Capabilities > Computer Network Operations
Capabilities > Computer Network Operations
Through innovation and foresight, our people helped build the foundation for the cybersecurity industry. We focus on the research and development of novel, highly-integrated and customizable offensive and defensive tools for full-spectrum cyber operations. From embedded systems to servers, drivers to distributed back-end services and all points in between, we develop capabilities in response to real problems to ensure our cyber operations partners and stakeholders are adaptive, efficient and effective in achieving and maintaining freedom of operations at the pace of cyber.
We envision, design, develop and deploy both offensive and defensive cyber operations solutions. The resulting technologies provide the early detection, mitigation, deterrence, resiliency and cyberspace operations freedom needed to eradicate sophisticated and evolving threats.
Our proactive and comprehensive counter cyber operations capabilities ensure that enterprise level threats are identified and remediated before problems arise.
Our research and development in cyber deception levels the asymmetry between attack and defense by employing realistic deceptive capabilities that significantly delay, degrade and disrupt the attack process.
Our research leverages artificial intelligence and provides advanced methods that determine the features, functionality and origin of executables, applications and file formats in use cases that range from endpoint protection to offline forensics.
Our patented work in virtual machine introspection allows us to fully monitor or control execution in a virtual or cloud environment, providing novel methods for reverse engineering, debugging, enforcing access controls, security policies and software configuration.
METASPONSE
Proactive Malware Hunting and Incident Response Framework.
link
INTROVIRT®
A customized Xen Hypervisor and library that provides a robust virtual machine (VM) introspection API.
link
WIFI INVESTIGATOR®
Passive detection, location and analyzation of broadcasting 802.11 devices.
link
Megatron
Megatron is an Air Force Research Laboratory (AFRL)-sponsored cyber deception framework as well as a catalog of deception techniques usable in that framework.
link
Mockingbird
Secure malware analysis for Cuckoo.
link
ABED – endpoint protection
Automated file anomaly detection.
link
ARM – endpoint protection
Anti-Ransomware Machine.
link
We are always looking for next-level team members. Try our challenges to find out if you’re one of us.