- M. C. Dean (Springfield, VA)
- …system environments including Windows Server and workstation and Redhat Enterprise Linux (RHEL) as well as virtual environments including VMWare, Hyper-V, Nutanix, ... and Authorizations, including, but not limited to: Evaluate STIG, eMASSter, Vulnerator, ACAS / TenableSC, STIG Viewer, SCAP Compliance Checker, eMASS, Xacta / Xacta… more