Onyx Point Privacy Policy

Your privacy is very important to us. Our Privacy Policy describes how we use our website to collect, use, communicate and make use of personal information.

Onyx Point uses Google Analytics to assess website health and functionality. Google Analytics utilizes a standard technology called “cookies,” to collect information and report on how our website is being used. When accessing www.onyxpoint.com, we will be collecting non-personally identifiable information that may include the date and time of your site visit, the number of pages visited during your session, and/or your session duration. We will also collect information pertaining to the browser or device used, the operating system used, the domain name of your internet service provider and your IP address. Google Inc. may transfer the information it collects on to third parties when required to do so by law or where such third parties process the information on Google’s behalf. By using this website you have granted your consent to the processing of data about you by Google in the manners outlined above.

We will not collect personally identifiable information about you such as your name, address, telephone number or email address, unless you choose submit it via the “Contact Us” form, or a Newsletter Subscription form found on numerous pages throughout our site.

Cookies are unique text files that are placed on your computer to help our website identify how users interact with it. Information gathered from these cookies about your interactions with our website, including your IP address, is transmitted and stored by Google in the United States. Google uses this information to evaluate and report on the interaction you have on our website. This practice helps us provide you with a positive website experience.

Email Information
Onyx Point will collect and store your email information only if you willingly fill out a “Contact Us” form. You have the right to remove your email address from any of our mailing lists.

Collection of Information by Third-Party Sites and Sponsors
Our site contains links to other parties’ sites whose privacy policies may differ from ours. We advertise events and publications with links to their website for content review and event registration. If you are concerned with how these sites treat your privacy, please review the policies on the applicable websites.

Policy Changes
We reserve the right to change or update this Privacy Policy at any time without prior notice. We are committed to conducting business in accordance with these guiding principles in order to ensure the confidentiality of your personal information is protected and maintained.

If you have any questions regarding this policy or your interactions with our website, please contact us by email at: info@onyxpoint.com or by mail:

Onyx Point Inc.
7050 Hi Tech Dr, Suit3 102
Hanover, MD 21076

To build insanely great solutions, you start with the essentials – the stuff too many engineers skip over in their rush to market. That’s not us.

At Onyx Point, we start by listening and learning your business—and how your infrastructure can be best improved to support it.

We know IT—but never make assumptions about any project. So, we cover a lot of ground, from the smallest detail to the big picture, to build an application that excels from the ground up.

Systems Engineering

We believe that all systems should begin with best practices and that legacy systems can adopt them. We apply this approach in every client engagement, tailored to our client's preferred lifecycle methodology. We can effectively work within traditional models or help you accelerate your development delivery by transitioning to a DevOps mindset.

The point is this – we help our clients design and develop IT infrastructures to meet their business and mission goals. Because that's what good business is about.

Applied Security

Applied Security

Let’s get serious – why push out a solution that’s inherently insecure? At Onyx Point, we design from the start with your critical pain points in mind – policy compliance and security.

We’ve worked extensively on the policy application, documentation, and review side of system development. We know the requirements inside out, so we can better align them with your business processes to ensure effective compliance enforcement.

In the complex field of security, we’ve worn a lot of hats - black, white, and grey. We are experts at decomposing security requirements into specifications from both internal and external stakeholders. Before implementation, we effectively integrate the security specifications into your overall system design.

In short, we deliver an integrated, secure, and compliant foundation for your infrastructure while simultaneously tackling your other requirements. Is this a huge value add for you? Absolutely — and one that Onyx Point uniquely offers.

Do More With Less

Do More With Less

Automating your infrastructure makes great business sense—if it’s done to the highest standards. At Onyx Point, our solutions solve both time and resource issues by letting you automatically provision services with fewer staff and greater efficiencies:

  • Designing and building scalable automation frameworks.
  • Developing successful Infrastructure automation processes.
  • Creating systems ranging from small-scale, highly specialized secure data processing systems, to massive cloud environments. Both as bare-metal systems and within public and private clouds, such as OpenStack and AWS.



We work to one goal - results. That’s why our customers repeatedly call on us to for their most challenging projects:

  • We have automated client systems to safeguard and audit Personally Identifying Information (PII) and simultaneously automate compliance and evaluation against various regulations such as NIST-1253, DoD 800-53, and the SCAP Security Guides.
  • We have assisted organizations through the transition from an R&D environment into a full DIACAP/NISPOM compliant infrastructure, including:
    • Preparation of System Security Plans
    • Introduction of consistent development workflow processes and technologies
    • Understanding system audit and review processes
    • Performing pre-system analyses for delivery to internal security review teams
    • Working with certification authorities and security teams to understand the relevance of technical mitigations to findings.