Cybersecurity
- Cybersecurity Engineering
- Cyber Forensics
- DoD Information Assurance Assessment and Authorization Process
- Risk Management Framework
- Security Certification
- Prevention/Recovery/Investigative Services
- Cross-domain Analysis
- Information Assurance Planning, Coordination and Evaluation

Digital Forensics Solutions
Forensic Discovery
- Networks and Computer Hard Drives (internal/external)
- Handheld devices including Phones and GPS Devices
- Activities on Storage Devices (e.g. USB)
- Digital Cameras
- Encrypted Devices and Files
- Documents and Photos
Investigative Analysis
- Social Media Accounts
- Contacts, Notes, Images, Calendars, SMS, MMS
- File System Corruption
- Program Recovery and Access
- Web Browser History and Artifacts
- Calendar Information
- Email (POP3, Cloud-based, etc.)
- Deleted Files
- Database Information
- Comprehensive Forensics Laboratory with secure locked access
- Commercially Available Digital Forensics
- Hardware and Software Tools
Digital Forensics Team - click here

Engineering Services
- Requirements Specifications
- Design Concepts
- Reliability and Maintainability
- Safety Analysis
- Hardware/Software Configuration Management
- Technical Documentation
- Integrated Logistics Support
- Training
- Support Equipment

Research & Development
- Intelligent Data Fusion
- Algorithm Development
- Machine Learning
- Threat Identification
- Fault/Damage Detection, Assessment, and Isolation
- Log Analytics
- Big Data Analytics
- Anti-tamper Technologies
- Open Systems Architecture
- Secure Cross-domain Architecture

Software Design & Development
- Requirements Analysis
- Software Design
- Application Development
- Test Planning and Execution
- System Deployment