How to manage controlled unclassified information

WWT offers comprehensive assistance for aligning operations with the federally mandated standard Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations (NIST 800-171). The compliance deadline of December 31, 2017, is rapidly approaching, and many organizations do not have resources to achieve compliance within the necessary timeframe. WWT collaborates with your organization to provide the technology, services and industry experience to make the transition to NIST 800-171 effective and efficient.


As part of this engagement, WWT provides customers with:

  • Staff that can augment customer teams, lead compliance projects and programs, or create detailed plans for directing compliance activities
  • A highly experienced and capable network of systems engineers to rapidly implement access controls, network segmentation and other requirements
  • Proof-of-concept and product testing using the WWT Advanced Technology Center, a large multi-vendor lab environment
  • Systems integration that includes completely configured large-scale systems delivered through the WWT Integration Technology Center

WWT and customer teams determine compliance assistance through joint planning. If project planning or management is required, standardized and proven methodologies are used to ensure the program is delivered on time and within budget. If resources are required to augment customer teams, we provide staff who possess a depth of experience and capabilities to help infuse creative thinking, dynamic team cohesion and successful delivery of compliance efforts.


The WWT NIST 800-171 Compliance Assistance offering allows our customers to fill critical compliance resource needs with deeply experienced and highly trained professionals. WWT has the network and systems architects and engineers, project planners and managers, security consultants, and other technical capabilities to help our customers accomplish compliance in the most efficient manner possible.

View our NIST 800-171 Compliance Assistance brochure.

  • WWT & Syncurity Patch Management Overview

    WWT and the Syncurity IR-FlowSOAR platform solve the patch management challenge with a comprehensive solution that delivers rapid response and reduced cyber risk.
  • Business Insight Support System Overview

    Software tools that deal with network security can run on many disparate applications. WWT developed a Business Insight Support System that ties output from software solutions into one web-based portal, functioning as a single touch point for all network security data.
  • Host-based Segmentation Pilot

    Implement segmentation protection with a host-based pilot capability and demonstrate success in 90 days.
  • Integrated Endpoint Security Architecture Federal Overview

    For most organizations, the ability to demonstrate compliance to an assessment program directly correlates to the maturity of their cyber security program. Learn more about WWT’s approach to integrated endpoint security architecture for our federal customers.
  • Integrated Endpoint Security Architecture Commercial Overview

    Endpoint security must be part of an overall security architecture and strategy. If all the areas referenced in this paper are addressed and integrated within an environment, the result will be a level of protection that far exceeds anything a single point product can provide.
  • Professional Services Security Overview

    Our Professional Services architects can help to overcome the challenges of securing an organization’s infrastructure through network discovery, a security assessment and penetration testing.
  • Splunk Appliance for IT Operational Intelligence

    Through operational intelligence, Splunk helps organizations detect potential problems and decrease response time to meet DCOI compliance.
  • Identity and Access Management

    Organizations understand that providing users with secure access can be challenging and strenuous. Identity and Access Management (IAM) is an enterprise program that focuses on ensuring that authorized people and devices have the appropriate access at the right time.
  • WWT Security Practice

    Explore WWT's approach to defending against cyber threats.
  • HIPAA Security Assessment

    This assessment presents an organization with actionable data to strengthen areas, mature processes, bring attention to compliance issues, and provide recommendations for remediation efforts.
  • SOC Assessment

    WWT's Security Operations Center (SOC) Assessment will assess each of the foundation-level elements of people, process, and technology to identify your organization’s overall strengths and weaknesses, current maturity ratings, and provide recommendations for improvement.
  • Issues in Cloud Security

    This white paper discusses the major computer security issues confronting an organization when moving to the cloud.