Identity Management and Authorization Solutions
Mount Airey Group Logo


Information security can be complicated, but it’s our mission to make complex technology solutions look simple. Rely on our expertise for effective information security solutions. From researching, planning, and selecting the right infrastructure and software, to custom building the equipment for you, we’ll tailor the strategy to your specific objectives. Our highly skilled experts have built a solid reputation delivering solutions that work. Here is a sampling of our services and products:

Information Security

  • Security requirements, analysis, research, and planning
  • Network and security operations support
  • Certification and accreditation
  • Disaster recovery and continuity of operations
  • Security product management
  • Operations and maintenance
  • Information protection
  • Scanning, testing, and incident response

Custom Programming Services

  • Enterprise software and security
  • Biometric systems integration
  • Atomic authorization management
  • Identity management
  • Web development
  • Database development
  • Full life-cycle management

IT Consulting

  • Design and planning
  • Research and analysis
  • Support services
  • Architecture development
  • Training and tutoring
  • Policy and Procedure Development

Project Management

  • Planning and execution
  • Monitoring and management of contracts
  • Financial management
  • Risk management

Identity Management Solutions

  • HSPD-12 solutions
  • PIV/CACintegration
  • Risk Adaptive Access Control (RAdAC)
  • Role Based Access Control (RBAC)
  • Attribute Based Access Control (ABAC)
  • Policy Based Access Control (PBAC)