Cyber Defense & Information Assurance
Cyber Security Engineering
With the emergence of web technologies, networking, and online information sharing, cyber security has never been more critical to the governmental and commercial institutions. The growing number of attacks on our cyber networks has become one of the most serious economic and national security threats our nation faces. iCES is providing research and development efforts to NSA in the Cyber security domain, research on prototyping of Deep Web data mining for open source data, development of Scalable Dual Ellipsoidal Level Strip Algorithm for Analysis of Large Scale Cyber Data.
On another front, iCES is working on secure Android development for Mobile devices to support classified data and voice and working on security architecture for commercial cloud services. Our engineers are employing the use of system engineering and complex modeling and analysis to provide viable perceptions and different ways to describe problem complexity within the security assurance ecosystem and with sufficient insight to identify opportunities for real improvement. Services provided included Enterprise Security Management; Real time security event monitoring for networks, operating systems, and applications using Security Information and Event Management (SIEM) platforms; Real Time security event monitoring for Database activity; Centralized Management of Credentials; Secure communications standards - FIPS140-2 compliant solutions; Strong Authentication Solutions; Vulnerability scanning, Penetration Testing, Security Test and Evaluation (ST&E); FISMA Certification and Accreditation; Enterprise Level Threat Assessment.
Identity & Credential Management, and HSPD12 Support
For over a decade, the iCES team members have been supporting the DoD PKI and CAC, including Federal Bridge Support, US Treasury, and DHS/ICE. Scopes included PIV Enablement of Logical and Physical Access Control Systems; Convergence of Physical and Logical Access Control Systems; Identity and Credential Lifecycle Management; Federal ICAM Planning and Transition Management; Establishment and O&M of Public Key Infrastructure (PKI).
iCES staff have been technical contributors to numbers of committees and working groups and have worked on the architecture of large scale DoD Identity Management Systems. Support for the DHS and US Treasury encompasses Smart Card, Biometrics and PKI SMEs; Smart Card Issuance System Design and Development; Integration of Microsoft Certificate Authority (CA); Fingerprint Biometric Match-on-Card Proof-of-Concept; Personal Identity Verification (PIV) Card, Biometrics and PKI SMEs; Integration of PIV Identity Capture and Credentialing; Integration of Identity Proofing and Life Cycle Management; Treasury PKI (TPKI) Integration with GSA USAccess PIV Card Management System (CMS); PIV-Enablement of LACS/PACS; PIV-Enablement of LACS System Lifecycle Management (SLM); and Implementation of PIV Card Registration System (PCRS).
In our uncertain world, iCES understands the importance of the Department of Defense (DoD) and other Federal agencies in protecting and securing sensitive information transmitted over the internet and other networks. Unauthorized use of their sensitive information can adversely impact our national security and other vital interests. iCES is working with the Department of Defense (DoD) and other Federal agencies to support them in managing risks associated with the use, processing, storage, and transmission of information and data, and the systems and processes used for that purpose.
iCES Corporation provides integrated solutions that include analysis, methods, tools, and technologies that allow our customers to secure their information and IT infrastructures. We develop network security products and solutions that enable assured information sharing across secure domains or between communities of interest. Our Information Assurance support delivers IA technology, products, and services that meet the operational needs of our clients and customers to secure their information and information systems.
Systems Certification and Accreditation
iCES Corporation realizes the importance and essential part of assessing the cyber-security of an information system is in identifying, understanding, and managing the risks associated with the system's use. We use an industry proven process of assessing the security controls in an information system to determine if they are implemented correctly, operating as intended, and if they are meeting the system's security requirements.
iCES provides a comprehensive evaluation of technical and non-technical security controls of information systems to support the accreditation process that establishes the extent to which a design or implementation meets a set of technical, managerial, or procedural security controls. We apply state-of-the-art management, operational, and technical controls that provide us with an continuous situational awareness of the systems security state and allows us to focus on managing risk.