Alpha Omega Technologies is a Service-Disabled Veteran-Owned, HUBZone certified company that specializes in all aspects of software engineering that harnesses the latest technologies and tools to deliver secure products and applications in dynamic new ways. We are a CMMI level 3 and ISO 9001:2008 certified company that practices the highest processes of Secure Software Engineering to secure software from the ground up. Alpha Omega Technologies, Inc is also has expertise in Software Assurance, Supply Chain Assurance, Software Security Measurement and Analysis, Lean Six Sigma, and Project Management. Whether you need a single custom application or a solution that encompasses multiple complex processes across your organization, we listen, understand and deliver. In more than a decade of serving clients, weʼve never failed to bring a project in on time and on budget. In an industry where others promise, we produce.
Appistry is a leading provider of analytics solutions based on cloud computing technologies. The company's flagship product, Appistry CloudIQ, is an open, scalable platform for data-intensive applications.
At ASET Partners, we engage our government partners, combining large-business experience with small-business efficiency and ingenuity, deploying optimal resources and expertise to implement the best solutions to our nation’s most challenging problems. The word "partners" is no accident in our corporate name - we work in collaboration with our government clients, engaging optimal resources and leveraging our experience and expertise to identify the best solutions for our nation's most challenging problems. Our capabilities include: system engineering, system lifecycle management, government compliance, and management support.
Bandura is a technology company with leading edge cyber security products that help customers protect their networks from constantly changing and adapting Internet threats. Bandura partners with IP reputation providers who provide up to date intelligence on who and where the latest threats are. Their intelligence databases contains millions of IP addresses associated with known threats. Bandura has developed and patented technologies that enable these large threat lists to be processed in real-time in an affordable solution. Bandura’s geo-location filtering technologies helps customers stay in compliance with government regulations by blocking traffic to and from banned countries. Bandura currently has products for the commercial and DOD markets, and has obtained the ISO Common Criteria EAL 4+ certification for security products, and the NIST FIPS 140-2 certification for encryption products.
CSE is a dynamic, woman-owned Engineering and Consulting Services firm with locations in Maryland and Nebraska . Services include software and systems engineering, configuration management, quality assurance, and program management. Specialties include C4ISR and signals processing custom applications development. CSE provides customers with full software development life-cycle support, including requirements analysis, software design and implementation, and formal testing using CMMI Level 3 equivalent processes and procedures.
Catomi Systems is a new company providing high-level expertise in metrics, cost estimating/modeling, earned value management, financial/budget analysis, enterprise resources planning, financial systems design/implementation, and systems engineering (process mapping, simulation, and software requirements) to the Federal intelligence community, DoD, and other Federal agencies.
CWR is a strategic IT company specializing in infrastructure consultation and implementation. Our partners have over 150 years of combined experience in the IT industry, and pride ourselves on helping companies achieve their strategy business goals today and for the future.
CyberMap is creating an online map showing Maryland 's cyber resources and facilitating networking between companies. The CyberHive, a CyberMap program, will allow new and established companies from across the country to establish a presence in Maryland , giving them access to the region's cyber resources and opportunities.
ENG Solutions is an emerging information technology services and consulting company with a wealth of experience in the intelligence, defense, and homeland security sectors. With extensive experience and talent spanning across every facet of business and IT, our team can support any requirement. Whether its business process improvement, security management, system development, governance, compliance, or day-to-day operations, our goal is to deliver the most comprehensive, cost-efficient, long-lasting, and effective solutions to meet the needs our clients.
Fearless Solutions is a minority owned business that serves a variety of Federal, state and local government clients as well as commercial sector clients. The company's core competencies include: visualization, Rapid Prototyping / Proof of Concept, Software Engineering / Web Application Development, Development Infrastructure Setup, Project and Program Management and Equipment procurement.
Futech Engineering Solutions, LLC is a veteran-owned certified minority business enterprise with the State of Maryland that provide support in the areas of information technology, systems engineering, documentation, and program management. Specific tasks we will help companies with are writing/editing/ and the production of cyber security and other IT related documentation, information assurance services such as password encryption and other security related services, systems engineering that comprise of logistics and provisioning support, testing and analysis of various electronics and computer software and systems, and program management in which we can help the client by managing a specific program for them throughout its life-cycle thus effectively reducing cost and adding value.
LightGrid, LLC focuses on the unique telecommunication challenges faced by the Federal Government and Department of Defense. Our foundation is based on extensive telecommunications experience and the delivery of solutions that meet or exceed customer requirements. Our core capabilities include: Strategic Network Technology Planning (Technology Refresh, Transition, and Insertion), Network Engineering Analysis and Design (Optical Transport Network Engineering, Wavelength Planning, Path Protection, Bill of Material (BOM) Preparation, Internet Protocol (IP) Network Engineering, Advanced Capabilities – Multiprotocol Label Switching (MPLS), Quality of Service (QoS), Internet Protocol version 6 (IPv6), Virtual Private Network (VPN), Multicast), Network Implementation (Site Surveys and Field Activities), Service Lifecycle Management (Service Strategy, Design, Transition, Service Realization) and Project Management (Financial, Contract, Procurement, Resource Management and Scheduling).
NETWAR DEFENSE has several industry certifications and partnerships that enable us to offer High Assurance IP Encryptor / Peer Discover Service, DITSCAP, DIACAP, C&A-CyberSecurity/Network Warfare, DoD Directives (3020, 4630, 5200, 6510, 8100, 8500), Continuous Monitoring-800-53, ICD503, Information Assurance Technical Framework (IATF), Agency Information Technology Security Architecture (ITSA), COOP, COG, (DoDAF-C4ISR), A123/A130, Enterprise Architecture Framework, Ozone Widget Framework (OWF), Capital Planning, EVMS, Strategic Planning, ERP/CRM, & e-Commerce that would serve to compliment various components of your organization's Program Drivers, Legislative Drivers, and Customer Forces (Executive Oversite & Governance)
Secured Sciences Group (SSG) is a woman-owned small business based in the bwtech@UMBC Research and Technology Park, University of Maryland, Baltimore County, MD. SSG’s principle offerings are: Cybersecurity Services, Governance, Risk & Compliance (GRC) Products & Solutions, Information Technology Services, andManagement Support. The SSG vision is to be a top-tier company offering world-class technology services and compliance management solutions. Their mission is to empower their clients through compliance, technology services and products in order to provide the best value.
TargetGov provides federal government procurement and related business development, sales, capture and marketing consulting services including business plan development, strategy and tactical processes, registration and certification services, public relations and marketing outreach services, capability statement development, orals presentations preparation, team member identification, RFP response, contract development, proposal management, contract administration and other expert federal contracting services.
Technology Security Associates (TSA), a Service-Disabled Veteran-Owned Small Business, supports a wide-ranging group of Department of the Navy acquisition programs in the areas of technology and information security and international programs. TSA also supports several small and large commercial clients in Information Security.
Veris Group, LLC is a management and technology services firm and accredited FedRAMP 3PAO with a core focus on providing information assurance and cybersecurity consulting services to government and commercial organizations. With a comprehensive understanding of technology as well as advanced strategy and management, Veris Group helps clients by providing customized, lasting solutions that not only address their immediate needs, but also provide cost-effective paths to achieving their strategic goals. We strive to meet the highest professional and industry standards and to provide optimal client satisfaction while delivering Risk, Security, and Compliance services as well as Information Technology and Program & Project Management solutions.
Business and IT stakeholders in many industries and application domains that AccelerEyes serves rely on the latest technologies to deliver results. AccelerEyes develops and markets Jacket, a software platform that is in use in dozens of countries by hundreds of customers. AccelerEyes' approach to application development and deployment empowers scientists, engineers, and analysts to transform their serial applications, simply, into high performance GPU enabled versions. The combination of rapid application development that they provide with very high level languages changes the landscape for technical and analytical computing.
Ayasdi brings a pioneering approach to solve the world’s most complex problems with the first Insight Discovery platform that automatically discovers insights from data. Founded in 2008 after a decade of research at Stanford, DARPA, and NSF, Ayasdi uses Topological Data Analysis (TDA) to reinvent how we find knowledge from data without asking questions, writing queries or code. By pairing hundreds of mathematical algorithms with machine powered intelligence, Ayasdi enables end users and domain experts to discover knowledge from massive datasets in seconds to minutes, often finding answers to questions that one would not know to ask of their data.
DB Networks is innovating behavioral analysis based database security equipment for organizations who need to protect their data from advanced attacks. DB Networks Adaptive Database Firewall is an effective countermeasure against SQL Injection and database Denial of Service attacks. Unlike traditional database security solutions, which require extensive user customization, as well as time-consuming white list/black list maintenance, DB Networks Adaptive Database Firewall automatically learns each applications proper SQL transaction behavior. Any SQL transaction which subsequently deviates from the model immediately raises an alarm as an attack. DB Networks is a privately held company headquartered in San Diego, California.
Current Security Information and Event Management (SIEM) systems disregard the semantic value of the events they collect. SIEM’s typically just display data without analysis via bar, line, and pie charts. This “data puking” provides little to no value other than pleasing management. The charts provide no insight into the state of an enterprise nor do they provide situational awareness.
Five Directions has developed ground-breaking methods and technology that provides system administrators and cyber first-responders with the tools to understand, visualize, and react to today's advanced cyber threats.
Ghost Networks significantly diminish network exposure whilst delivering a collaborative and cloud services environment for trusted users. iWebGate has developed the world's first commercially available "off the shelf" Ghost Network software platform. This platform simplifies IT complexity and significantly reduces cost while being able to be implemented within minutes. Software developers and network administrators can supercharge existing on-premise and cloud infrastructure to obtain “beyond Fortune 500" security and computing experiences. This multi-award winning technology is much more than a powerful security product. It's a whole new computing dynamic with lifelong benefits on the way we connect ... including network virtualization (a more secure and better performing alternative to VPN) and the ability to easily obtain data from remote networks without opening and exposing firewall ports.
KoolSpan's TrustChip® simply and intuitively transforms a standard smartphone, or any computing device, into a secure communication device. A purpose-built crypto processor designed into a standard microSD package, the TrustChip makes security an inherent part of the communication experience-as simple as connectivity itself. KoolSpan's TrustChip delivers a full suite of security services including key management, authentication and encryption. Because it is deployed in its own optimized hardware environment, KoolSpan's high-performance TrustChip is insulated from threats that can reside in open platform and mobile host devices. This uniquely additive security processor provides a hardware-anchor to secure voice and other applications which harness the TrustChip's power.
Light Point Security protects corporate networks from viruses, spyware and other malicious software by allowing employees to browse the Internet from within a one-time-use virtual machine located on an enterprise’s server. By performing the dangerous task of parsing and rendering website code in a disposable virtual machine, no website content ever reaches an employee’s computer. Furthermore, by delivering this technology as a plugin to standard browsers, employees will have a simple to use, yet bulletproof web browsing solution. Accidentally stumbling onto a malicious site by mistyping a website address or clicking a booby-trapped link will no longer wreak havoc on a corporate network.
Computer displays are the most overlooked security vulnerability in the world today. There are technologies to protect data at rest (encryption), and data in motion (VPNs), but until now there has been no software solution to protect valuable information at the point of use – the computer monitor. Oculis Labs was founded in 2007 to address that problem. The company looked at traditional physical solutions like plastic filters and closed offices and decided there had to be a better way. The data is digital, so the protection should be digital too. Oculis Labs has built security software that protects data in use on the computer display.
Spotkick makes security easier. Spotkick identifies and curates the best cyber security apps and lets customers run them directly on our cloud. No setup, no installs. Just click an app and you're off and running.
Cyber Security Engineering Associates (CSEA) provides engineering services that ensure the security and integrity of our client's business operations. We provide a comprehensive suite of services to address all aspects of a business to ensure our clients fully understand their security posture. CSEA addresses not just the technical aspects of securing our clients business, but also the processes, and people. Our services include Security Engineering, Information Assurance, Systems Engineering, Software Engineering, Training, and Business Process Engineering. We provide our clients in the public and private sectors with analysis, design, implementation, and test of secure their information assets. We assist our clients in the reengineering of processes and training of their workforce to ensure all aspects required to ensure the security and integrity of their information are maintained.
EnDepth Solutions is a Service Disabled Veteran Owned Small Business (SDVOSB) operating as an LLC. EnDepth specializes in providing Information Assurance and Cyber Security Services to our customers in both the Federal Government and private sectors. We pride ourselves on providing the highest quality of work to exceed our customer's goals. As a small business, EnDepth is also focused on providing our employees with opportunities to grow their careers without the restrictions of a large business.
Group Z provides full System Development Life Cycle (SDLC) services, with a core focus in Application Development and Project Management. Other services include Data Analysis, designing Secure Networks, and providing Network and Help Desk Support. Through these services, Group Z helps its customers achieve their goals by improving productivity, streamlining processes and reducing costs. Since inception in 2001, providing exceptional value has been the foundation of the company.
Intellibit Systems LLC. is a minority-owned, and veteran-owned business providing professional network data communications and information technology support services to government and commercial clients. They also offer professional information technology education and public outreach services.
Tiresias Technologies is a new venture founded in 2011 by veteran technologist and entrepreneur Sharon Brackett. Tiresias Technologies focuses on solving tough technical problems that exist in Government and Commercial organizations alike. The company tackles those challenges by applying Intelligent Systems to problems creating timely and cost effective solutions. The company is an SBA registered Woman Owned Small Business and is headquartered in Howard County, MD smack dab between Washington DC and Baltimore.