CYBERSECURITY
Cyber threats are a continuous challenge for all sectors, but even more so for the government. Exposing personally identifiable information could unleash a chain reaction that would be dangerous and costly to individuals and the U.S. economy. Anticipating, minimizing, and actively defending against cyber threats requires the ability to stay ahead of bad actors to protect our citizens, government, military, industries, and businesses.
CAPABILITIES, SERVICES, AND TOOLS
Zero Trust
- Identity, Credential, & Access Management(IDAM/ICAM)
- Micro Segmentation
- Software Defined Perimeter
- Analytics and Continual Risk Assessment
- Capability Maturity Model
Cyber Resilience
- Resilient Goals
- Resilient Objectives
- Resilient Techniques
- Resilient Design Principles
- Capability Maturity Model
DevSecOps
- Secure Code Testing
- Security as Code
- Secret Management
- Continuous ATOs/HVA/RVA
- Capability Maturity Model
Active Cyber Defense
- Threat Intelligence, Hunting, Emulation
- Automated SOC Monitoring/IR
- Security Tool Management
- Deception Operations
- Capability Maturity Model
CASE IN POINT
U.S. Census Bureau Technical Integrator Program
T-Rex is supporting the USCB with their effort to deliver the U.S. Decennial Census using a secure hybrid cloud and hyperconverged on-premise solution. T-Rex provides architecture, engineering, operations, and cybersecurity to deliver an integrated, scalable, secure, and highly available environment for the 2020 Census Operations. We used a rapid, prescriptive, phased approach to mapping, integrating, and securing over 50 systems into a scalable System of Systems (SoS). Our team members strategically define and implement state-of-the-art technology solutions to detect and eliminate fraud, increase the security posture, and ensure business continuity through a disaster recovery solution.