Client Companies

 

cyber Incubator Companies

Alpha Omega Technologies, Inc.

www.aotechinc.com

 

Alpha Omega Technologies is a Service-Disabled Veteran-Owned, HUBZone certified company that specializes in all aspects of software engineering that harnesses the latest technologies and tools to deliver secure products and applications in dynamic new ways. We are a CMMI level 3 and ISO 9001:2008 certified company that practices the highest processes of Secure Software Engineering to secure software from the ground up. Alpha Omega Technologies, Inc is also has expertise in Software Assurance, Supply Chain Assurance, Software Security Measurement and Analysis, Lean Six Sigma, and Project Management. Whether you need a single custom application or a solution that encompasses multiple complex processes across your organization, we listen, understand and deliver. In more than a decade of serving clients, weʼve never failed to bring a project in on time and on budget. In an industry where others promise, we produce.

 
Appistry, Inc.

www.appistry.com

 

Appistry is a leading provider of analytics solutions based on cloud computing technologies. The company's flagship product, Appistry CloudIQ, is an open, scalable platform for data-intensive applications.

 
ASET Partners

www.asetpartners.com/index.php

 

At ASET Partners, we engage our government partners, combining large-business experience with small-business efficiency and ingenuity, deploying optimal resources and expertise to implement the best solutions to our nation’s most challenging problems. The word "partners" is no accident in our corporate name - we work in collaboration with our government clients, engaging optimal resources and leveraging our experience and expertise to identify the best solutions for our nation's most challenging problems. Our capabilities include: system engineering, system lifecycle management, government compliance, and management support.

 

Calvert Systems Engineering, Inc. (CSE)

www.calvertsystemsengineering.com

 

CSE is a dynamic, woman-owned Engineering and Consulting Services firm with locations in Maryland and Nebraska . Services include software and systems engineering, configuration management, quality assurance, and program management. Specialties include C4ISR and signals processing custom applications development. CSE provides customers with full software development life-cycle support, including requirements analysis, software design and implementation, and formal testing using CMMI Level 3 equivalent processes and procedures.

 

CWR Technologies

www.cwrtech.com

 

CWR is a strategic IT company specializing in infrastructure consultation and implementation. Our partners have over 150 years of combined experience in the IT industry, and pride ourselves on helping companies achieve their strategy business goals today and for the future.

 

CyberMap

www.cybermarylandmap.com

 

CyberMap is creating an online map showing Maryland 's cyber resources and facilitating networking between companies. The CyberHive, a CyberMap program, will allow new and established companies from across the country to establish a presence in Maryland , giving them access to the region's cyber resources and opportunities.

 
Cyber Security Engineering Associates (CSEA)

www.csea.us

 

Cyber Security Engineering Associates (CSEA) provides engineering services that ensure the security and integrity of our client's business operations. We provide a comprehensive suite of services to address all aspects of a business to ensure our clients fully understand their security posture. CSEA addresses not just the technical aspects of securing our clients business, but also the processes, and people. Our services include Security Engineering, Information Assurance, Systems Engineering, Software Engineering, Training, and Business Process Engineering. We provide our clients in the public and private sectors with analysis, design, implementation, and test of secure their information assets. We assist our clients in the reengineering of processes and training of their workforce to ensure all aspects required to ensure the security and integrity of their information are maintained.

 

Fearless Solutions

www.fearlesssolutions.com

 

Fearless Solutions is a minority owned business that serves a variety of Federal, state and local government clients as well as commercial sector clients.  The company's core competencies include: visualization, Rapid Prototyping / Proof of Concept, Software Engineering / Web Application Development, Development Infrastructure Setup, Project and Program Management and Equipment procurement.

 

Focused Support, LLC

www.focusedsupport.com

 

Focused Support LLC is a Service Disabled Veteran Owned Small Business (SDVOSB) creating operationally suitable commercial software products for the unmanned systems market.  Focused Support also provides operationally relevant mission systems support and subject matter expertise to unmanned system operators.

 
KoolSpan

www.koolspan.com

 

KoolSpan's TrustChip® simply and intuitively transforms a standard smartphone, or any computing device, into a secure communication device. A purpose-built crypto processor designed into a standard microSD package, the TrustChip makes security an inherent part of the communication experience-as simple as connectivity itself. KoolSpan's TrustChip delivers a full suite of security services including key management, authentication and encryption. Because it is deployed in its own optimized hardware environment, KoolSpan's high-performance TrustChip is insulated from threats that can reside in open platform and mobile host devices. This uniquely additive security processor provides a hardware-anchor to secure voice and other applications which harness the TrustChip's power.

 

LightGrid, LLC

www.lightgrid.com

 

LightGrid, LLC focuses on the unique telecommunication challenges faced by the Federal Government and Department of Defense. Our foundation is based on extensive telecommunications experience and the delivery of solutions that meet or exceed customer requirements. Our core capabilities include: Strategic Network Technology Planning (Technology Refresh, Transition, and Insertion), Network Engineering Analysis and Design (Optical Transport Network Engineering, Wavelength Planning, Path Protection, Bill of Material (BOM) Preparation, Internet Protocol (IP) Network Engineering, Advanced Capabilities – Multiprotocol Label Switching (MPLS), Quality of Service (QoS), Internet Protocol version 6 (IPv6), Virtual Private Network (VPN), Multicast), Network Implementation (Site Surveys and Field Activities), Service Lifecycle Management (Service Strategy, Design, Transition, Service Realization) and Project Management (Financial, Contract, Procurement, Resource Management and Scheduling).

 

NETWAR DEFENSE

www.netwardefense.com

 

NETWAR DEFENSE has several industry certifications and partnerships that enable us to offer High Assurance IP Encryptor / Peer Discover Service, DITSCAP, DIACAP, C&A-CyberSecurity/Network Warfare, DoD Directives (3020, 4630, 5200, 6510, 8100, 8500), Continuous Monitoring-800-53, ICD503, Information Assurance Technical Framework (IATF), Agency Information Technology Security Architecture (ITSA),  COOP, COG, (DoDAF-C4ISR), A123/A130, Enterprise Architecture Framework, Ozone Widget Framework (OWF), Capital Planning, EVMS, Strategic Planning, ERP/CRM, & e-Commerce that would serve to compliment various components of your organization's Program Drivers, Legislative Drivers, and Customer Forces (Executive Oversite & Governance)

 

Paratools

www.paratools.com

 

ParaTools, Inc., founded in 2004, is devoted to the development and application of tools for parallel computing systems, with specific expertise in high performance computing and performance analysis. The principals, Dr. Allen Malony and Dr. Sameer Shende, have over 30 years of professional experience in parallel computing. Most notable in their parallel tool development portfolio is the TAU Performance System® in use at research laboratories across the United States.

 

ParaTools provides consulting expertise in parallel and distributed computing, performance evaluation, algorithms, and software development.  With expertise in large-scale parallel systems, embedded real time systems, cloud computing, defense applications, and scientific computing, our consultants can assist you in applying performance tools effectively to your applications and optimizing code performance.  ParaTools also offers a diverse set of training materials for high performance computing and scientific computing on UNIX, Linux, and Windows.

 

Radiant Infotech

www.radiantt.com


Radiant Infotech is a HUBZone certified, minority-owned and woman-owned small business. Radiant is a customer focused firm that leverages technology to help the US federal agencies achieve their mission s and goals. As a trusted partner, Radiant Infotech is committed to their clients to provide faster, better, and superior solutions to solve complex business problems and provide return on investment for the American people’s dollars.

Through an experienced and dedicated team of consultants, Radiant offers a gamut of information technology services focused on information management, software engineering and cyber security solutions. Their customers include Centers of Medicare and Medicaid (CMS) and National Institutes of Health (NIH), among others. Most recently, Radiant has worked with CMS in implementing the Affordable Care Act (ACA) also known as "ObamaCare".

 

RELI Group, Inc.

www.relillc.com

 

RELI Group is a Minority Own SBA certified HUBZone Small Business, specialized in Healthcare IT and Population Health serving the Federal, Commercial and Non Profit organizations.


Our Expertise - IT Project Management, Requirement Analysis, Agile Software Development, Business Intelligence, Health IT, Software QA, Information Assurance, Data Base Management, Public Health Research, Statistical Analysis, Survey, Population Health, Health Policy, Privacy and Security.


Trusted Partner for CMS - RELI Group employees have decade long experience working at the Centers for Medicare and Medicaid Services (CMS). We have strong domain knowledge of Medicare and Medicaid programs and we understand the mission and goals of CMS. RELI Group supports various programs in the divisions of CPI, EDG, OFM, CCSQ, OIS, CMMI and OEM at CMS. Our strength is our trusted relationship with these business owners and systems owners at CMS.

 

Resilient Point, LLC

www.resilientpoint.com

Resilient Point is a Service Disabled Veteran Owned Small Business (SDVOSB) that delivers secure mobile, cyber security and intelligence solutions to both government and commercial organizations. We provide full spectrum cyber security and information technology expertise in support of network defense operations and related activities in both the government and private sectors. Our Secure Mobile, CyberSafety and Actionable Intelligence solutions are based on 50+ combined years of experience on Department of Defense platforms. 

Resilient Point is driven by its leadership team’s commitment to delivering excellence, selfless service and above all, integrity. Resilient Point strives to make a real difference in the nation’s fight to win in cyberspace.

 

Resilient Point is a premier provider of secure mobile solutions to the U. S. government. Secure mobility is changing how we think about securing data and having an appropriate level of security in place in today’s ever growing virtual office to protect data.  Our enterprise WIFI solutions are accredited up to the highest network classifications and rely solely on commercial-off-the-shelf equipment.  Resilient Point’s mobile architecture uses a layered approach to securely connect mobile users to the classified enterprise.  Resilient Point remains committed to remaining on the bleeding edge of secure mobile solutions.

 

Secured Sciences Group (SSG)

www.securedsciences.com

 

Secured Sciences Group (SSG) is a woman-owned small business based in the bwtech@UMBC Research and Technology Park, University of Maryland, Baltimore County, MD.  SSG’s principle offerings are: Cybersecurity Services, Governance, Risk & Compliance (GRC) Products & Solutions, Information Technology Services, andManagement Support. The SSG vision is to be a top-tier company offering world-class technology services and compliance management solutions.  Their mission is to empower their clients through compliance, technology services and products in order to provide the best value.

 

TargetGov

www.targetgov.com

 

TargetGov provides federal government procurement and related business development, sales, capture and marketing consulting services including business plan development, strategy and tactical processes, registration and certification services, public relations and marketing outreach services, capability statement development, orals presentations preparation, team member identification, RFP response, contract development, proposal management, contract administration and other expert federal contracting services.

 

Technology Security Associates

www.technology-security-associates.com

 

Technology Security Associates (TSA), a Service-Disabled Veteran-Owned Small Business, supports a wide-ranging group of Department of the Navy acquisition programs in the areas of technology and information security and international programs. TSA also supports several small and large commercial clients in Information Security.

 

Veris Group, LLC

www.verisgroup.com

 

Veris Group, LLC is a management and technology services firm and accredited FedRAMP 3PAO with a core focus on providing information assurance and cybersecurity consulting services to government and commercial organizations. With a comprehensive understanding of technology as well as advanced strategy and management, Veris Group helps clients by providing customized, lasting solutions that not only address their immediate needs, but also provide cost-effective paths to achieving their strategic goals. We strive to meet the highest professional and industry standards and to provide optimal client satisfaction while delivering Risk, Security, and Compliance services as well as Information Technology and Program & Project Management solutions.

 

Watsec Cyber Risk Management

www.watsec.com

 

WatSec is a technology company offering effective and affordable programs for containing cyber risk. For example, our TUF insurance program is sold by enterprise risk management partners who are experienced at identifying clients who would most benefit from an ongoing program of security assessment and cyber risk insurance.

 

WatSec has also developed cyber risk programs for the needs of specific markets such as suppliers in supply chain networks. Many of these companies are smaller than their prime partner, yet they require the same safeguards. By implementing programs for workforce cyber risk education, systematically identifying cyber vulnerabilities "that matter", creating a security profile roadmap based on NIST's new Cybersecurity Framewor, and then making available cyber risk insurance protection, these supply chain strategic partners are able to protect themselves using the best cyber risk management programs on the market.

 

Williams Consulting, LLC

www.williamsconsultingllc.com

 

Williams Consulting, LLC is a certified Economically Disadvantaged Woman Owned Small Business (EDWOSB) and Woman Business Enterprise (WBE) specializing in Healthcare IT support and program management for large, complex, multi-stakeholder programs. We have deep domain knowledge (Medicare, Medicaid, Dual Eligibles, Clinical Quality, Population Health and Health Disparities) and strong experience in Health Plan Operations (Claims, Enrollment, Consumer Engagement, Provider Services and Payment). Our core competencies and service offerings include:  Program/Project Management (IT and Business); Software Development; Enterprise Architecture; Consumer Engagement; Business Intelligence; Outreach, Education and Technical Assistance; Technical Training and Support; Program Portfolio Optimization; Business and IT Governance; Performance Metrics and Monitoring; Business Process Transformation, Redesign, and Modernization; and, Security. Williams Consulting leverages Health IT industry best practices, our deep healthcare domain knowledge, and technical expertise to deliver quality, innovative, and reliable healthcare IT solutions and program management services.

 

CYNC PROGRAM Companies

Ayasdi, Inc.

www.ayasdi.com

 

Ayasdi brings a pioneering approach to solve the world’s most complex problems with the first Insight Discovery platform that automatically discovers insights from data. Founded in 2008 after a decade of research at Stanford, DARPA, and NSF, Ayasdi uses Topological Data Analysis (TDA) to reinvent how we find knowledge from data without asking questions, writing queries or code. By pairing hundreds of mathematical algorithms with machine powered intelligence, Ayasdi enables end users and domain experts to discover knowledge from massive datasets in seconds to minutes, often finding answers to questions that one would not know to ask of their data.

 
CKVS Virtual Enclave, LLC

www.ck-vsolutions.com

 

CKVS Virtual Enclave, LLC provides security consulting and security product development that address security gaps in Cloud Computing environment (Software as a Service, Platform as a Service, Infrastructure as a Service).  We are currently engaged in developing Virtual Enclave Cells (VEC) product which is a combined containment and security control solution for Virtual Machines (VM/s). This solution looks at several security gaps in VM access control points and security control bridging to security infrastructure entities.  CKVS Virtual Enclave, LLC also has fleshed out solution concepts for Communities of Interest transfers and access systems (both single and multi-level access systems) for cloud/s, and a behavioral analysis system that can be used for various purposes.

 

DB Networks

www.dbnetworks.com

 

DB Networks is innovating behavioral analysis based database security equipment for organizations who need to protect their data from advanced attacks. DB Networks Adaptive Database Firewall is an effective countermeasure against SQL Injection and database Denial of Service attacks. Unlike traditional database security solutions, which require extensive user customization, as well as time-consuming white list/black list maintenance, DB Networks Adaptive Database Firewall automatically learns each applications proper SQL transaction behavior. Any SQL transaction which subsequently deviates from the model immediately raises an alarm as an attack. DB Networks is a privately held company headquartered in San Diego, California.

 
iWebGate

www.iwebgate.com

 

Ghost Networks significantly diminish network exposure whilst delivering a collaborative and cloud services environment for trusted users.  iWebGate has developed the world's first commercially available "off the shelf" Ghost Network software platform.  This platform simplifies IT complexity and significantly reduces cost while being able to be implemented within minutes.  Software developers and network administrators can supercharge existing on-premise and cloud infrastructure to obtain “beyond Fortune 500" security and computing experiences.  This multi-award winning technology is much more than a powerful security product.  It's a whole new computing dynamic with lifelong benefits on the way we connect ... including network virtualization (a more secure and better performing alternative to VPN) and the ability to easily obtain data from remote networks without opening and exposing firewall ports.

 

Light Point Security

www.lightpointsecurity.com

 

Light Point Security protects corporate networks from viruses, spyware and other malicious software by allowing employees to browse the Internet from within a one-time-use virtual machine located on an enterprise’s server. By performing the dangerous task of parsing and rendering website code in a disposable virtual machine, no website content ever reaches an employee’s computer. Furthermore, by delivering this technology as a plugin to standard browsers, employees will have a simple to use, yet bulletproof web browsing solution. Accidentally stumbling onto a malicious site by mistyping a website address or clicking a booby-trapped link will no longer wreak havoc on a corporate network.

 

 

Affiliate Companies

EnDepth Solutions

www.endepthsolutions.com

 

EnDepth Solutions is a Service Disabled Veteran Owned Small Business (SDVOSB) operating as an LLC. EnDepth specializes in providing Information Assurance and Cyber Security Services to  our customers in both the Federal Government and private sectors. We pride ourselves on providing the highest quality of work to exceed our customer's goals. As a small business, EnDepth is also focused on providing our employees with opportunities to grow their careers without the restrictions of a large business.

 
Intellibit Systems, LLC

www.intellibitsystems.com

Intellibit Systems LLC. is a minority-owned, and veteran-owned business providing professional network data communications and information technology support services to government and commercial clients. They also offer professional information technology education and public outreach services.

 

IntrusionOnline Corporation

 

IntrusionOnline Corporation is the inventor of the IntrusionPoint SaaS tool that performs security artificial intelligence decision making analysis of intrusion prevention solutions and produces the best fit match for a user’s unique requirements.  From firewalls and intrusion prevention systems to identity management systems, IntrusionPoint enables enterprises to gain full scope visibility of the cyber security marketplace solutions and matches their implementation requirements with the best solution that meets or exceeds their requirements and provides the most value.

 

JAK Tec, LLC

www.jaktec.com

 

JAK Tec provides IT solutions and services, specifically related to Cloud computing. It uses it's extensive experience in Cloud Computing and High Performance Computing to help organizations get maximum benefits from their Cloud based services. JAK Tec also provides consulting services on IT policy development, automation of security/privacy policies and development of cloud adoption strategy to organizations . The company is currently developing an automated cloud broker product that fills a key gap identified by a variety of market research companies such as Gartner and Forrester.

 

RedShred, LLC

 

RedShred™ builds software that can take complex business documents, like grants and RFPs, quickly extract the information that is most important to you, and give you an efficient way to review opportunities without all the manual intervention. RedShred™ can match a customer with the opportunities that best fit their profile and then give them the tools to analyze and respond to that opportunity quickly, giving them a competitive advantage. RedShred™’s software is delivered on a SaaS/cloud basis either under a subscription or pay-per-transaction model more typical for smaller accounts.