Squirrel Defender supports DoD’s Comply-to-Connect (C2C) and NIST SP 800-137 Information Security Continuous Monitoring (ISCM) initiatives.
Automated CCRI SAV
The U.S. DoD is continuously implementing new methods to ensure information security (INFOSEC). The Defense Information Systems Agency (DISA) releases Security Technical Implementation Guides (STIG) and Security Recommendations Guides (SRG) to assist with the protection and defense of the systems that support military readiness and operations. Command Cyber Readiness Inspections (CCRI) are performed to assess defensive posture as it relates to STIGs best practices.
Squirrel Defender automates the tedious manual process of determining if your network devices are configured in accordance with the appropriate DISA STIGs. Defender uses interactive workflows to guide you through automating the remediation process which further reduces the level of effort to maintain your Risk Management Framework (RMF) security controls and posture.
Know your network better than your adversaries.
Solution Features
1. Risk scoring uses the National Security Council risk model for NIST and DISA security control vulnerabilities
2. DISA STIG/SRG security control vulnerability analysis and reporting
3. Adaptive automation scales the mitigation/remediation of DISA STIG/SRG security control vulnerabilities
4. Continuous visibility using triggers to dynamically verify devices have no new vulnerabilities
5. Artifact generation (STIG Checklists) for use with eMASS and other similar systems
6. 100% on-premises - no information leaves your site
7. No sampling; all devices and interfaces are inspected, ensuring thorough security posture review
8. Squirrel Defender platform comes pre-hardened using the appropriate DISA STIGs/SRGs
9. Curated/Fully supported automation is updated as DISA releases updated or revised STIGs/SRGs security controls
10. Integrated Waiver management system for Risk Acceptance (RA) or Plan of Action & Milestone (POAM), ensuring you see actionable findings and the correct risk score
11. Embedded STIG Viewer
Trusted to secure the networks of the U.S. defense community
The Squirrel Defender product is used by the U.S. Department of Defense to provide continuous security control vulnerability monitoring and remediation of its network infrastructure environment.
References are available upon request.
CAGE Code
80EX3
NAICS
519190 | 541310 | 541330 | 541511 | 541512 | 541513 | 541519 | 541690 | 611420 | 511210
DUNS
080982289
Supported DISA SRGs & STIGs
-
Arista MLS EOS 4.2x L2S Security Technical Implementation Guide: Version 2, Release: 1
-
Arista MLS EOS 4.2x NDM Security Technical Implementation Guide: Version 2, Release: 1
-
Arista MLS EOS 4.2x Router Security Technical Implementation Guide: Version 2, Release 1
-
Cisco ASA Firewall Security Technical Implementation Guide: Version 2, Release: 1
-
Cisco ASA NDM Security Technical Implementation Guide: Version 2, Release: 1
-
Cisco IOS Router NDM Security Technical Implementation Guide: Version 3, Release: 1
-
Cisco IOS Router RTR Security Technical Implementation Guide: Version 3, Release: 1
-
Cisco IOS Switch L2S Security Technical Implementation Guide: Version 3, Release: 1
-
Cisco IOS Switch NDM Security Technical Implementation Guide: Version 3, Release: 1
-
Cisco IOS Switch RTR Security Technical Implementation Guide: Version 3, Release: 1
-
Cisco IOS XE Router NDM Security Technical Implementation Guide: Version 3, Release: 1
-
Cisco IOS XE Router RTR Security Technical Implementation Guide: Version 3, Release: 1
-
Cisco IOS XE Switch L2S Security Technical Implementation Guide: Version 3, Release: 1
-
Cisco IOS XE Switch NDM Security Technical Implementation Guide: Version 3, Release: 1
-
Cisco IOS XE Switch RTR Security Technical Implementation Guide: Version 3, Release: 1
-
Cisco NX OS Switch NDM Security Technical Implementation Guide: Version 3, Release: 1
-
Cisco NX OS Switch L2S Security Technical Implementation Guide: Version 3, Release: 1
-
Network WLAN Controller Management Security Technical Implementation Guide: Version 7, Release: 2 for Cisco AIREOS
-
Network WLAN Controller Platform Security Technical Implementation Guide: Version 7, Release: 3 for Cisco AIREOS
-
Network WLAN Controller Management Security Technical Implementation Guide: Version 7, Release: 2 for Cisco 9800
-
Network WLAN Controller Platform Security Technical Implementation Guide: Version 7, Release: 3 for Cisco 9800
-
Juniper EX Series Switches Layer 2 Switch Security Technical Implementation Guide: Version 2, Release: 1
-
Juniper EX Series Switches Network Device Management Security Technical Implementation Guide: Version 2, Release: 1
-
Juniper EX Series Switches Router Security Technical Implementation Guide: Version 2, Release: 1
-
Juniper SRX SG NDM Security Technical Implementation Guide: Version 3, Release: 1
-
Juniper SRX Services Gateway VPN Security Technical Implementation Guide: Version 3, Release: 1
-
Juniper SRX Services Gateway IDPS Security Technical Implementation Guide: Version 2, Release: 1
-
Network WLAN Controller Platform Security Technical Implementation Guide: Version 7, Release: 3 for Aruba
-
Network WLAN Controller Management Security Technical Implementation Guide: Version 7, Release: 2 for Aruba
-
Network WLAN Bridge Platform Security Technical Implementation Guide: Version 7, Release: 2 for Aruba
-
Network WLAN Bridge Management Security Technical Implementation Guide: Version 7, Release: 2 for Aruba
-
Network WLAN AP-NIPR Platform Security Technical Implementation Guide: Version 7, Release: 3 for Aruba
-
Network WLAN AP-NIPR Management Security Technical Implementation Guide: Version 7, Release: 2 For Aruba
-
Network WLAN AP-IG Platform Security Technical Implementation Guide: Version 7, Release: 3 for Aruba
-
Network WLAN AP-IG Management Security Technical Implementation Guide: Version 7 Release 2 for Aruba