![techconnect2020 techconnect2020](https://www.metis-tech.com/wp-content/uploads/2021/01/techconnect2020.png)
2020 TechConnect Innovation Awardee
![metis-airforcepitchday_v2 metis-airforcepitchday_v2](https://www.metis-tech.com/wp-content/uploads/2021/01/metis-airforcepitchday_v2-214x170.jpg)
SBIR Award Winner at First US Air Force Pitch Day
Go Beyond Policy
A blend of policy and script-based solution that targets the compliance policy technology gap to vastly exceed the STIG coverage as compared to competitors
- Scalable
- Customizable
- Containerizable
- Legacy System Compatible
![STIG-workflow STIG-workflow](https://www.metis-tech.com/wp-content/uploads/2021/01/STIG-workflow-300x300.png)
Streamlines:
Risk Management Framework (RMF)
Cybersecurity Maturity Model Certification (CMMC)
Configuration Management
![STIG-select STIG-select](https://www.metis-tech.com/wp-content/uploads/2021/01/STIG-select-170x170.png)
Select
Utilize hardware and software inventory scans to automate selection of security controls of a given system.
![STIG-implement STIG-implement](https://www.metis-tech.com/wp-content/uploads/2021/01/STIG-implement.png)
Implement
Automate implementation of security controls and maintain records of actions and non-compliance exemptions.
![STIG-implement STIG-implement](https://www.metis-tech.com/wp-content/uploads/2021/01/STIG-implement.png)
Assess
Automate and record assessments of security controls and inventory.
![STIG-view STIG-view](https://www.metis-tech.com/wp-content/uploads/2021/01/STIG-view.png)
Monitor
Continuously schedule the assessment of security controls to monitor for deviations in addition to monitoring user rights and privileges' to insider threats.
![STIG-verify STIG-verify](https://www.metis-tech.com/wp-content/uploads/2021/01/STIG-verify.png)
Authorize
Generate risk assessment reports for authorization packages.
SBIR Award Winner at First US Air Force Pitch Day in New York City
The Metis STIGAssist™ technology satisfies Risk Management Framework goals mandated by defense cybersecurity operations through an automated tool to assess, remediate, analyze and report cybersecurity vulnerabilities, as based on DISA STIGs, retaining the agility of our mission critical systems.