What should you look for in a cyber security assessment? Find out with our checklist. Download Now

Latest
Blog Posts

Guide: Best Practices for Data Protection

Hackers are trying to access your critical data systems. Learn the best practices for protecting your organization’s sensitive information.

Download Now

Client
Testimonials

  • Jim Robb

    System Wide Information Management Program Manager, Requirements and Governance Federal Aviation Administration

    "As your team knows, the SWIM program is one of the seven transformational programs for NextGen.  As we come to the anniversary of another year of support to SWIM delivery of NEXTGEN capabilities …”

    Learn More
  • Paul C. Jackson

    NAS Information Architect Federal Aviation Administration

    "The support received from North Star personnel was key to establishing the Governance framework for the FAA's SWIM Program. The knowledge and expertise in Service-Oriented Architecture (SOA), and diligence in …”

    Learn More
  • Duncan Booth

    Assistant Head, Finance and Operations Roland Park Country School

    “The analysis provided by the COMPASS security team gave us a remediation roadmap that will enable RPCS to prioritize the tasks necessary to significantly and cost effectively improve our security …”

    Learn More
View All