DUNS Number: 962367004
CAGE Code: 600W4
Primary NAICS Code(s):
541519; 541611; 541690; 541330; 541990
Certified Veteran-Owned Business (VOB)







Winning in today's war against terror
requires more than just delivering quality products and services.
Our knowledge, courage, innovation and best-in-class customer service are key components to defining our competitive edge on the electronic battlefield. Our solutions offer a full array of technical and administrative capabilities that assist our customers in accomplishing their many dynamic missions while conserving costs.
------------------------------------------------------------------------------------------------------------------------------------------------------------------

iNTELLITREX has unique world-class expertise in providing enhanced Data Loss Prevention capabilities. With specific insight into both Device Control and Content Monitoring, our experts are able to implement comprehensive end-to-end DLP solutions. We can provide a Data Loss Prevention solution that is robust, scalable and fully capable of safeguarding sensitive technical, proprietary and PII data. We create DLP solutions that provide:

- Data at Rest protection:
to include encryption and sensitive data discovery;

- Data in Motion protection:
to facilitate simplified and expeditious rule creation, and active blocking of sensitive data from leaving the network; and

- Data in Use protection:
to ensure acceptable data usage policies are enforced and that adequate documentation is developed to comprehensively identify gaps in capabilities and associative mitigations necessary.

Continuous Data Monitoring (CDM)       [expand] [collapse]

iNTELLITREX experts know and understand the tools and services needed to deliver a comprehensive CDM program. Armed with this knowledge, we help government customers enhance and automate their existing continuous network monitoring capabilities; correlate and analyze critical security-related information; and enhance risk-based decision making at the agency and federal enterprise level. Our solutions create access to information from automated monitoring tools that enables correlation and analysis of security-related information across the information enterprise.

Identity and Credential Management (ICM)       [expand] [collapse]

ISC helps clients develop and manage complex Identify and Credential Management solutions that ensure the safety of confidential data and valuable intellectual property. Our experts have strong expertise in Federal HSPD-12 as well as other implementations and are well versed in privileged level accesses to critical applications and servers. ISC provides solutions that authenticate an individual's identity—a fundamental component to control access to security-sensitive networks, classified information, infrastructure, and facilities.

Identity management and credentialing requires a sound understanding of Public Key Infrastructure (PKI), Physical and Logical Access Control Systems (PACS and LACS), smart card technology, and federal standards for identity management such as Federal Information Processing Standards (FIPS)-201 and Personal Identity Verification (PIV) of employees (both federal and contractors).

System Incident and Event Management (SIEM)       [expand] [collapse]

ISC has tremendous expertise in the design, implementation and subsequent managed services from both process and solution standpoint for Network, endpoint and Security Incident and Event Monitoring. Our experts have the hard skills necessary in sizing, tuning and customizing SIEM solutions that work for your current infrastructure. We will help you define critical assets within your environment and develop a robust and realistic data integration strategy that is based off similar and relevant use-cases and create rapid and real-time reports and dashboards.

We can manage and facilitate the deployment of your SIEM solution and the associated process that incorporates incident analysis, categorization and the escalation process. We will help you understand key business risk areas and translate them into dynamic and hierarchical action critical assets from a vulnerability standpoint.

Splunk Architecture Tuning and Customization       [expand] [collapse]

Our Splunk Tuning and customization skills enable crystal clear application visibility in the context of machine data from other technology tiers within your network architecture. Our Splunk customization solutions create Next-Generation transaction analytics that can be automatically stored, analyzed and enriched with data from other external business and IT data sources and analyzed for long term performance trends and patterns of application activity, forensics and more.

Advanced Application Scanning       [expand] [collapse]

Our team of mature cyber malware triage experts specialize in both Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) testing that empowers organizations to conduct proper assessment and remediation of the vulnerable software. This in turn allows organizations to address compliance standards such as the Payment Card Industry Data Security Standard (PCI DSS), Control Objectives for for Information and related Technology (COBIT), the Federal Information Security Management Act (FISMA), and the Gramm Leach Bliley Act (GLBA).

Supply Chain Risk Management (SCRM)       [expand] [collapse]

We conduct proactive and in-depth technical risk assessments with tools such as RSA Archer eGRC and provide strong technical support for secure and high performance computing systems. We are able to aggregate offensive cyber intelligence data and provide analysis of specific technical and operational communications systems and metadata and provide actionable intelligence data in compliance of relevant cyber security directives and industry best practices and provide documentation support to cyber threat intelligence analysts.

Advanced Forensics       [expand] [collapse]

iNTELLITREX experts leverage cutting-edge cyber security tools such as VMWare VSphere to create virtual devices enable to stage "honeypots" to lure attackers in in order to examine and catalog their attack techniques, timing and suspected tools and algorithms used. We can then catalogue these attack vectors from Host-based Intrusion Detection Systems and Network-Based Intrusion Detection Systems (HIDS and NIDS) into overarching risk management profiles used to calculate risk and allocate resources for minimization and mitigation.