Cyber Security, Information Management, EA,  IT, and Network/Communications Architecture

BTI provides a wide range of Cyber Security/Information Assurance services and products. We also provide design, architecture, development, implementation, and upgrade support for large databases. BTI provides data integrity support that focuses on Data/Information Management issues, such as data collection, data cleansing, and migration of Enterprise data across multiple domains. Our personnel support the resolution of enterprise-wide automated data management to include analysis of emerging initiatives/systems and identification of problems and issues that could potentially impact the synchronization of data worldwide.

Cyber Security / Information Assurance

  • NIST SP 800-171 / DFARS 252.204-7012 Implementation, Monitoring, and Reporting Services
  • BTI RIB: Turn-key DFARS 7012 Implementation Solution for Small Businesses
  • Cyber “Range-in-the-Box” Products
  • Risk Management Framework (RMF) Development and Compliance
  • System Security Plans (SSP) Development and Maintenance
  • Third-Party Validation Planning with CA (Certification Authority) and the ACA (Agent of the CA)
  • Critical Security Controls Design and Implementation
  • Process Migration from DIACAP to RMF
  • Cyber Security Risk Management for DoD Tactical and Platform IT Systems
  • Critical Security Controls Design and Implementation

Enterprise Architecture, Information Technology, and Information Management

  • Infrastructure and Platform Topologies
  • Enterprise Architecture Analysis, Design, Deployment, and Management
  • Database Architecture Design, Deployment, and Management
  • Business and IT Strategies
  • Maturation of Software Systems and Processes
  • DoDAF, UPDM, BPMN Modeling and Support to Bridge the Gap between Business Process Teams and IT Staff
  • Service-Oriented-Architecture (SOA) Design, Standards, and Technologies
  • Information Technology Infrastructure Library (ITIL) Design Package Reference Model Design & Development
  • Architecture Modeling, Requirements Management, Document Management, Enterprise Repository, Service Repository
  • Configuration Management Database (CMDB) Administration
  • Software Engineering Process (SEP) Tool Administration
    • JIRA, Jama, Confluence, Subversion, Crowd, CAC, Maven, Enterprise Architect
    • Code Collaborator, Agile Greenhopper, Fisheye
  • Network, Desktop, and Server Support
  • Information/Data Management
  • New Technology Insertion
  • Logistics Software and Database Development and Maintenance
  • Network, desktop, and server support
  • Application software support

Network/Communications Architecture Design and Management

  • Secure Tactical Network Topology Design
  • Placement of Security Enclaves
  • Firewalls
  • Policy-Based Routers
  • Type 1 Encryption Equipment (KGV 72 & KG 250)
  • Cross-Domain Interfaces
  • Network Intrusion Detection and Prevention Equipment
  • HBSS (Host Based Security Systems)