PacStar provides focused hardware and software solutions for military and commercial customers requiring reliable 24/7 advanced communications. PacStar has designed and developed a broad range of proven Tactical & Deployable Communications Products for complex and demanding applications. As military, government, and commercial communications needs evolve, PacStar continues to develop solutions customized to address a wide range of small, medium, or enterprise communications requirements.
PacStar created IQ-Core® Software enabling organizations to field the best-in-class COTS communications technologies, while driving down deployment complexity and management. IQ-Core Software has made PacStar a recognized leader in advanced tactical and enterprise communications systems. The software can be customized to integrate numerous disparate components sourced from a variety of vendors and enable remote management. We have also added CSfC management capabilities with IQ-Core Crypto Manager.
Founded in 1989, Engage Black manufactures innovative cryptographic solutions that: securely generate and manage cryptographic keys and operations; and encrypt data at rest and in motion.
Our mission is to be the impregnable cloaking mechanism embedded into the fabric of Information, Operational and Tactical control systems.
Engage Black products are Designed, Fabricated and Assembled in the USA and are embedded in Tactical National Security Systems (NSS) for over 20 years.
Engage Black developed the BlackVault Hardware Security Module (HSM) to enable CSfC deployments to protect keys used by multi-layer VPNs to securely Authenticate. Our tamper reactive FIPS-140-2 Level 3 HSMs have validated interoperability with InfoSec’s CertAgent CA, Red Hat Certificate System, and Microsoft CA.
Post-Quantum Cyber Security
Knowing traffic recorded today will be decrypted by a quantum computer in the future. Engage has implemented Quantum-Safe Hybrid Key Exchange standards, since the time to employ Quantum-Safe Security is Now.
Motorola Solutions has been an innovator of mission critical technology for the U.S. Federal Government for over 90 years. Today, we deliver engineered solutions which better inform command decisions utilizing data analytics and artificial intelligence, improve mission outcomes with process automation and self-learning, and secure sensitive data tunnels and critical infrastructure. Whether you’re leading an operation from a command center, performing emergency services, or conducting tactical operations, Motorola Solutions can keep your essential personnel connected, secured, and informed with converged voice, video, and data capabilities. Motorola Solutions became a Trusted Integrator in the NSA’s Commercial Solutions for Classified (CSfC) program in 2015 and has supported multiple agencies technology deployments in this capacity. Additionally, our LEX L11 Secure Mobile Environment is a NIAP certified LTE device that meets the latest National Security Agency / Central Security Service Data-at-Rest Capabilities Package for Mobile Devices.
Aruba, a Hewlett Packard Enterprise company, is the global leader in secure, intelligent edge-to-cloud networking solutions that use AI to automate the network, while harnessing data to drive powerful business outcomes. With Aruba ESP (Edge Services Platform) and as-a-service options, Aruba takes a cloud-native approach to helping customers meet their connectivity, security, and financial requirements across campus, branch, data center, and remote worker environments, covering all aspects of wired, wireless LAN, and wide area networking (WAN).
Forcepoint is the leading user and data protection cybersecurity company, entrusted to safeguard organizations most critical data and IP, while driving digital transformation and growth. Rather than offering a static one-size fits all approach that stifles innovation and creates vulnerabilities, Forcepoint is humanly-attuned to how people interact with data, providing secure access while enabling employees to create value. Forcepoint behavior-based solutions adapt to risk in real time and are delivered via a converged security platform to protect network users and cloud access, prevent confidential data from leaving the corporate network, and eliminate breaches caused by insiders. Based in Austin, Texas, Forcepoint creates safe, trusted environments for thousands of enterprise and government customers in more than 150 countries.
Founded in 1989 with the goal to secure data using public key cryptography, ISC specializes in the design and development of cybersecurity solutions for PKI credential management, encryption, authentication, and automated provisioning of relying applications.
Experts in our field, Triitus designs and develops off-the-shelf security solutions that satisfy CSfC MACP and DAR requirements. Backed by years of experience serving the needs of DOD secret and TS classifications, Triitus provides an unrivaled ultra-secure environment. Supporting voice and video streaming over enterprise VDI and boasting near native user-experience and endpoint performance on the latest commercial hardware, Triitus is a must have for anyone needing a secure mobile workstation.
Those who dedicate their lives to the protection of our country need state of the art tools they can rely on. We’ve built the Archon Solution Suite for them: A complete security toolkit based on years of experience in the field.
Through the combination of military-grade protection and commercial technology, we’ve created a collection of uniquely secure, cutting edge resources that offer cloud connectivity anywhere in the world.
Keep your system protected. Solve highly complex problems. And trust that your data is safe at all times. This is innovation fueled by experience.
Entrust keeps the world moving safely by enabling trusted identities, payments and data protection. Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, accessing e-government services or logging into corporate networks. U.S. Federal agencies face complex data protection challenges from cybercriminals, state actors, and malicious insiders who seek to expose sensitive records found in agency databases, both on-premises and in the cloud. Entrust nShield® hardware security modules (HSMs) and our nFinity technology partners offer proven data protection solutions that enable Federal agencies to align with security frameworks and programs.
IGS brings the world’s only Common Criteria EAL6+ certified solution to the CSfC marketplace in a completely integrated and automated End User Device. Available on Dell and HP laptop and desktop computers, the IGS solution makes the deployment and management of CSfC systems simple and affordable.
Lumen empowers federal agencies by providing an application platform designed to support next-generation technologies that help public sector customers deliver on critical missions and transform the citizen experience.
We provide the solutions that drive innovation. Our proven, government-ready platform is purpose-built to provide access to critical data, optimize applications, and improve cyber posture through integrated security and enhanced threat analytics that leverage the power of AI. Built-in security combined with seamless access to private, public, and edge cloud environments allows government agencies to ensure compliance and enhance the lives of the citizens they serve.
Transformation requires IT modernization, and it’s at our core. We work alongside agencies providing the knowledge and expertise that give the public sector the momentum they need to secure society’s future.
One of the world’s leading companies for PKI solutions, PrimeKey has developed successful technologies such as EJBCA Enterprise, SignServer Enterprise and PrimeKey EJBCA Appliance. PrimeKey is a pioneer in open source security software that provides businesses and organisations around the world with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.
QuintessenceLabs is the leader in quantum cybersecurity solutions delivering advanced data protection for today while building the strongest foundation for a quantum safe future. The company has developed comprehensive key and policy management capabilities coupled with unique quantum technology that delivers the world’s fastest true random keys, and is at the forefront of quantum key distribution.
QuintessenceLabs was named a Technology Pioneer by the World Economic Forum for its work in building strong, innovative quantum cybersecurity solutions.
The company has offices in Canberra, Australia and in San Jose, California, USA.
Sub U Systems designs and manufactures software and hardware based IP networking router solutions for the commercial and defense markets. As NSA Commercial Solutions for Classified (CSfC) experts, Sub U Systems delivers secure, enterprise-level products that meet the most stringent mission requirements where ruggedization, security, size, weight, and power are critical. Sub U Systems also provides custom design engineering, engineering support, and COMSEC and INFOSEC segment consulting.
Thales Trusted Cyber Technologies protects the most vital data from the core to the cloud to the field. We serve as a trusted, U.S. based source for cyber security solutions for the U.S. Federal Government. We develop, manufacture, sell, and support trusted data security solutions that easily integrate into an existing cyber security infrastructure. Our solutions enable agencies to deploy a holistic data protection ecosystem where data and cryptographic keys are secured and managed, and access and distribution are controlled. Our solutions address use cases including PKI, TLS private key protection, key management, data encryption, network encryption and authentication.