Go to ISSi's GSA eLibrary Summary Page

Products & Services

On a foundation of corporate experience dating back to 1984, ISSi provides an extensive record of innovation in data management, integration, systems administration, and information assurance for DBMS driven web applications, including web postings and Section 508 compliance all currently supported by our available staff and a deep bench of trusted small business partners. ISSi, a small business solutions integrator and small business Team Leader, is structured to adhere to most SDLC Processes and tracks staff time via our web based EVM certifiable timekeeper ensuring accurate and timely status in delivery of services and solutions such as:

Web services:

Web strategy, including navigation & graphics design, development, Section 508 compliance, data and application conversions and web enablement of legacy systems with associated data conversion; Web services include DBMS driven intranets using iManage/Interwoven, Oracle, Java & MS-SQL, content management and facility hosting - Example: graphics & navigation strategy, design, development, facility management for content management and Section 508 compliance of massive web posting of litigation documents, and web enabling of several legacy applications to Oracle or SQL driven web conversions and re-hosting of much older legacy applications. 2011 Task: web based, OO-database driven Case/Matter Mgmt solution for CFR Enforcement in addition to separate function for tracking legal costs details with ability to respond to the disparate data and operational functionality of the two stakeholders.

Managing our Clients’ needs:

ISSi will do what is needed to meet the needs of our client: IT Auditing, IV&V, disparate system integration, web enabling, including analysis for Apps redesign, RDBMS expertise including RDBMS driven Web solutions; for one client ISSi provided 14+ years of IT and litigation support services for all of the above “and” document archive and management, web enablement of legacy systems, INFOSEC (i.e., SSA and ST&E in prep for C&A) and Section 508 compliance in converting legacy Access Applications to SQL-Server based solution for use by nationwide Field Offices to track litigation expenditures. This included document preparation and Reports for GAO reviews and Congressional Hearings on an as needed basis.

Case capture:

Receipt of agency Case related materials (i.e., capture point ‘gateway’ for Case data), classify as one of 41,700+ open cases, or define as a new Case into 59 diverse areas of litigation, distribute to the Division's approximately 720 trial and appellate attorneys currently defending 155 Federal agencies in cases which have been filed against the Government, and prosecuting affirmative lawsuits on behalf of 135 agencies. In a non-related 2011 Taskassisted a client in identifying the Case Mgmt market space and acted as facilitator to schedule client review and assessment of those solutions claiming ability to meet their requirements. Approximately 200 solutions were narrowed to a very few finalists currently being evaluated by the client in a runoff.

Infrastructure support services (when needed):

Network, firewalls, routers, sensors and servers support and administration, up-grade and patch implementation, configuration as well as monitoring sensors, firewalls and COOP planning; Network and cyber security for risk mitigation, ST&E and SSA: for networks and Office Automation LANs verified, documented and configured in accordance with best security practices and in compliance with policy requirements. Our past certification boundary has encompassed desktops, laptops, server, and remote access systems, with the C&A process (conducted by a 3rd party) and documentation conforming to NIST Special Pubs (800 Series). NIST Special Publication 800-37, 53 and 53a for the C&A effort and documentation developed, as prescribed by SP 800 series. This effort included System Design Diagram, Security Requirements, Security Self Assessment (SSA), System Security Plan (SSP), Security Guide (SSG) including the Enterprise Information Technology Rules of Behavior.

Vulnerability assessment tools and services (when needed):

Vulnerability assessment tools and services including up-grades and patch-management reporting and penetration assessment and solutions.

Information Assurance preparation:

Review and preparation of related network, server and application SME’s to provide guidance to ensure compliance within established standards and guidelines as may be required (e.g., HIPAA, OMB A-130, FISMA- 2004, NIST 800-34 & 47, FIPS 140-2, Privacy Policy P3P) via staff possessing key certifications (e.g., CISSP, ISSAP, ISSMP, GCIH, CISM, IAM, ACSA, CCSA, CCNA, MCSE, RHCE, JNCIS, CCNP, CCDP, CCIE/CISSP & PMP) and members of Associations to reach out to for advice and assist as needed. These services include gathering and compilation of materials to ensure infrastructure is in compliance with appropriate NIST Pubs (e.g., 800 Series and Special Publication 800-37) and that documentation is developed as prescribed by SP 800-37 to meet ST&E preparations and scan in preparation for C&A.