Services

CounterIntelligence Services

Through a wholly-owned subsidiary, FedData provides world-class services to the Government and commercial customers. Our technical counterintelligence team has world-class experience exploiting and protecting vital information in the most sophisticated Intelligence Community environments.

We also assist our commercial customers in maximizing IT security investments by helping anticipate future adversarial exploitation strategies, assessing the security of existing IT infrastructure, conducting extensive insider threat analysis and analyzing supply-chain integrity. Our services to our commercial customers include: Vital Information Appraisal, External and Internal Threat Assessment, World-Class Vulnerability Assessment, Protection Program Development, R&D Assets and Enterprise Protection Services

Our team is comprised of experts with decades of experience in threat collection and analysis, incident response and investigation cryptography, supply chain analysis and reverse engineering. Integration of services and expertise enables us to identify and neutralize threats and proactively prevent system penetration, data degradation or loss.

Infrastructure, Networking, Logistics and Equipment Services

FedData is a leading provider of technology solutions to the intelligence community. Through several single-award IDIQ contracts worth in excess of $500mm, and partnerships with a number of hardware and software manufacturers, we design and manage mission-critical systems for our government customers in the intelligence community.

Through decades of technical service in Government and the private sector, we have unmatched knowledge of the IT architecture of our customers and one-of-a-kind capability to meet their complex demands.

Our unmatched expertise allows our intelligence community partners to optimize existing infrastructure, reduce costs, develop new capabilities, and increase the security of mission-critical networks.

FedData’s network engineering team provides world-class technical expertise to allow our customers to communicate securely and quickly access data in the most demanding environments. We combine some of the best technical talent ever produced by the intelligence community with a focus on the future mission to build, monitor and support secure networks.

Engineering, Continuity of Operations and Disaster Recovery

We ensure that mission-essential functions continue to be performed during a wide range of emergencies, including localized acts of nature, accidents and technological or attack-related emergencies.

FedData has deep experience designing and operating integrated continuity networks supporting thousands of Pentagon users. We ensure the offsite storage availability of over 1,000 mission-essential applications located in the Pentagon.

FedData has successfully designed systems and executed continuity and disaster recovery plans under Service Level Agreements that require 100% data recovery within one hour of a catastrophic event. FedData engineers are experienced in restoring the operability of systems that support mission-critical and critical business processes.

Incident Response and Security

FedData has provided Network Operations Center (NOC) and Computer Security Incident Response Centers (CSIRC) for several Government customers. FedData established survivable 7×24 NOCs that monitor the operations of all mission applications at the Pentagon, Joint Chiefs of Staff (JS), the emergency Army Operations Center (AOC) and the Office of the Secretary of Defense (OSD).

FedData established and continues to support CSIRC programs for several customers. We provide active and proactive monitoring of the national infrastructure including routers, servers, applications and web sites on a 7×24 basis.

Our Government Security Engineering team operates at all levels of classification. FedData engineers, design intrusion detection programs, monitoring and vulnerability analysis programs.

FedData’s technical team is experienced in all disciplines of cryptography including encryption at rest, encryption during transfer, data modeling and data vulnerability analysis.


Top