Information Technology

PURVIS can serve as your independent IT consultant, offering objective analysis and recommendations for you to implement, or we can implement the IT-related changes for you. Either way, we work with you to garner a deep familiarity with your system and technologies, then develop a technology road map that’s customized to your unique organizational needs, budget and timeline. This could include analyzing and improving existing systems or recommending and implementing new ones to better secure your networks and information. Regardless of the chosen course, our engineered solutions will solve for your exact programmatic and technical challenges while aligning with your existing IT policies.

System Administration

At PURVIS, our goal to become so well-versed in your systems and networks – providing the level of attention and support you need – that we’re viewed as an extension of your team. Our process begins with working alongside your IT department, carefully learning your system’s engineering philosophy so we can custom-fit solutions to your environment, requirements, timeline, and budget. PURVIS maintains the same level of commitment and detail when:

  • Analyzing and designing networks
  • Integrating systems and technology
  • Customizing hardware and software
  • Implementing
  • Testing
  • Providing life cycle support
  • Ensuring cyber security compliance
  • Serving as system administrators

Recognized by Naval Intelligence Activity and the Fleet Cyber Warfare Command, our experienced approach and meticulous execution allow for us to ensure systems are 100% operational, compliant, and secure 24/7/365.

Network Engineering

When you partner with PURVIS, you get a reliable, responsive team who is fluent in IP and legacy systems and empowered to do what’s right for your organization. Our network engineers strictly adhere to NIST 800-53A procedures when assessing security and privacy controls in federal IT systems, and based on your needs, we objectively consult on and implement these network and systems engineering services:

  • Hardware and software recommendations, configuration and installation
  • New and legacy servers and systems integration, optimization and testing
  • Systems administration
  • Maintenance, training and support
  • Technical documentation

For the National Institutes of Health (NIH), PURVIS designed, built, and currently maintains a nationwide communications network integrating multiple NIH research facilities.

As a known partner of Cisco, Microsoft, and other leading networking and security technology suppliers, we have extensive, industry-standard certifications in:

Cisco

  • CCDA, CCENT, CCIE written, CCNA, CCNA – Cyber Ops, CCNA – Interconnecting CISCO Network Devices, CCNA – Routing & Switching, CCNA – Security, CCNA – Voice, CCNP, CCNP – Routing & Switching, CCNP – Security

Microsoft

  • NT-Networking with TCP/IP, Certified Professional (MCP), Certified Professional (MCP) – Windows 10 (70-697) & Windows 7 (70-685), Certified Systems Administrator (MCSA), Certified Systems Engineer (MCSE), MCITP Windows 7 EDST, MCSA Windows 7, Certified Solutions Associate, Certified Solutions Associate – Windows Server 2012R2, Certified IT Professional,  Specialist – Windows 7, Specialist – Windows 10, (ISC)² – Microsoft

CompTIA

  • A+, Convergence+, Cloud+, Linux+, Network+, Project+, Network+ Certified Professional, Network A+ Certified Professional, IT Operations Specialist, Security+ CE Certified, Security+, Secure Infrastructure Specialist, Server+

CIW

  • Database Design Specialist, JavaScript Specialist, Web Design Specialist, Web Foundations Associate

ASQ – American Society for Quality

  • CQT-Certified Quality Technician, CQE-Certified Quality Engineer

Other

  •  A+ Certified, Apple Certified Macintosh Technician, Archibus, HIPPA, Certified Novell Administrator, Novell CNA, Red Hat, Certified Systems Administrator 7, Six Sigma, VMWare Certified Associate – Data Center Visualization 

Cybersecurity and Information Assurance (IA)

The world of cyber security can be complex and overwhelming – PURVIS’ team of multi-disciplinary experts is backed by decades of experience, fully equipped to protect your hardware, software, and data.

As the cyber threat environment evolves with amplified speed, it takes faster, smarter, and more efficient technologies to maintain security policies and procedures that protect our nation – on land and at sea. PURVIS’ Cyber Security Workforce-Certified, government-approved personnel takes a methodical approach to ensuring your mission-critical systems are compliant and protected:

Under PURVIS management the Naval Undersea Warfare Center Lab has been recognized as the Gold Standard, consistently meeting or exceeding all metrics of compliance, for Information Assurance (IA) standards across NUWC Division Newport.

  1. Enumeration and classification of the information assets to be protected
  2. Perform risk assessment for those assets
  3. Develop a risk management plan – plan to mitigate, eliminate, accept or transfer risks and prevention, detection and response to threats
  4. Test and evaluate risk management plan
  5. Follow and maintain the risk management plan – follow Security Technical Implementation Guides (STIGs), apply patches and updates, ensure all systems are current against any potential vulnerabilities, protect information and information systems ensuring availability, integrity, authentication, etc.

Risk Management Framework (RMF)

To strengthen IT security and risk management processes, PURVIS closely adheres to the RMF when partnering with the federal government and its contractors. We successfully lead projects through the six steps of the RMF process, achieving Authority to Operate (ATO) on schedule. Our team is Cyber Security Workforce-Certified and government-approved.

Lorem Ipsum

Lorem Ipsum

Lorem ipsum

Lorem ipsum

What Our Clients Say

We Engineer Solutions that keep your Networks and Information Secure

Our tenured expertise in information technology and cybersecurity allows us to provide scalable solutions that protect your organizations most critical systems and information. 

5 Steps to Affordably Grow into a New

Fire Station Alerting System

Click below and read the full Affordability Guide