briefings

[/vc_column_text][/vc_column][/vc_row]

 

 

DSS defines Insider Threat as:

“Acts of commission or omission by an insider who intentionally or unintentionally compromises or potentially compromises DoD’s ability to accomplish its mission. These acts include but are not limited to, espionage, unauthorized disclosure of information, and any other activity resulting in the loss or degradation of departmental resources or capabilities.”

Access Commander provides comprehensive functionalities to implement your company’s Insider Threat Program according to NISPOM Change #2. The software is designed for the FSO to identify and track:

 
— Key Management Personnel

 

— Insider Threat program Senior Official (ITPSO)

 

— Insider Threat Program Senior Management Official (ITPSMO)

 

— Insider Threat Program Working Group (ITPWG)

 

— Insider Threat Training required for ITPSOs and electronic storage of Certificates of Training and Appointment Letters

 
— Insider Threat Training required yearly for all cleared employees and Type A Consultants

 
— Adjudicative Guideline(s) that apply to an incident

 

 

 

Additional Features Include:

 
— Templates for Insider Threat Plan and Management processes

 
— Insider Threat Ad-Hoc Query profiles

 
— Continuous Monitoring and notifications as necessary

 
— Assorted reports and metrics

 

— Self-Inspection Checklist

Schedule A Demo

    default
    Loading posts...
    link_magnifier
    #6f7274
    on
    fadeInDown
    loading
    #6f7274
    off
    Back