Alpha Omega Technologies is a Service-Disabled Veteran-Owned, HUBZone certified company that specializes in all aspects of software engineering that harnesses the latest technologies and tools to deliver secure products and applications in dynamic new ways. We are a CMMI level 3 and ISO 9001:2008 certified company that practices the highest processes of Secure Software Engineering to secure software from the ground up. Alpha Omega Technologies, Inc is also has expertise in Software Assurance, Supply Chain Assurance, Software Security Measurement and Analysis, Lean Six Sigma, and Project Management. Whether you need a single custom application or a solution that encompasses multiple complex processes across your organization, we listen, understand and deliver. In more than a decade of serving clients, weʼve never failed to bring a project in on time and on budget. In an industry where others promise, we produce.
Appistry is a leading provider of analytics solutions based on cloud computing technologies. The company's flagship product, Appistry CloudIQ, is an open, scalable platform for data-intensive applications.
At ASET Partners, we engage our government partners, combining large-business experience with small-business efficiency and ingenuity, deploying optimal resources and expertise to implement the best solutions to our nation’s most challenging problems. The word "partners" is no accident in our corporate name - we work in collaboration with our government clients, engaging optimal resources and leveraging our experience and expertise to identify the best solutions for our nation's most challenging problems. Our capabilities include: system engineering, system lifecycle management, government compliance, and management support.
Bandura is a technology company with leading edge cyber security products that help customers protect their networks from constantly changing and adapting Internet threats. Bandura partners with IP reputation providers who provide up to date intelligence on who and where the latest threats are. Their intelligence databases contains millions of IP addresses associated with known threats. Bandura has developed and patented technologies that enable these large threat lists to be processed in real-time in an affordable solution. Bandura’s geo-location filtering technologies helps customers stay in compliance with government regulations by blocking traffic to and from banned countries. Bandura currently has products for the commercial and DOD markets, and has obtained the ISO Common Criteria EAL 4+ certification for security products, and the NIST FIPS 140-2 certification for encryption products.
CSE is a dynamic, woman-owned Engineering and Consulting Services firm with locations in Maryland and Nebraska . Services include software and systems engineering, configuration management, quality assurance, and program management. Specialties include C4ISR and signals processing custom applications development. CSE provides customers with full software development life-cycle support, including requirements analysis, software design and implementation, and formal testing using CMMI Level 3 equivalent processes and procedures.
CloudCover® is a cyber risk insurance entity uniquely aligned with cyber security technology focused on underwriting and insuring data security and privacy within online networks, near real-time.
CloudCover employs inline risk metrics and identifies security vulnerabilities attributed to in-flow data risk and therein shall underwrite the risk of in-transit data real-time. The core solution is known as CloudCover Data Insurance™(CDI). As a result, CDI shall be capable of underwriting first and third-party cyber risk in such a manner that insures the privacy and security of personal identifiable information while protecting the intellectual property (data) asset near real-time, e.g. insured cloud computing. This fundamental risk transfer protocol represents a new category of insurance providing continuous data risk governance, as well as active risk transfer protection — collectively known as the CloudCover Protocol™.
CWR is a strategic IT company specializing in infrastructure consultation and implementation. Our partners have over 150 years of combined experience in the IT industry, and pride ourselves on helping companies achieve their strategy business goals today and for the future.
CyberMap is creating an online map showing Maryland 's cyber resources and facilitating networking between companies. The CyberHive, a CyberMap program, will allow new and established companies from across the country to establish a presence in Maryland , giving them access to the region's cyber resources and opportunities.
Cyber Security Engineering Associates (CSEA) provides engineering services that ensure the security and integrity of our client's business operations. We provide a comprehensive suite of services to address all aspects of a business to ensure our clients fully understand their security posture. CSEA addresses not just the technical aspects of securing our clients business, but also the processes, and people. Our services include Security Engineering, Information Assurance, Systems Engineering, Software Engineering, Training, and Business Process Engineering. We provide our clients in the public and private sectors with analysis, design, implementation, and test of secure their information assets. We assist our clients in the reengineering of processes and training of their workforce to ensure all aspects required to ensure the security and integrity of their information are maintained.
Fearless Solutions is a minority owned business that serves a variety of Federal, state and local government clients as well as commercial sector clients. The company's core competencies include: visualization, Rapid Prototyping / Proof of Concept, Software Engineering / Web Application Development, Development Infrastructure Setup, Project and Program Management and Equipment procurement.
Integrata has developed the world's most advanced and effective system for protecting wireless networks. With technology exclusively licensed from the Department of Defense, Integrata's solution allows enterprises and governments to finally take advantage of safe wireless networking and safely manage the bring-your-own-device (BYOD) movement.
LightGrid, LLC focuses on the unique telecommunication challenges faced by the Federal Government and Department of Defense. Our foundation is based on extensive telecommunications experience and the delivery of solutions that meet or exceed customer requirements. Our core capabilities include: Strategic Network Technology Planning (Technology Refresh, Transition, and Insertion), Network Engineering Analysis and Design (Optical Transport Network Engineering, Wavelength Planning, Path Protection, Bill of Material (BOM) Preparation, Internet Protocol (IP) Network Engineering, Advanced Capabilities – Multiprotocol Label Switching (MPLS), Quality of Service (QoS), Internet Protocol version 6 (IPv6), Virtual Private Network (VPN), Multicast), Network Implementation (Site Surveys and Field Activities), Service Lifecycle Management (Service Strategy, Design, Transition, Service Realization) and Project Management (Financial, Contract, Procurement, Resource Management and Scheduling).
NETWAR DEFENSE has several industry certifications and partnerships that enable us to offer High Assurance IP Encryptor / Peer Discover Service, DITSCAP, DIACAP, C&A-CyberSecurity/Network Warfare, DoD Directives (3020, 4630, 5200, 6510, 8100, 8500), Continuous Monitoring-800-53, ICD503, Information Assurance Technical Framework (IATF), Agency Information Technology Security Architecture (ITSA), COOP, COG, (DoDAF-C4ISR), A123/A130, Enterprise Architecture Framework, Ozone Widget Framework (OWF), Capital Planning, EVMS, Strategic Planning, ERP/CRM, & e-Commerce that would serve to compliment various components of your organization's Program Drivers, Legislative Drivers, and Customer Forces (Executive Oversite & Governance)
ParaTools, Inc., founded in 2004, is devoted to the development and application of tools for parallel computing systems, with specific expertise in high performance computing and performance analysis. The principals, Dr. Allen Malony and Dr. Sameer Shende, have over 30 years of professional experience in parallel computing. Most notable in their parallel tool development portfolio is the TAU Performance System® in use at research laboratories across the United States.
ParaTools provides consulting expertise in parallel and distributed computing, performance evaluation, algorithms, and software development. With expertise in large-scale parallel systems, embedded real time systems, cloud computing, defense applications, and scientific computing, our consultants can assist you in applying performance tools effectively to your applications and optimizing code performance. ParaTools also offers a diverse set of training materials for high performance computing and scientific computing on UNIX, Linux, and Windows.
Radiant Infotech is a HUBZone certified, minority-owned and woman-owned small business. Radiant is a customer focused firm that leverages technology to help the US federal agencies achieve their mission s and goals. As a trusted partner, Radiant Infotech is committed to their clients to provide faster, better, and superior solutions to solve complex business problems and provide return on investment for the American people’s dollars.
Through an experienced and dedicated team of consultants, Radiant offers a gamut of information technology services focused on information management, software engineering and cyber security solutions. Their customers include Centers of Medicare and Medicaid (CMS) and National Institutes of Health (NIH), among others. Most recently, Radiant has worked with CMS in implementing the Affordable Care Act (ACA) also known as "ObamaCare".
Resilient Point is a Service Disabled Veteran Owned Small Business (SDVOSB) that delivers secure mobile, cyber security and intelligence solutions to both government and commercial organizations. We provide full spectrum cyber security and information technology expertise in support of network defense operations and related activities in both the government and private sectors. Our Secure Mobile, CyberSafety and Actionable Intelligence solutions are based on 50+ combined years of experience on Department of Defense platforms.
Resilient Point is driven by its leadership team’s commitment to delivering excellence, selfless service and above all, integrity. Resilient Point strives to make a real difference in the nation’s fight to win in cyberspace.
Resilient Point is a premier provider of secure mobile solutions to the U. S. government. Secure mobility is changing how we think about securing data and having an appropriate level of security in place in today’s ever growing virtual office to protect data. Our enterprise WIFI solutions are accredited up to the highest network classifications and rely solely on commercial-off-the-shelf equipment. Resilient Point’s mobile architecture uses a layered approach to securely connect mobile users to the classified enterprise. Resilient Point remains committed to remaining on the bleeding edge of secure mobile solutions.
Secured Sciences Group (SSG) is a woman-owned small business based in the bwtech@UMBC Research and Technology Park, University of Maryland, Baltimore County, MD. SSG’s principle offerings are: Cybersecurity Services, Governance, Risk & Compliance (GRC) Products & Solutions, Information Technology Services, andManagement Support. The SSG vision is to be a top-tier company offering world-class technology services and compliance management solutions. Their mission is to empower their clients through compliance, technology services and products in order to provide the best value.
TargetGov provides federal government procurement and related business development, sales, capture and marketing consulting services including business plan development, strategy and tactical processes, registration and certification services, public relations and marketing outreach services, capability statement development, orals presentations preparation, team member identification, RFP response, contract development, proposal management, contract administration and other expert federal contracting services.
Technology Security Associates (TSA), a Service-Disabled Veteran-Owned Small Business, supports a wide-ranging group of Department of the Navy acquisition programs in the areas of technology and information security and international programs. TSA also supports several small and large commercial clients in Information Security.
Veris Group, LLC is a management and technology services firm and accredited FedRAMP 3PAO with a core focus on providing information assurance and cybersecurity consulting services to government and commercial organizations. With a comprehensive understanding of technology as well as advanced strategy and management, Veris Group helps clients by providing customized, lasting solutions that not only address their immediate needs, but also provide cost-effective paths to achieving their strategic goals. We strive to meet the highest professional and industry standards and to provide optimal client satisfaction while delivering Risk, Security, and Compliance services as well as Information Technology and Program & Project Management solutions.
Ayasdi brings a pioneering approach to solve the world’s most complex problems with the first Insight Discovery platform that automatically discovers insights from data. Founded in 2008 after a decade of research at Stanford, DARPA, and NSF, Ayasdi uses Topological Data Analysis (TDA) to reinvent how we find knowledge from data without asking questions, writing queries or code. By pairing hundreds of mathematical algorithms with machine powered intelligence, Ayasdi enables end users and domain experts to discover knowledge from massive datasets in seconds to minutes, often finding answers to questions that one would not know to ask of their data.
DB Networks is innovating behavioral analysis based database security equipment for organizations who need to protect their data from advanced attacks. DB Networks Adaptive Database Firewall is an effective countermeasure against SQL Injection and database Denial of Service attacks. Unlike traditional database security solutions, which require extensive user customization, as well as time-consuming white list/black list maintenance, DB Networks Adaptive Database Firewall automatically learns each applications proper SQL transaction behavior. Any SQL transaction which subsequently deviates from the model immediately raises an alarm as an attack. DB Networks is a privately held company headquartered in San Diego, California.
Ghost Networks significantly diminish network exposure whilst delivering a collaborative and cloud services environment for trusted users. iWebGate has developed the world's first commercially available "off the shelf" Ghost Network software platform. This platform simplifies IT complexity and significantly reduces cost while being able to be implemented within minutes. Software developers and network administrators can supercharge existing on-premise and cloud infrastructure to obtain “beyond Fortune 500" security and computing experiences. This multi-award winning technology is much more than a powerful security product. It's a whole new computing dynamic with lifelong benefits on the way we connect ... including network virtualization (a more secure and better performing alternative to VPN) and the ability to easily obtain data from remote networks without opening and exposing firewall ports.
KoolSpan's TrustChip® simply and intuitively transforms a standard smartphone, or any computing device, into a secure communication device. A purpose-built crypto processor designed into a standard microSD package, the TrustChip makes security an inherent part of the communication experience-as simple as connectivity itself. KoolSpan's TrustChip delivers a full suite of security services including key management, authentication and encryption. Because it is deployed in its own optimized hardware environment, KoolSpan's high-performance TrustChip is insulated from threats that can reside in open platform and mobile host devices. This uniquely additive security processor provides a hardware-anchor to secure voice and other applications which harness the TrustChip's power.
Light Point Security protects corporate networks from viruses, spyware and other malicious software by allowing employees to browse the Internet from within a one-time-use virtual machine located on an enterprise’s server. By performing the dangerous task of parsing and rendering website code in a disposable virtual machine, no website content ever reaches an employee’s computer. Furthermore, by delivering this technology as a plugin to standard browsers, employees will have a simple to use, yet bulletproof web browsing solution. Accidentally stumbling onto a malicious site by mistyping a website address or clicking a booby-trapped link will no longer wreak havoc on a corporate network.
Spotkick makes security easier. Spotkick identifies and curates the best cyber security apps and lets customers run them directly on our cloud. No setup, no installs. Just click an app and you're off and running.
CKVS Virtual Enclave, LLC provides security consulting and security product development that address security gaps in Cloud Computing environment (Software as a Service, Platform as a Service, Infrastructure as a Service). We are currently engaged in developing Virtual Enclave Cells (VEC) product which is a combined containment and security control solution for Virtual Machines (VM/s). This solution looks at several security gaps in VM access control points and security control bridging to security infrastructure entities. CKVS Virtual Enclave, LLC also has fleshed out solution concepts for Communities of Interest transfers and access systems (both single and multi-level access systems) for cloud/s, and a behavioral analysis system that can be used for various purposes.
EnDepth Solutions is a Service Disabled Veteran Owned Small Business (SDVOSB) operating as an LLC. EnDepth specializes in providing Information Assurance and Cyber Security Services to our customers in both the Federal Government and private sectors. We pride ourselves on providing the highest quality of work to exceed our customer's goals. As a small business, EnDepth is also focused on providing our employees with opportunities to grow their careers without the restrictions of a large business.
Intellibit Systems LLC. is a minority-owned, and veteran-owned business providing professional network data communications and information technology support services to government and commercial clients. They also offer professional information technology education and public outreach services.
IntrusionOnline Corporation is the inventor of the IntrusionPoint SaaS tool that performs security artificial intelligence decision making analysis of intrusion prevention solutions and produces the best fit match for a user’s unique requirements. From firewalls and intrusion prevention systems to identity management systems, IntrusionPoint enables enterprises to gain full scope visibility of the cyber security marketplace solutions and matches their implementation requirements with the best solution that meets or exceeds their requirements and provides the most value.
JAK Tec provides IT solutions and services, specifically related to Cloud computing. It uses it's extensive experience in Cloud Computing and High Performance Computing to help organizations get maximum benefits from their Cloud based services. JAK Tec also provides consulting services on IT policy development, automation of security/privacy policies and development of cloud adoption strategy to organizations . The company is currently developing an automated cloud broker product that fills a key gap identified by a variety of market research companies such as Gartner and Forrester.