Inside the Module: Suspicious Contacts

In Access Commander, suspicious contacts can be reported and filed alongside foreign contacts through the Suspicious Contact Reporting module. Through the Suspicious Contacts module, FSOs can now access a comprehensive view of all reported contacts to look for connections and notice patterns.

Both the Suspicious Contacts and Suspicious Contacts Reporting modules can be accessed under the “Incident Reporting” menu in Access Commander, providing FSOs with unified data for counterintelligence and further investigation that can lead to the discovery and remediation of Insider Threats.

Access Commander Module Featured Image 2

Immediate Implementation

Start recording incidents from day one.

Access Commander Module Featured Image 1

Risk Management

Find patterns and subdue threats before any losses occur.

Access Commander Module Featured Image 3

Total Fulfillment

Keep your contract fully compliant with NISPOM and CI.

If your organization needs help with its suspicious contact management, see how Access Commander can strengthen and simplify your 32 CFR Part 117, NISPOM Rule, compliance. Contact us today to schedule your free demo!

MathCraft Security Technologies, Inc.

44121 Harry Byrd Highway

Suite 200

Ashburn, Virginia 20147

Phone: 703.729.9022