What should you look for in a cyber security assessment? Find out with our checklist. Download Now

Latest
Blog Posts

Guide: Best Practices for Data Protection

Hackers are trying to access your critical data systems. Learn the best practices for protecting your organization’s sensitive information.

Download Now

Client
Testimonials

  • Paul C. Jackson

    NAS Information Architect Federal Aviation Administration

    "The support received from North Star personnel was key to establishing the Governance framework for the FAA's SWIM Program. The knowledge and expertise in Service-Oriented Architecture (SOA), and diligence in …”

    Learn More
  • Sandra Anderson

    Communications Program Manager Federal Aviation Administration

    "North Star delivers high quality products on time. North Star also provides solid support in the development of a risk adjusted integrated master schedule covering a wide scope, a long …”

    Learn More
  • Duncan Booth

    Assistant Head, Finance and Operations Roland Park Country School

    “The analysis provided by the COMPASS security team gave us a remediation roadmap that will enable RPCS to prioritize the tasks necessary to significantly and cost effectively improve our security …”

    Learn More
View All