Talk to a Cybersecurity Expert.
We specialize in helping organizations develop and execute secure configuration management programs.
Attackers will breach your perimeter. But if every device in your environment is properly hardened, they may not get much further.
Disciplined, Secure Enterprise Configuration Management
We specialize in helping organizations develop and execute secure configuration management programs. We work with every major baseline and hardening guide – including the CIS Benchmarks, the SANS Critical Security Controls, the DISA Security Technical Implementation Guides (STIGs), the PCI Data Security Standard, USGCB and the NSA Security Configuration Guides – to lockdown assets and improve security posture.
We also help tailor these security baselines to unique business or mission requirements. Our Research and Development Center APOLLO, for Adaptive Protection Lunarline Lab – Orlando, operates around the clock to develop, test and codify custom configurations for innovative software and hardware solutions not addressed by the National Checklist Program. APOLLO creates custom configurations for diverse hardware and software, including Industrial Control Systems (ICS), satellite and space systems, avionics and embedded systems, medical devices and weapons systems.
Automate Configuration Control to Streamline Compliance
Asset hardening and lock down can be a real pain, requiring the manual configuration of dozens of unique settings. We invented LunarAirlock to automate asset hardening. Manual hardening can take upwards of 40 hours per device. LunarAirlock can lock down devices in minutes. It also automates reporting to support compliance and security audits.
While centered on the DISA STIGs, our Lockset Builder allows for rapid customization of configurations to meet organizational requirements. We can also build custom secure configurations that meet NIST, DoD, IC, ISO, CIS, HIPAA and any other baseline security configurations for any technology on request.
To learn more, go to LunarAirlock.