Personnel Matrix Program Development DOD and Federal Enterprise Architectures; Program Strategy; Cost, Schedule and Performance Goals; Acquisition Strategies Risk Reduction; Capability Needs; Semantic Engineering; Information Assurance; Open Source Implementation, Rapid Development Development Models; Product Support Plans; Test & Evaluation; Data Engineering; Process Engineering; System Perf Specs Technology Development System Development Enterprise Enablers Innovation Leads CommIT Enterprises, Inc. Strategic Enterprise Solutions (SES) Intelligence Enterprise Solutions (IES) Advanced Systems & Concepts (AS&C)
Intelligence Enterprise Solutions (IES) CommIT supports our customers in developing full service IT SYSTEM SECURITY solutions Data Sensitivity Analysis- This process begins with the identification of an organization's critical data and how these data are used. A determination is then made regarding the sensitivity and classification of the data. Security Assessments -Examining computer systems, networks, information flow, administrative procedures, and security mechanisms to determine compliance with existing security policies and requirements. Assessing threat, providing identification and vulnerability analysis, and performing security functional and penetration testing. Intrusion Detection and Audit Analysis- Designing an audit analysis capability that provides the appropriate level of detection for an organization, including identifying audit analysis and intrusion detection requirements and operating environment. . Security Solution Integration and Implementation- Selecting appropriate security solutions and integrating these solutions into the client's environment. Prototype and pilot development in our Information Assurance Center is frequently done before enterprise implementation. Security Architecture and Engineering- Working with the client to define solutions that are non-intrusive, provide access to those who need it, and protect high-value, critical information Security Awareness Training- Providing computer security awareness and training, including development of training modules and instructor's guide and performance of the appropriate level of training.
Certification & Accreditation and Security Engineering
Intelligence Community (IC)
Department of Defense (DoD)
Experienced with DoDISS, DHS, NSA,
NISPOM, DCID 6/3 and Common
Successfully implemented PL-1 to
PL- 5 systems that reside or interface
with a myriad of customers.
Directly and indirectly support:
NGA, CIA, DIA, FEMA, DHHS, DHS,
NRO, and JWAC.
Advanced Systems & Concepts Marine Air Ground Task Force C2 System Application (MC2SA) Joint Unmanned Systems Common Control (JUSC2) Navy Expeditionary Overwatch (NEO) Non-Traditional Assessments (NTAs) are activities that fall outside the traditional (DODI 5000.2) acquisition process and are not governed by specific DoD guidance. Flexible in nature, NTAs typically include pre-acquisition activities. NTAs are normally client (project) funded with RDT&E funds, involve ‘warfighter’ assessment of the system(s) of interest, and utilize Operational Test Agency (OTA)-sponsored teams that report to the sponsoring activity.
Strategic Enterprise Services (SES) Technology Acquisition Program Service Oriented Architecture Isn’t Enough (Semantic Innovation) CMMI Isn’t Enough (Program Management Innovation) System Engineering Isn’t Enough (System of System (SoS) Innovation) Competency Aligned Organization ERP Technical Review Enabling End-to-End (ETE) Engineering Innovation
John Keathley [email_address] 843-817-7344 Jeff Hays [email_address] 843-822-5694 “ Leading through Innovation” Corporate Headquarters 2461 South Clark Street, Suite 560 Arlington, VA 22202 Office: 703.486.5500 Fax: 703.486.5540 Charleston, SC 1020 E. Montague Ave* Opening Feb 08 North Charleston, SC 29405 Office: 843.329.4039 Fax: 843.576.5423 QUESTIONS?