Alpha Omega Technologies is a Service-Disabled Veteran-Owned, HUBZone certified company that specializes in all aspects of software engineering that harnesses the latest technologies and tools to deliver secure products and applications in dynamic new ways. We are a CMMI level 3 and ISO 9001:2008 certified company that practices the highest processes of Secure Software Engineering to secure software from the ground up. Alpha Omega Technologies, Inc is also has expertise in Software Assurance, Supply Chain Assurance, Software Security Measurement and Analysis, Lean Six Sigma, and Project Management. Whether you need a single custom application or a solution that encompasses multiple complex processes across your organization, we listen, understand and deliver. In more than a decade of serving clients, weʼve never failed to bring a project in on time and on budget. In an industry where others promise, we produce.
Appistry is a leading provider of analytics solutions based on cloud computing technologies. The company's flagship product, Appistry CloudIQ, is an open, scalable platform for data-intensive applications.
At ASET Partners, we engage our government partners, combining large-business experience with small-business efficiency and ingenuity, deploying optimal resources and expertise to implement the best solutions to our nation’s most challenging problems. The word "partners" is no accident in our corporate name - we work in collaboration with our government clients, engaging optimal resources and leveraging our experience and expertise to identify the best solutions for our nation's most challenging problems. Our capabilities include: system engineering, system lifecycle management, government compliance, and management support.
Using innovative technology, Bricata provides a deep, multi-vector cyber threat defense system to protect your network. Based on multi-threaded processing for unparalleled throughput speeds, Bricata's next generation intrusion prevention system (NGIPS) delivers double the detection performance for more timely threat prevention in single appliance and cloud-based configurations at roughly half the cost of traditional IDPS solutions. With 80% of breaches occurring within your network’s perimeter, Bricata’s core level security stops threats where they occur.
CSE is a dynamic, woman-owned Engineering and Consulting Services firm with locations in Maryland and Nebraska . Services include software and systems engineering, configuration management, quality assurance, and program management. Specialties include C4ISR and signals processing custom applications development. CSE provides customers with full software development life-cycle support, including requirements analysis, software design and implementation, and formal testing using CMMI Level 3 equivalent processes and procedures.
CWR is a strategic IT company specializing in infrastructure consultation and implementation. Our partners have over 150 years of combined experience in the IT industry, and pride ourselves on helping companies achieve their strategy business goals today and for the future.
CyberMap is creating an online map showing Maryland 's cyber resources and facilitating networking between companies. The CyberHive, a CyberMap program, will allow new and established companies from across the country to establish a presence in Maryland , giving them access to the region's cyber resources and opportunities.
Cyber Security Engineering Associates (CSEA) provides engineering services that ensure the security and integrity of our client's business operations. We provide a comprehensive suite of services to address all aspects of a business to ensure our clients fully understand their security posture. CSEA addresses not just the technical aspects of securing our clients business, but also the processes, and people. Our services include Security Engineering, Information Assurance, Systems Engineering, Software Engineering, Training, and Business Process Engineering. We provide our clients in the public and private sectors with analysis, design, implementation, and test of secure their information assets. We assist our clients in the reengineering of processes and training of their workforce to ensure all aspects required to ensure the security and integrity of their information are maintained.
Fearless Solutions is a minority owned business that serves a variety of Federal, state and local government clients as well as commercial sector clients. The company's core competencies include: visualization, Rapid Prototyping / Proof of Concept, Software Engineering / Web Application Development, Development Infrastructure Setup, Project and Program Management and Equipment procurement.
Focused Support LLC is a Service Disabled Veteran Owned Small Business (SDVOSB) creating operationally suitable commercial software products for the unmanned systems market. Focused Support also provides operationally relevant mission systems support and subject matter expertise to unmanned system operators.
KoolSpan's TrustChip® simply and intuitively transforms a standard smartphone, or any computing device, into a secure communication device. A purpose-built crypto processor designed into a standard microSD package, the TrustChip makes security an inherent part of the communication experience-as simple as connectivity itself. KoolSpan's TrustChip delivers a full suite of security services including key management, authentication and encryption. Because it is deployed in its own optimized hardware environment, KoolSpan's high-performance TrustChip is insulated from threats that can reside in open platform and mobile host devices. This uniquely additive security processor provides a hardware-anchor to secure voice and other applications which harness the TrustChip's power.
LightGrid, LLC focuses on the unique telecommunication challenges faced by the Federal Government and Department of Defense. Our foundation is based on extensive telecommunications experience and the delivery of solutions that meet or exceed customer requirements. Our core capabilities include: Strategic Network Technology Planning (Technology Refresh, Transition, and Insertion), Network Engineering Analysis and Design (Optical Transport Network Engineering, Wavelength Planning, Path Protection, Bill of Material (BOM) Preparation, Internet Protocol (IP) Network Engineering, Advanced Capabilities – Multiprotocol Label Switching (MPLS), Quality of Service (QoS), Internet Protocol version 6 (IPv6), Virtual Private Network (VPN), Multicast), Network Implementation (Site Surveys and Field Activities), Service Lifecycle Management (Service Strategy, Design, Transition, Service Realization) and Project Management (Financial, Contract, Procurement, Resource Management and Scheduling).
NETWAR DEFENSE has several industry certifications and partnerships that enable us to offer High Assurance IP Encryptor / Peer Discover Service, DITSCAP, DIACAP, C&A-CyberSecurity/Network Warfare, DoD Directives (3020, 4630, 5200, 6510, 8100, 8500), Continuous Monitoring-800-53, ICD503, Information Assurance Technical Framework (IATF), Agency Information Technology Security Architecture (ITSA), COOP, COG, (DoDAF-C4ISR), A123/A130, Enterprise Architecture Framework, Ozone Widget Framework (OWF), Capital Planning, EVMS, Strategic Planning, ERP/CRM, & e-Commerce that would serve to compliment various components of your organization's Program Drivers, Legislative Drivers, and Customer Forces (Executive Oversite & Governance)
Optio Labs creates, optimizes and productizes transformational security and productivity technologies for the mobile enterprise and embedded systems. Founded in 2012, Optio Labs was formed around technologies originating from Virginia Tech scientists, Dr. Charles Clancy, Dr. Jules White and Dr. Brian Dougherty. With offices in Nashville, TN and Washington DC, Optio Labs customers include federal agencies, commercial enterprises, and device manufacturers.
ParaTools, Inc., founded in 2004, is devoted to the development and application of tools for parallel computing systems, with specific expertise in high performance computing and performance analysis. The principals, Dr. Allen Malony and Dr. Sameer Shende, have over 30 years of professional experience in parallel computing. Most notable in their parallel tool development portfolio is the TAU Performance System® in use at research laboratories across the United States.
ParaTools provides consulting expertise in parallel and distributed computing, performance evaluation, algorithms, and software development. With expertise in large-scale parallel systems, embedded real time systems, cloud computing, defense applications, and scientific computing, our consultants can assist you in applying performance tools effectively to your applications and optimizing code performance. ParaTools also offers a diverse set of training materials for high performance computing and scientific computing on UNIX, Linux, and Windows.
Premium Logistics is a travel agent for cargo. The company is licensed as a non-vessel operating common carrier enabling it to secure competitive rates with steamship lines. The freight forwarding license of the company allows it to book cargo all over the world. The property broker license enables the company to schedule the transportation of goods throughout the US. The owner of the company is a licensed customs broker and provides customs entries for goods arriving into the US. These services are offered to several niche industries. The Premium Logistics team has gathered expertise and built a network of specialized providers in these industries: License Controlled goods, Wheeled and Tracked cargo, Food Items, and Unusual Items.
Radiant Infotech is a HUBZone certified, minority-owned and woman-owned small business. Radiant is a customer focused firm that leverages technology to help the US federal agencies achieve their mission s and goals. As a trusted partner, Radiant Infotech is committed to their clients to provide faster, better, and superior solutions to solve complex business problems and provide return on investment for the American people’s dollars.
Through an experienced and dedicated team of consultants, Radiant offers a gamut of information technology services focused on information management, software engineering and cyber security solutions. Their customers include Centers of Medicare and Medicaid (CMS) and National Institutes of Health (NIH), among others. Most recently, Radiant has worked with CMS in implementing the Affordable Care Act (ACA) also known as "ObamaCare".
RedShred™ builds software that can take complex business documents, like grants and RFPs, quickly extract the information that is most important to you, and give you an efficient way to review opportunities without all the manual intervention. RedShred™ can match a customer with the opportunities that best fit their profile and then give them the tools to analyze and respond to that opportunity quickly, giving them a competitive advantage. RedShred™’s software is delivered on a SaaS/cloud basis either under a subscription or pay-per-transaction model more typical for smaller accounts.
RELI Group is a Minority Own SBA certified HUBZone Small Business, specialized in Healthcare IT and Population Health serving the Federal, Commercial and Non Profit organizations.
Our Expertise - IT Project Management, Requirement Analysis, Agile Software Development, Business Intelligence, Health IT, Software QA, Information Assurance, Data Base Management, Public Health Research, Statistical Analysis, Survey, Population Health, Health Policy, Privacy and Security.
Trusted Partner for CMS - RELI Group employees have decade long experience working at the Centers for Medicare and Medicaid Services (CMS). We have strong domain knowledge of Medicare and Medicaid programs and we understand the mission and goals of CMS. RELI Group supports various programs in the divisions of CPI, EDG, OFM, CCSQ, OIS, CMMI and OEM at CMS. Our strength is our trusted relationship with these business owners and systems owners at CMS.
Resilient Point is a Service Disabled Veteran Owned Small Business (SDVOSB) that delivers secure mobile, cyber security and intelligence solutions to both government and commercial organizations. We provide full spectrum cyber security and information technology expertise in support of network defense operations and related activities in both the government and private sectors. Our Secure Mobile, CyberSafety and Actionable Intelligence solutions are based on 50+ combined years of experience on Department of Defense platforms.
Resilient Point is driven by its leadership team’s commitment to delivering excellence, selfless service and above all, integrity. Resilient Point strives to make a real difference in the nation’s fight to win in cyberspace.
Resilient Point is a premier provider of secure mobile solutions to the U. S. government. Secure mobility is changing how we think about securing data and having an appropriate level of security in place in today’s ever growing virtual office to protect data. Our enterprise WIFI solutions are accredited up to the highest network classifications and rely solely on commercial-off-the-shelf equipment. Resilient Point’s mobile architecture uses a layered approach to securely connect mobile users to the classified enterprise. Resilient Point remains committed to remaining on the bleeding edge of secure mobile solutions.
The Ridgeback security appliance is a self-contained security appliance that monitors network traffic and takes action automatically to mitigate any threats to IT resources. The Ridgeback appliance combines the proprietary technologies of Actor Profiling and Active Camouflage to detect and stop intruders. A Ridgebackappliance can be used as an advanced standalone intrusion prevention system, or deployed as an active, intelligent sensor in a larger integrated security framework.
Syncopated Engineering is a creative solution provider of software applications and embedded systems for wireless communications, signal processing, and data analytics. Our goal is to deliver creative and effective solutions to our customers’ most challenging problems. We employ an agile and disciplined development process that emphasizes customer communication, system usefulness and usability, and the flexibility to accommodate change at the pace of our customer's dynamic mission.
TargetGov provides federal government procurement and related business development, sales, capture and marketing consulting services including business plan development, strategy and tactical processes, registration and certification services, public relations and marketing outreach services, capability statement development, orals presentations preparation, team member identification, RFP response, contract development, proposal management, contract administration and other expert federal contracting services.
United World Technologies is a leading representation and export-assistance consulting firm with offices in Maryland, U.S., Kiev, Ukraine and Moscow, Russia. United World Technologies specializes in expanding the reach of U.S companies in the information technology, healthcare, banking, energy, and telecommunications fields into Russia, Ukraine, other Commonwealth of Independent States (CIS) countries, and countries around the world.
Veris Group, LLC is a management and technology services firm and accredited FedRAMP 3PAO with a core focus on providing information assurance and cybersecurity consulting services to government and commercial organizations. With a comprehensive understanding of technology as well as advanced strategy and management, Veris Group helps clients by providing customized, lasting solutions that not only address their immediate needs, but also provide cost-effective paths to achieving their strategic goals. We strive to meet the highest professional and industry standards and to provide optimal client satisfaction while delivering Risk, Security, and Compliance services as well as Information Technology and Program & Project Management solutions.
WatSec is a technology company offering effective and affordable programs for containing cyber risk. For example, our TUF insurance program is sold by enterprise risk management partners who are experienced at identifying clients who would most benefit from an ongoing program of security assessment and cyber risk insurance.
WatSec has also developed cyber risk programs for the needs of specific markets such as suppliers in supply chain networks. Many of these companies are smaller than their prime partner, yet they require the same safeguards. By implementing programs for workforce cyber risk education, systematically identifying cyber vulnerabilities "that matter", creating a security profile roadmap based on NIST's new Cybersecurity Framewor, and then making available cyber risk insurance protection, these supply chain strategic partners are able to protect themselves using the best cyber risk management programs on the market.
Williams Consulting, LLC is a certified Economically Disadvantaged Woman Owned Small Business (EDWOSB) and Woman Business Enterprise (WBE) specializing in Healthcare IT support and program management for large, complex, multi-stakeholder programs. We have deep domain knowledge (Medicare, Medicaid, Dual Eligibles, Clinical Quality, Population Health and Health Disparities) and strong experience in Health Plan Operations (Claims, Enrollment, Consumer Engagement, Provider Services and Payment). Our core competencies and service offerings include: Program/Project Management (IT and Business); Software Development; Enterprise Architecture; Consumer Engagement; Business Intelligence; Outreach, Education and Technical Assistance; Technical Training and Support; Program Portfolio Optimization; Business and IT Governance; Performance Metrics and Monitoring; Business Process Transformation, Redesign, and Modernization; and, Security. Williams Consulting leverages Health IT industry best practices, our deep healthcare domain knowledge, and technical expertise to deliver quality, innovative, and reliable healthcare IT solutions and program management services.
Ayasdi brings a pioneering approach to solve the world’s most complex problems with the first Insight Discovery platform that automatically discovers insights from data. Founded in 2008 after a decade of research at Stanford, DARPA, and NSF, Ayasdi uses Topological Data Analysis (TDA) to reinvent how we find knowledge from data without asking questions, writing queries or code. By pairing hundreds of mathematical algorithms with machine powered intelligence, Ayasdi enables end users and domain experts to discover knowledge from massive datasets in seconds to minutes, often finding answers to questions that one would not know to ask of their data.
Ghost Networks significantly diminish network exposure whilst delivering a collaborative and cloud services environment for trusted users. iWebGate has developed the world's first commercially available "off the shelf" Ghost Network software platform. This platform simplifies IT complexity and significantly reduces cost while being able to be implemented within minutes. Software developers and network administrators can supercharge existing on-premise and cloud infrastructure to obtain “beyond Fortune 500" security and computing experiences. This multi-award winning technology is much more than a powerful security product. It's a whole new computing dynamic with lifelong benefits on the way we connect ... including network virtualization (a more secure and better performing alternative to VPN) and the ability to easily obtain data from remote networks without opening and exposing firewall ports.
Light Point Security protects corporate networks from viruses, spyware and other malicious software by allowing employees to browse the Internet from within a one-time-use virtual machine located on an enterprise’s server. By performing the dangerous task of parsing and rendering website code in a disposable virtual machine, no website content ever reaches an employee’s computer. Furthermore, by delivering this technology as a plugin to standard browsers, employees will have a simple to use, yet bulletproof web browsing solution. Accidentally stumbling onto a malicious site by mistyping a website address or clicking a booby-trapped link will no longer wreak havoc on a corporate network.
Del Rey Analytics provides cybersecurity consulting for health care organizations (e.g. clinics, nursing homes, accountable care organizations, health care exchanges, etc.), and provides a cloud-based service, Security Check In A Box for Physicians (SCIBP), to the same target market.
The headlines are all about security incidents at big companies, but small to medium sized businesses are attacked more often than big companies, they just don’t make the news. The fact is that small to medium sized companies need to focus on security just like everyone else. Your business depends on the information and IT that run it. You can’t afford to have data stolen, or to be locked out of your systems. Factor61 can help.
We will review the way your IT is set up and make recommendations for better protection while making sure you can get your business done. During our review, we will look for and fix existing compromises that you may not be aware you have. We will then set up an extensive monitoring service that gives you early warnings of problems so they can be fixed before serious damage is done to your organization. We can even train your employees in the security skills they need to do their jobs more effectively.
JAK Tec provides IT solutions and services, specifically related to Cloud computing. It uses it's extensive experience in Cloud Computing and High Performance Computing to help organizations get maximum benefits from their Cloud based services. JAK Tec also provides consulting services on IT policy development, automation of security/privacy policies and development of cloud adoption strategy to organizations . The company is currently developing an automated cloud broker product that fills a key gap identified by a variety of market research companies such as Gartner and Forrester.
Kieyos and Premium Logistics North America (PLNA) offer consulting services to commercial clients in order to ensure compliance with US import and export regulations, including the International Traffic in Arms Regulation (ITAR) and the Export Administration Regulations (EAR).
Whether you are new to the import/export industry or need additional training and guidance because your products and/or services have shifted from ITAR jurisdiction to EAR under the Export Compliance Reform Act, Kieyos and PLNA professionals can guide you through each step of the way.
The Phoenix Operations Group is IT services company supporting both federal and commercial sectors. By straddling both worlds, we bring the best of each to the other and meet our objective of “arming analysts”. While our current niche is Big Data software analytics and services in the Cyber domain, our longer-term objective is to become more product based.
UAS Safeflight's goal is to sell a turnkey yet highly customizable Command and Sensor solution to UAS Original Equipment Manufacturers and/or users of large numbers of UAS for commercial purposes.