atsec information security

Are you ready?

Whether you’ve still got questions or feel ready to go, we’ve got you covered! Check out the information below and be sure to let us know if you still have questions.

1

Testing? Certification? Evaluation?

The first step is letting us know what you are trying to achieve. Is it a Common Criteria certificate, a FIPS evaluation, or maybe cryptographic algorithm testing? Download a relevant Request for Information document on the right and fill out as much as you can – it helps us prepare for the next step. If you don’t have all the answers yet, that’s perfectly fine.

And if you’re not seeing what you’re looking for, no worries: just shoot us an email with the information and we can figure it out together!

2

Let’s talk about it

After we receive the RFI document, we’ll schedule a call with you and your team to talk about the project, logistics, timeline, and effort. We know that the standards we work with as a laboratory can be difficult at first – don’t hesitate to ask any questions you might have, as we’re happy to give you the big picture.

Topics of discussion

The first call will keep discussion at a high level, though we might need to have an NDA before we can have the call depending on the project. We also use your requirements, but the end goal is to give you a good understanding of the process and expectations.

3

Paperwork

We’ll need an NDA covering the project; a PSA/MSA that governs how we will do business; and finally, the SOW that outlines the project scope, timelines, and commercial conditions. We have templates that are tailored to the kind of work we do and the requirements that the government agencies put on us, so don’t fret if any of that sounded overly onerous.

Need to use you document templates?

Some companies have a requirement to use their templates for NDAs, PSAs/MSAs, and SOWs. If that’s the case, we will gladly review them and work with your organization to get them approved.

4

Ready to go!

Once all the contractual documents have been signed, the technical team will take over and start the project with you according to the agreed-upon timeline.

We’re here for you

Depending on the project, we will have regular calls with you and your team to make sure everything is on track.

Ready when you are!

Still have questions? Can’t find what you’re looking for? – Let’s talk!

The Information Security Provider

Read Our Latest Blog Articles

Learn the latest and greatest about information security. You’ll find insights and analyses of recent developments in technology and policy on our blog.