The Primary Source
Radix IIRadix II, Inc. specializes in Systems Security STIG and CERT Compliance and UNIX system hardening, Interactive Voice Response Systems, Network connectivity, middleware and UNIX system development, and Internet services. We have over 36 years of working with federal government customers.
Server security is increasingly important in today's networked environment. Radix II’s commitment to server and network security is rooted in over 15 years of managing our own service provider network.
Radix II can assist your organization by either readying your server(s) for initial installation into the production environment, by performing periodic reviews and mitigation, or performing ongoing security sustainment for more timely protection. Server security tasks performed by Radix II for our customers include: checking compliance with DISA Security Technical Implementation Guides (STIGs), scanning the system for known security vulnerabilities, mitigating findings from the security scans, demonstrating compliance with Alerts, Taskings and Bulletins from the Computer Emergency Response Team (CERT), and reviewing system and security logs. Radix II, Inc. has verified STIG compliance for a variety of systems including: Unix/Linux STIGs, database/Oracle STIGs, and Web server STIGs. All of the above support our DoD customers’ DIACAP (DoD Information Assurance Certification and Accreditation Process) requirements.
Radix II has helped install and shepherd through various Federal Government Information Assurance (IA) processes Avaya telephony systems that include Avaya’s AES, CMM, CMS, ContactStore and IR. Many of these had been stalled in the IA process due to problems with CERTs and SRR results.
INTERACTIVE VOICE RESPONSE
Radix II designed and built the Defense Logistic Agency’s CIC Automated Agent Interactive Voice Response System (IVRS).
DLA CIC Automated Agent system is an interactive voice response system (IVRS) that accepts and processes telephone calls from customers of the DoD logistics community. The IVR application has a keyword based voice recognition menu system as well as the traditional “Press or Say” interface to support world wide callers, some of whom do not have access to touch tone telephones.
The system allows callers to transfer to customer agents, obtain order status and supply information, or even order required parts, through a password protected interface. Each user has an individual access level controlling which queries may be performed for which DoD service. Automated Agent may also be queried via email, with the same user-by-user access controls.
The Radix II designed and implemented the backend processing for the Automated Agent which supports interfaces to many current and legacy information systems. Radix II can support your application by providing query interfaces via http, SQL, sftp, 3270, or other protocol while permitting clients to use their preferred interface: telephone, email, or web.
Radix II designed, built, installed and maintained this system through many incarnations: from the original, unconnected systems located at 20 different DoD installations to a fully networked consolidated system.
|Copyright Radix II, Inc. 2006-2011 | Last Modified: Jul 01, 2013|