CYBERSECURITY

CYBERSECURITY

Cyber threats are a continuous challenge for all sectors, but even more so for the government. Exposing personally identifiable information could unleash a chain reaction that would be dangerous and costly to individuals and the U.S. economy. Anticipating, minimizing, and actively defending against cyber threats requires the ability to stay ahead of bad actors to protect our citizens, government, military, industries, and businesses.

Cybersecurity

T-Rex is responsible for designing, developing, and operating one of the most massive, most complex, and most secure cloud Systems of Systems (SoS) for the federal government. We employ full-spectrum cybersecurity with proactive defense to protect the infrastructure, systems, and data for this mission critical operation. Our expertise, best practices, and innovative IT solutions are applicable to projects of any size and scale.


CAPABILITIES, SERVICES, AND TOOLS

Zero Trust

  • Identity, Credential, & Access Management(IDAM/ICAM)
  • Micro Segmentation
  • Software Defined Perimeter
  • Analytics and Continual Risk Assessment
  • Capability Maturity Model

Cyber Resilience

  • Resilient Goals
  • Resilient Objectives
  • Resilient Techniques
  • Resilient Design Principles
  • Capability Maturity Model

DevSecOps

  • Secure Code Testing
  • Security as Code
  • Secret Management
  • Continuous ATOs/HVA/RVA
  • Capability Maturity Model

Active Cyber Defense

  • Threat Intelligence, Hunting, Emulation
  • Automated SOC Monitoring/IR
  • Security Tool Management
  • Deception Operations
  • Capability Maturity Model
Case In Point

CASE IN POINT

U.S. Census Bureau Technical Integrator Program

T-Rex is supporting the USCB with their effort to deliver the U.S. Decennial Census using a secure hybrid cloud and hyperconverged on-premise solution. T-Rex provides architecture, engineering, operations, and cybersecurity to deliver an integrated, scalable, secure, and highly available environment for the 2020 Census Operations. We used a rapid, prescriptive, phased approach to mapping, integrating, and securing over 50 systems into a scalable System of Systems (SoS). Our team members strategically define and implement state-of-the-art technology solutions to detect and eliminate fraud, increase the security posture, and ensure business continuity through a disaster recovery solution.

WHAT ELSE WE DO