Designing IA for AI - Information Architecture Conference 2024
Dowless Corp Cap 12 06 08
1. Corporate
Capabilities
13873 Park Center Road Suite 450
Herndon, VA 20171
(703) 435-9105 Fax: (703) 435-9135
www.dowless.com
2. Information Systems Security Engineering
Infrastructure Security Engineering and Integration
Providing security engineering, integration and support activities for enterprise infrastructure.
Email/Web Systems
Perimeter Components
Virtualization
VPN Solutions Engineering and Implementation
Enterprise Security Solutions and Services
Delivering full data protection services for our clients using vetted enterprise products for Public Key Infrastructures, file
and media encryption technologies operations and security management services.
Encryption Solutions
Storage Encryption for data “at rest”
File and Email Encryption for data “in transit”
Network Encryption for Isolation of Communication Paths
Encryption Key Management using Public Key Infrastructure
– Enterprise Data Protection Design and Implementation
– Key Management Design and Implementation
Planning, Implementation, and Management
Risk Assessments and Analysis
Security Policy Development
Certification and Accreditation
2
3. Software Engineering
Providing software program management, configuration management, design, development, integration
and maintenance, database administration, local area network administration, system administration and
operations support for state of the art and legacy systems.
Application Development
C, C++, Highview, Visual Basic
Application Security (Access Controls, System/ Application Roles, Authentication and Identification
Integration)
Database Development
Web Development
Configuration Management
Independent Verification and Validation (IV&V)
Software Lifecycle Management
Curriculum Development & Training
Providing innovative training solutions to create programs that are flexible and responsive to our client’s
needs. Our team of seasoned training professionals develops customized curriculum and delivers training
for customized security solutions, proprietary software programs, or COTS and GOTS products.
Student & Instructor Guides
User Reference and System Administration Manuals
Technical Writing & Editing
Instructor-led and Computer-Based Training
Operational Support
Administration, Enrollment and Coordination
Customer Advocacy
3
4. Enterprise Security Solutions Provider
Dowless & Associates supports only vetted vendors in the information security market and we stand apart from the
competition by focusing on obtaining deep technology expertise from these world class vendors. Leveraging our business
alliances with Microsoft Corporation, PGP Corporation, IronPort, KoolSpan, Secure Computing and Trend Micro have given us
extensive experience with selected products.
“Best of Breed” security product offerings
On-site Professional Engineering Services
Engineering Documentation
Discounted Software based on volume
Support Training Administrative Personnel
We provide custom product engineering, enterprise integration, and support services for our selected suite of products. We
specialize in providing a security roadmap for introducing new products into current and legacy systems, and offer
customized services to our customers that minimize the time between product purchase and use, thereby mitigating
security vulnerabilities during solution integration. Our customized administrator product training enables immediate
assumption of responsibilities for operations and maintenance. Dowless & Associates maintains a full function laboratory
where extensive testing and product demonstration occur.
Standard services include:
Engineering Deployment Guide
Two 1 hour engineering teleconferences
Customized Professional Services Statement of Work
On-site Professional services
Follow-up with assigned Engineer
4
5. Past Performance
Enterprise Data Protection Services
Scope: $20M Contract over 10 yrs and 4 Separate Awards (3 sole source & 1 F/O
Competition)
Delivery of full data protection services for our clients including
Engineering Activates
– Public Key and Key Management Infrastructures,
User key management
Key management for Data Center Encryption Appliances and
Encryption Key Repository (GOTS development & implementation)
– Implementation of software file and media encryption technologies,
– Evaluation and implementation of multiple encryption technologies to satisfy specific requirements,
– Integration of encryption technologies into COTS application,
Supporting Activities
– Planning, Implementation, and Management,
– Risk Assessments and Analysis,
– Security Policy Development, and
– Certification and Accreditation,
– Product migration,
– Documentation and training,
– User support,
Commercial Encryption Product Market Research, Evaluation, and Reporting
– Data Center encryption appliances with rich policy management capabilities
– Provided suggestions for vendors for product enhancement
Indicates receiving customer awards for quality work
5
6. Past Performance
Enterprise Operational Security Support
Scope: Subcontracted to Support Project Security Consulting Support Services
Ensuring detection, analysis, and mitigation hostile attacks upon Enterprise networks
Systems security test and evaluation of candidate Enterprise Core Products and Data Protection Products
Development of implementation guidance and standards for implementation of Enterprise Security Policy
Development and maintenance of Special Access Required (SAR) security applications used to detect
vulnerabilities within the Enterprise Infrastructure.
Development and delivery of mandatory Security Training Programs for All Agency Systems Administrators
Development of new program for Agency Security Waiver Approvals and Access Requests
Custom System Security Platform Development and Integration
Presidential Support
SAR Program Support
Indicates receiving customer awards for quality work
6
7. Past Performance - Software Engineering and
Data Management of Operational Systems
Scope: $20.2 M Contract over 5 years, beginning 3rd year of performance
Operational System and Data Management Support
Software design, development and maintenance support
Systems and Application Integration
Systems Data Ingest Management
System, Application, and Data Performance Tuning
Integration and deployment of new system and application services
Customer Support Services
Tier 1 & Tier 3 Help Desk support
Development and delivery of user training
Program Management
Managed four subcontractor large companies
Grew Business area by 30% in second year to meet new requirements
Developed management processes and procedures specifically for this effort to ensure communication and
coordination with a host of corporate support organizations
Communication plan was vital for smooth system upgrades and scheduled maintenance outages
Validated requests, assigned module releases, updated programs, and deployed changes
Indicates receiving customer awards for quality work
7
8. Other Corporate Qualifications (as of 12/3/2008)
32 Billing Technical Specialists (TS/SCI w/Full Scope Poly)
Corporate Support
Full Time Capture/Business Development
Full Time Contracts Administrator
Full Time Controller
Full Time Recruiter
Full Time HR Director
Part Time Security Officer
Part Time Publications Specialist
Prime Contracts
Security Center Services Contract
Information Review and Release Systems
– Staffing with Employees, Subcontractors, and Independent Contractors
Security
TS Facility Clearance
Accounting Systems and Controls
Approved for Cost Plus Contracting Vehicles
Responsive to Customer Reporting Requirements
8
9. Staff Certifications
Certified Information Systems Security Professional (CISSP)
PGP Certified Engineer, PGP Enterprise Deployment Partner
Microsoft Certified Systems Engineers (MCSE)/Trainers (Network, Security)
Cisco Certified Network Administrator (CCNA)
CCA (Citrix)
Citrix Certified Enterprise Administrator
IronPort Certified Engineer
Information Technology Infrastructure Library (ITIL)
Certified Tivoli Consultant
Oracle Certified Professional DBA
INFOSEC Administrator
A+
9
10. About Us
Dowless & Associates is a woman-owned small-business, founded in 1994 and incorporated in 1999. We
innovate, integrate, and implement industry best practices for “best–of–breed” technology solutions for
our U.S. Intelligence and Commercial customers with a focus on Security and Software Engineering, and
Curriculum Development and Training. As an Enterprise Security Provider, we offer customized solutions
to meet today’s demanding security requirements with the select products we sell and support.
Core Values
To demonstrate integrity, accountability, and a commitment to excellence in achieving our mission.
Integrity – We stand by our personal principals of honesty, honor, reliability, and live by these principals as
individuals and as a team.
Accountability – We are accountable for our actions. We respect each member of our team and communicate
openly, honestly and respectfully.
Excellence – We strive to continually improve both professionally and personally, and always apply our best
efforts.
Corporate Mission
To support our customers by providing innovative Information Technology
solutions and services with a commitment to excellence.
10
11. Corporate Vision
Focus on the success of our customers and our employees
Lead industry in the business of software, systems, and security
engineering
Provide a culture of cooperation, collaboration, empowerment, and
teamwork
Challenge our employees to broaden their personal capabilities,
enable them as leaders, managers, innovators, and thinkers
Provide employees the tools, education, training, and
encouragement to ensure success
Reward employees commensurately for success and extra effort
Have employees with a vested interest in the success of the
corporation
“Give back” to our respective communities
Our Capabilities
Dowless & Associates provides full lifecycle solutions for Information Systems Security Engineering, Software
Engineering and Curriculum Development and Training. We work closely with our customers to define mission
requirements and develop solutions that satisfy them from program level security engineering to backend
enterprise wide solutions. Through the implementation of well known frameworks such as ITIL and Six Sigma,
our solutions use the “best practices” in full life cycle management.
As an Enterprise Security Provider, Dowless & Associates supports only the best product vendors in the
information security market. Our focused efforts key on the customer’s mission and vetted products where we
apply our unique expertise.
11
13. Executive Management
Nan Dowless Ms. Dowless is a versatile professional with over twenty years of executive management experience and
nearly thirty years in the field of training and professional development. She founded Dowless &
President/CFO
Associates, LLC in 1994 providing practical experience in strategic planning, business process
ndowless@dowless.com
reengineering methodologies and served on corporate Total Quality Executive Management Boards for
her clients. As a Program Manager and project lead for multiple service contracts she has excellent
project management skills. In 1999, she became President of Dowless & Associates, Inc. Ms. Dowless
has a B.S. in Human Resource Management. She maintains certifications including IS Security
Implementation, MCP, Certified Instructor, Franklin/ Covey Time Management , ITIL and holds a TS/SCI
clearance.
Jerry Dowless Mr. Dowless has over 37 years of Information Assurance and Information System Security Engineering
for computers, networks, and software systems expertise. In addition to his executive and business
Chief Executive Officer
development duties, he is our resident Subject Matter Expert on architecture and system design,
jdowless@dowless.com
development, integration and implementation of Enterprise IS security strategies. He has managed
several multi-million dollar projects and programs for customer in the Intelligence Community and the
Department of Defense. He holds a B.S. in Human Resource Mgmt, and an M.S. in Computer Systems
Management. Mr. Dowless maintains several certifications including PMP, CISSP, MSCE, CLNE, ITIL and
holds a TS/SCI clearance.
Ray Lemanski Mr. Lemanski has a diverse background in the areas of Corporate Finance, Executive Management,
Information Assurance, System Engineering, and Project Management. As Chief Operating Officer and
Chief Operating Officer
member of the Executive Committee, Mr. Lemanski has been instrumental in developing and
rlemanski@dowless.com
maintaining our operational budgets, enhancing our support structure for business development and
Direct: (703) 766-5661 process development and in developing our corporate strategy. Mr. Lemanski holds a B.S. in Business
Administration with a concentration in Finance, a Graduate Certificate in Information Security
Management and various certifications including CISSP, PGP, and ITIL. He is cleared at the TS/SCI level.
Susan Milloy Ms. Milloy has been with Dowless & Associates, Inc. since its inception and has been an integral part of
the company’s growth. As the Director of Corporate Services and member of the Executive Committee,
Director Corporate Services
Ms. Milloy’s role includes managing our HR, Recruiting and Office Management functions and associated
smilloy@dowless.com
personnel. Ms. Milloy’s corporate knowledge and proven management skills serve us well, as she
Direct: (703) 766-5484 develops and manages the processes and procedures necessary to support the growth of our company.
Ms. Milloy holds a B.S. in Business Administration with a focus in Human Resources and is ITIL
Foundation Certified.
13
14. Why Partner with Dowless & Associates, Inc?
1. We contribute as a team player and
earn the respect of our partners and
customers
2. We specialize so that we add REAL
value to the team with depth of
knowledge
3. We innovate and bring new ideas for
solving difficult problems
4. We respond promptly and accurately
for information requests
5. We can prove our claims of success!
14