Expertise
Security you can run with clarity, discipline, and confidence.
Security is how you turn risk into disciplined, reliable operations. It’s more than deploying tools. It’s unifying identity, strengthening detection and response, protecting endpoints and networks, shaping architecture, aligning compliance, and coaching human behavior. Together, these capabilities create the clarity, governance, and resilience every organization depends on. Explore the full range of our Security expertise below.
Identity & Access Management
Protect your organization from breaches and audit risks by making identity a cornerstone of your security strategy. We design and implement identity and access management programs for cloud and on-premises environments, integrating single sign-on, multi-factor authentication, governance, and privileged access management with your existing systems. Zero trust is built in from the start, and every individual receives the right access through clear roles, structured workflows, and ongoing reviews. Automated lifecycle management keeps your security perimeter strong and adaptable.
Security Operations, Threat Detection & Incident Response
Accelerate threat detection and response by transforming your security operations. We build and refine processes that integrate SIEM, XDR, SOAR, and threat intelligence with your existing teams and tools, using MITRE ATT&CK–aligned playbooks. Instead of overwhelming alert storms, you get actionable runbooks, on-call models, tabletop exercises, and automation that connect SOC workflows to ITSM and business stakeholders. Incidents are contained faster, lessons drive real change, and you gain clear metrics for resilience, MTTD, and MTTR.
Endpoint, Network & Cloud Protection
Safeguard endpoints, networks, and cloud workloads without slowing your business. We build layered defenses that combine endpoint detection, next-generation firewalls, secure access service edge, and hardening baselines tailored to real attack paths. Our approach replaces ad hoc exceptions with clear, actionable patterns. We deliver segmented network designs, robust policies, and integrated monitoring, connecting security operations with IT teams. This results is security posture that is visible to leadership and auditors, while also reducing intrusions and strengthening barriers against lateral movement.
Security Architecture & Risk Management
Reduce cyber risk by designing security architectures that match how your business actually operates. We align NIST RMF, NIST CSF, and zero trust principles with practical patterns for on-prem, cloud, and SaaS workloads. No generic checklists or tool-led diagrams. Engagements yield reference architectures, control mappings, risk registers, decision records, and roadmaps linked to regulatory obligations and tolerance. Leaders gain a defensible risk story, clearer investment priorities, and controls that engineers, auditors, and boards can all understand.
Compliance & Policy Frameworks
Unify your security and privacy compliance frameworks to reduce audit fatigue and regulatory risk. We build a cohesive system tailored to your risk appetite mapping NIST, CIS, HIPAA, CJIS, PCI DSS, and ISO 27001 into a single control library and policy set. Our approach eliminates duplicate effort and replaces “binderware” with clear, actionable policies. Governance works with system owners and security operations to assign control ownership and establish review cycles, resulting in faster audits and greater stakeholder trust.
Human Risk Management & Training
Lower breach risk by transforming employees from security liabilities into coached defenders. Our human risk programs blend phishing simulations with role-based microlearning and just-in-time coaching, all grounded in your policies and regulatory obligations. Instead of relying on annual training videos, deliver targeted content and reporting dashboards that connect HR, security operations, and compliance. This approach shifts the focus from completion rates to measurable behavior change, making progress visible and actionable across your organization.
Our Clients
Hundreds of clients. Thousands of projects.
In the midst of the cyberattack that made international headlines, Resource Data’s professionals helped bring a majority of our affected services securely back online.
~ Eric Wyatt, Former IT Director, Mat-Su Borough, Alaska
Electric Utility
Network redesign strengthens utility operations
A large regional electric utility needed to strengthen network security, performance, and reliability after experiencing major outages caused by design limitations and spanning-tree failures. With more than 60 sites spread across hundreds of miles, the existing network had become increasingly complex and difficult to manage.
A new architecture was developed with full redundancies and security segmentation to improve resilience. The design introduced a zone-based security model with VRFs and OSPF routing from the headquarters core to each site’s access layer, balancing security with budget constraints and the skill sets of operational staff. Resource Data supported the effort by documenting the network, creating a migration plan, and providing training and detailed documentation to ensure long-term scalability.
The redesigned network improved stability, security, and performance while preparing the utility for future growth. With a stronger foundation, the organization is continuing to expand capacity through fiber upgrades, new security appliances, and a secondary datacenter to support its long-term zero-trust strategy.
Regional Transportation Organization
A secure, organization-wide Microsoft 365 rollout
A statewide transportation corporation with 600+ employees wanted to get more value from its Microsoft 365 licenses after migrating off its internal email system. To support collaboration, file sharing, and security across the business, the IT team needed guidance to set up the environment securely.
The project started with discovery sessions to confirm requirements and align the configuration with security standards. Pilot deployments confirmed Teams as the replacement for older collaboration tools. OneDrive addressed long-standing file storage and sharing issues. Resource Data also launched a SharePoint Online hub that gave administrators and staff one place to find training and support resources.
The rollout delivered a stable Microsoft 365 environment for internal and external users. Employees had simpler access to communication and file-sharing tools, and IT administrators were better prepared to manage and expand the platform over time.
Medical Network of Alaska
A Cleaner, Safer Way to Access Clinical and Office Tools
Medical Network of Alaska needed multi-factor authentication to meet cyberinsurance requirements and support a new electronic medical records system. Okta was selected to provide MFA and serve as the foundation for modern identity management.
Resource Data led the implementation, starting with analysis and architecture to address an unexpectedly complex identity environment. This work ensured Okta could function not only as MFA but also as the primary identity provider. Despite time adjustments to accommodate an EMR rollout, the integration was completed successfully.
Okta now serves as the source of truth for Office 365 and the service desk system, providing MFA for all staff through phone apps or hardware keys. A single sign-on portal gives easy access to Outlook, Teams, and other tools, with Okta positioned to extend to additional systems.
Matanuska Susitna Borough
Stronger Security and Simpler Management for the Borough
Matanuska-Susitna Borough needed to replace an aging firewall platform that no longer met current security, reliability, or support standards. The environment increased costs, limited new security approaches, and complicated policy management.
After selecting a new platform, Resource Data redesign included configuration templates, diagrams, testing, cutover and rollback planning, and staff training. The transition was completed smoothly, with operational control handed off to Borough staff.
The upgrade added high-availability firewalls across key network layers, improved VPN for remote and mobile users, and modernized policy management to support zero-trust. Consolidating services and retiring unnecessary devices reduced operating costs while strengthening security.
Federal Fisheries Management Program
Protecting Fisheries Data With a Stronger Cloud Foundation
A fisheries management program serving federal, state, and international partners needed to move its fisheries tracking system from aging Oracle servers to Azure. The migration also required a security program strong enough to meet strict federal requirements.
The new environment was designed and provisioned with virtual networks, hardened servers, firewalls, and a SIEM integrated with threat intelligence feeds. Resource Data led the work to align with federal security standards and built a complete security framework, including a system security plan, more than a dozen policies, and a plan of actions and milestones.
With regular security drills, penetration testing, and ongoing monitoring, the program gained stronger governance and resilience to protect critical fisheries data. The cloud platform improved compliance, reduced risk, and created a sustainable foundation for long-term operations.
Professional Services Consulting Firm
Making Complex Billing Changes Traceable and Secure
An Alaska-based organization that bills oil shipments through the Trans Alaska Pipeline needed stronger controls for a critical financial system. With millions of dollars at stake and regular audits, the existing data model could not handle complex revisions and relationships with enough security and traceability.
Resource Data redesigned the data model to support a fully versioned billing system, improving management of historical records and ongoing changes. The solution used C#, .NET MVC3, and JavaScript with jQuery, was tested with NUnit, and deployed through Jenkins. More than 500 automated tests provided continuous feedback.
The redesign delivered a secure, reliable billing system that improved accuracy and reduced audit effort, strengthening confidence in financial operations.
Cybersecurity Solutions
Security You Can Operate Under Pressure.
Security rarely fails all at once. It erodes quietly through unclear access, brittle controls, and designs no one can fully explain. We help you to restore discipline, reduce the potential “blast radius”, and turn security from a collection of tools into operations you can run, measure, and defend.
Identity Governance
Pass Audits with Access You Can Explain.
Many organizations when facing an audit realize identity has grown fragmented. Access lives across directories, apps, and ad hoc groups that no one fully owns. The solution is to consolidate identity into a single authoritative platform and remediate sprawl without disrupting daily work. SSO and MFA need to be integrated application by application, across cloud and on-prem systems, with cutover plans and rollback tests. Provisioning follows defined workflows tied to ITSM. Admin access is governed, reviewed quarterly, and documented. Now when auditors ask who has access and why, the answer is clear, current, and defensible.
Firewall Modernization
Cut Firewall Outages by Making Change Predictable.
Over time, firewall rules accumulate faster than they are reviewed. Exceptions linger. Ownership fades. Outages follow. Fixing scenarios such as this begin with cleaning rule sprawl and defining zone-based policies that reflect how traffic actually flows. High-availability pairs are implemented with pre-checks, post-checks, and rehearsed rollbacks. Next, traffic paths are mapped and validated before cutover. VPN, ZTNA, and SASE are tuned for users, not theory. Now exceptions are tied to an owner and an expiration date in ITSM. Finally, operations receives clear diagrams, runbooks, and review cadences so rule sets remain explainable during audits and incident reviews.
Cloud Security
Ship Regulated Cloud Workloads on Day One.
Cloud migrations often stall when security documentation no longer reflects reality. We build the landing zone first, then layer identity, logging, endpoint protection, encryption, and network controls before workloads move. Security telemetry flows into SIEM from the start. Hosts are hardened. Guardrails are enforced. The SSP, POA&M, diagrams, and runbooks are written to match what is deployed, not what was planned. Controls are validated through scans, tabletop exercises, and incident drills. Teams enter audits with evidence already collected and monitoring already in place, instead of scrambling to recreate history.
Network Segmentation
Limit the Impact of Potential Breaches
Flat networks fail quietly until they fail loudly. We have experienced that when incidents occur, lateral movement can spread faster than your teams can respond. We can help you redesign networks around service-based zones with explicit trust boundaries. Traffic paths are documented so teams know what should communicate and what should not. Segmentation is implemented using routing and isolation patterns, not fragile overlays. NAC and micro-segmentation reinforce the design. Ownership is recorded in ITSM and CMDB. Logging and telemetry provide visibility as environments evolve. Now when incidents happen, impact is contained, response is faster, and leadership understands what was protected and why.

Bear Remien
Service Area Lead, Systems Engineering
Bear Remien is an expert systems engineering leader with over 20 years of experience guiding organizations through complex infrastructure, security, and transformation initiatives. He combines deep technical judgment with steady leadership, enabling teams to design and operate resilient enterprise systems in highly regulated and operationally demanding environments. Bear is particularly effective at aligning stakeholders, shaping technical direction, and leading teams through high-risk efforts such as data center modernization, cybersecurity hardening, and large-scale organizational change.