Ads 468x60px

Why Certification Matters

You're standing in line at the pharmacy looking at the prescription you're about to fill.  You'll fill it - and then you'll take the medicine as directed.  All because you trust that your doctor knows what you need to feel better.

We are comfortable with all of this because of the trust which has been built up by the rigorous standards doctors have to meet in order to practice medicine.

But every day we make decisions with our personal information that are just as important.  This is why certification in information technology is so important.

The International Information Systems Security Certification Consortium, Inc., (ISC)²®, is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers. (ISC)²® is recognized for Gold Standard certifications and world class education programs. 

John Horst, Managing Member for Technology, has the CISSP®-ISSAP® certification, considered the highest level of certification for secure software architecture by the United States Department of Defense (DoD 8570 IASAE Level III).

Cybersecurity is always a tradeoff between secure solutions and flexible solutions.  Let Xanesti Technology Services guide your organization in discovering the security solutions which best fit your business plan.
 

8(m) Minority Woman Owned

Xanesti Technology Services, LLC is an 8(m) certified Minority Woman Owned Small Business Enterprise (MWOSBE) interested in partnering with DoD other Federal and State government Prime contractors.

We provide DoD IASAE Level III Information Assurance (IA) Workforce solutions.

CISSP®-ISSAP®

Managing Member for Technology John Horst holds the CISSP®-ISSAP® certification, considered the gold standard information technology security certification.

John Horst currently serves as the Treasurer for the San Diego Chapter of (ISC)2.



Committed to Business

The single biggest challenge businesses face with information technology is the tendency for business professionals and IT professionals to talk past each other.

Xanesti Technology Services is committed to bridging this gap with a requirements gathering methodology which places your users (not the technology) at the center of the process.

We discover (often from a business plan) the discrete groups of users who have discrete responsibilities for the execution of the business plan, and then map how your information technology infrastructure provides the capabilities they require.

This allows us to identify where "commercial off-the-shelf" (COTS) products are sufficient (usually for 80% of the needs) and where customized solutions can provide the remaining capabilities.

Partnering with Xanesti will result in a clear picture of business value for all your information technology investments.