Content on this page requires a newer version of Adobe Flash Player.


sitemap | Go
  • Founded in 1997 with presence in 35 states
  • Small Disadvantage Business
  • MBE/DBE in 42 States
  • CMMI Level 3
  • ISO 20000, ISO 27001 and 9001:2008 certified
  • D&B Score Financial-80, Open Rating-92
  • 80+ Federalgovernment Contract vehicles
  • 150+ Prime Contracts with State and Local government in 49 states
  • Awards
    • Top Diversity Owned Businesses in the U.S
    • Top 100 8(a) Businesses in the U.S
    • Forbes Best Software company to work
    • Washington Technology in Top 25 8(a) Companies
    • Washington Technology Fast 50 Federal Contractor
    • Inc. 500 fastest growing
    • Five-Time Inc. 500 Honor ROLL Award
    • Top 100 New Jersey Companies
    • CRN 100 fast growth
    • Software Magazine fastest growing

Operational Security & Continuous Monitoring

22nd Century Technologies provides a complete spectrum of managed services and solutions required to operate, administer, and defend complex enterprise networks. 22nd Century Technologies approach to support Information Security Operation and Continuous Monitoring is based on IT Infrastructure Library (ITIL) best practices and standards that support IT service management (ITSM). 22nd Century Technologies services reduces the total cost of ownership (TCO) while simultaneously ensuring system and network availability, information protection, and assured information delivery.
  Define continuous monitoring strategy
  Establish measures and metrics
  Establish monitoring and assessment frequencies
  Implement a continuous monitoring program
  Support various operations tasks
    User Provisioning/De Provisioning, Account management services
    Tier level troubleshooting and problem solving (Tier 1 and 2) for security related issues
    Utilize the current electronic queuing request software
    Incident response support
  Support various compliance tasks
    Facilitate user access list reviews and mitigation
    Artifact support for various requests
    New hire, transfer and termination identification, review and reporting
    Vulnerability scanning review
  Contingency planning/Disaster recovery support
    Annual update of contingency plans
    Annual update of business impact analysis (BIA) plans
    Assist in preparation of annual contingency planning and training
  Prepare and lead annual disaster recovery functional and nonfunctional exercises such as:
    Artifacts/Reports/Access Reviews
    Continuous Monitoring/Compliance
    Application Vulnerability Monitoring and Follow-up


  • US Air Force
  • US Army
  • US Navy
  • Department of Defense
  • Defense Information Systems Agency
  • Defense Logistics Agency
  • Defense Language Institute
  • Naval Postgraduate School
  • Naval Medical Center
  • Peace Corps
  • Marine Corps
  • US Department of Agriculture
  • Department of Commerce
  • Department of Energy
  • Environmental Protection Agency
  • Federal Trade Commission
  • Federal Maritime Commission
  • Federal Bureau of Investigation
  • National Institute of Health
  • Department of Health and Human Services
  • Department of Homeland Security
  • Department of Interior
  • Department of Justice
  • Department of Labor
  • Department of State
  • Social Security Administration
  • Department of Transportation
  • IRS, Department of Treasury
  • United States Postal Service
  • Department of Veteran Affairs
  • US Marshals Services
  • US House of Representatives
  • Government Printing Office
  • Consumer Product Safety Commission
  • US Securities Exchange Commission
  • US Senate
  • Statewide Master Contracts with 49 states
  • 25+ contracts with Counties/Cities
  • 40+ contracts with other independent Government Agencies
  • Accenture
  • Booz Allen Hamilton
  • Computer Sciences Corporation
  • Deloitte
  • HP
  • Northrop Grumman
  • Raytheon
  • SRA
  • SuperValu
  • UPS