Innovation Management:
ICS provides Innovation Management services through the implementation of the holistic “Agile Innovation Master Plan”. The Agile Innovation Master Plan provides a comprehensive yet extremely agile approach to managing the 5 key tracks of effective innovation programs: innovation strategy, portfolio, process, culture, and infrastructure. ICS brings Innovation capabilities and reach typically associated with large enterprises. Our IAOIP-Certified Innovation Managers (Champions) provide oversight to our innovation program and work in conjunction with customer PMOs to guide innovation projects aligned to the strategic objectives of our customers. ICS has developed and employed an advanced, repeatable innovation process for use with our customers, based on the Agile Innovation Master Plan, with advanced analytics, knowledge management integration, a customer-accessible but segmented ideation portal, and industry-unique capabilities.
Cloud Services
Engineering:
ICS brings strong experience in Cloud Engineering, Systems Deployment and Life-Cycle Engineering on multiple contracts at global scale. Through the application of our Agile processes and engineering disciplines to cloud computing, we compress timelines and reduce costs versus traditional approaches. We have experience engineering across commercial, govCloud and milCloud environments up to Impact Level 6.
Migration:
Our migration services include the fundamental steps of Application Migration Assessment and Profiling, Migration and Transition, Optimize and Deployment, followed by Operations and Sustainment.
Read our whitepaper on Cloud Migration Project Planning and Considerations here http://g7u.4e4.myftpupload.com/wp-content/uploads/2019/03/ICS-Cloud-Migration-Project-Planning-Considerations-11-18.pdf
Cyber:
Risk Assessment:
Our Risk Assessment model delivers both quantitative and qualitative measures of organizational risk, allowing you to optimize your security spend and efficiently allocate resources to maximize business value.
Vulnerability Assessment:
You can’t fix what you don’t know is broken, and it is impossible to ensure the security of your network without a clear picture of its strengths and its weaknesses. Regularly scheduled vulnerability assessments are an uncomplicated way to uncover potential hazards.
Penetration Testing:
The practice of technical security assessment has long been recognized as a standard best practice across all business and industry segments. It is a crucial component in a well-managed information and technology security strategy, and in today’s fast-paced e-commerce society, it has become more important than ever.
Web Application Assessment:
At ICS, we utilize constantly updated, state-of-the-art tools operated by trained professionals to ensure the security of your web apps, and our highly trained experts possess a wide breadth of knowledge and maintain key security certifications. You don’t have to stay on top of the ever-changing world of network security; we do it for you.
Code Review:
ICS is available for code review projects with the goal of identifying security issues and weaknesses in the applications’ coding. We are able to conduct a systematic review of applications in scope for code review, which can include in excess of 1,000,000 lines of code.
Application Services:
Agile Software Development:
Let us help you design and implement custom applications and enhance legacy applications for commercial, public sector, and federal clients to help your organization enhance business processes and increase operational efficiency.
Application Maintenance and Support:
ICS performs IT sustainment, integration, migration, and elements of Tiers 1, 2, and 3 support for legacy and modernized systems – whether they are on-premise, in the cloud, or in a hybrid deployment. We also deliver application services integration and deployment activities in development, test, pre-production and production environments, execute regression testing and employ in-depth knowledge of security requirements. We approach every project with information security in center focus.
Legacy Modernization:
When you have an entire portfolio of legacy applications, the question of “how you do it” will vary for each, and it is important to have the right framework for making decisions that are laden with financial and technological risk. Is your focus to limit operating costs? Scale elastically? Leverage existing investments or preserve capital? Deliver new capabilities? Integrate solutions? Enhance security and access management? Redundancy and Availability? Decoupling tight interdependencies? There is a lot to consider outside of just the cost factors. We can help you navigate these options from a business perspective.
Operations & Maintenance:
Network Operations:
ICS has experience operating and defending networks delivering National Military Command and Control, supporting connectivity and data availability for Combatant Commanders and Joint Task Forces engaged in combat operations. We manage highly classified network enclaves, ensuring optimal performance and data integrity. Managed environments include both classified and unclassified production, administrative, backup, and management networks. Our managed networks host critical command and control applications that enable U.S. military force projection and sustainment. Our team members have broad and deep experience with cutting edge network technology and specialized cyber security devices including routers, firewalls, switches, load balancers, AAA devices, XML accelerators, Domain Name Services (DNS), email security devices, and proxy servers.
Datacenter Operations:
Command & Control:
We have proven expertise providing 24×7, no-fail support of all Joint Command, Control, and Communications (C3) and the analytical requirements of the POTUS, the SECDEF, the Joint Staff (JS), the Combatant Commanders, the Military Services and the other elements within Department of Defense (DoD). Areas of expertise include:
24×7 C2 portfolio support – GCCS-J, JOPES, NCCS, GMC, NICKA, NPES, and SMART.next @ Pentagon & Site-R
Service delivery for software engineering, infrastructure support and multimedia support
Strategic planning, requirements development, information and knowledge management, systems/network administration, database administration, data management, continuity of operations (COOP), operational security, and exercise planning
Maintaining 99.999% uptime for C2/C3 systems.
RMF: Security Assessments & Authorizations according to the Risk Management Framework (RMF)
© 2024 Integrated Computer Solutions, Inc.