SERVICES

Cyber Security
Information Technology
Cyber Engineering
Cyber Security

We provide a broad spectrum of support to include Risk Analysis, Policy Support, Certification & Accreditation, Vulnerability Assessment and  Security Engineering and Network Visibility

 

Remediation & Forensics

  • Integrity Analytics provides solutions to remediate with services, policies and procedures to provide continuous improvements
  • “Turn Key” Solutions available to provide compliancy and up to and including enforcement of those cyber protection compliancy policies and procedures
  • We provide forensic services for both digital and physical investigations and criminal exhibit preparation
  • Our experienced staff provides a broad connecting investigative network supporting criminal prosecution resources for unauthorized access

 

Network Visibility & Protection

  • Create on-demand, context-specific maps and diagrams with a web interface
  • Generate application network paths to troubleshoot application performance issues
  • Highlight configuration differences and configuration violations
  • Easily share results using web URL or download results to an HTML/Visio format
  • ​Automatically generate high-definition network diagrams using configuration and operational data as HTML or Visio diagrams
  • Provide detailed insight into physical, logical and virtual components Interactive multi-layer navigation
  • ​Custom diagram layout and annotations
  • Archive diagrams to maintain historical information and track changes
  • The Command and IT Leadership will know what their enterprise systems really look like and automate the configuration management.
  • Ensure the Enterprise Management they will know all their configurable assets meet their cyber security requirements. This process also is automated.
  • The analytics will allow just-in-time planning for additional resources as they are needed.
  • Fast meaningful information leads to excellence in decision making process accuracy.
Information Technology

We provide a wide range of consulting services designed to support your organization's success.  Services include Capacity Management, IT Infrastructure support and JCIDS Analysis. 

Enterprise Architecture

  • Automatically generate high-definition network diagrams using configuration and operational data as HTML or Visio diagrams
  • Provide detailed insight into physical, logical and virtual components
  • Interactive multi-layer navigation
  • Customizable diagram layout and annotations
  • Archive diagrams to maintain historical information and track changes
  • Data Center Consolidation
  • Configuration Management

Architecture Development

The process is data-centric rather than product-centric. This data-centric approach ensures concordance between views in the architectural description while ensuring that all essential data relationships are captured to support a wide variety of analysis tasks

Cyber Engineering

We provide consulting services to include Systems Engineering, Test & Evaluation, Modeling & Simulation, Agile Development (SAFe), and Reliability, Availability & Maintainability.

Capacity Management

Capacity management is performed to identify impacts to an existing system based on new capabilities being deployed. It reports on the areas of:

  • Application Sizing
  • Gap analyses
  • Performance Engineering
  • Modeling and Simulation (M&S)
  • Maintainability
  • Availability
  • Business Capacity Management (BCM)
  • Service Capacity Management (SCM)
  • Resource/ Component Capacity Management (R/CCM)

Modeling & Simulation

Integrity Analytics understands the importance of knowing what types of applications, patches, updates and new programs you are loading into your system.  We provide the test range modeling and simulation to demonstrate how your system will react and support those future changes and needs.  We have a "Center of Excellence" to support these support services.  Cyber engineered proactive security measures are well worth the time and effort to know how your systems and networks will function with changes instead of loading them and wishing for the best!

Meet with us before you make your proposed changes and we will determine how it will function without risking network performance and security! This is extremely effective for applications being loaded across your network. We will certify that you are protected and your changes will be exactly what your planned results will be.

Contact us today for more information and schedule your evaluation at our test range.

 Some of our M&S methodologies are based on the Joint Communications Simulation System (JCSS) Code of Best Practices:

  • Originally developed by DISA
  • Refined using lessons learned from past performance assessments
  • Includes a VV&A process and a mechanism for “what if” scenarios
  • Continually updated