- MacB Expertise
- Intelligence and Analysis
- Research, Development, Test and Evaluation
- Engineering and QRC
- Information Technology
- Logistics and Acquisition Management
MacB’s cyber solutions and services are designed to immediately recognize, respond and neutralize cyber threats, as well as identify and exploit vulnerabilities in target environments.
The U.S. is the largest Cyber target in the world with more identified attacks than the next dozen countries combined. Year-over-year Advanced Persistent Threat (APT) activity targeting critical government infrastructure is growing in number and sophistication. Active Security Monitoring is our analytical and reporting activity tailored around compliance controls, and is designed to evaluate our customer’s current security posture against the evolving cyber threat landscape. We have highly automated and streamlined processes for the evaluation of billions of events per day, and the capacity to active monitor globally deployed assets for attacks…even when they come in the form of a zero-day attacks.
Information is power. Our Computer Network Operations (CNO) services and product solutions significantly increase the Department of Defense’s ability to impact friendly and enemy decision making. With more than 20 years experience, we work closely with our customers to enable Computer Network Attack (CNA), Computer Network Defense (CND) and Computer Network Exploitation (CNE) operations.
Defense, intelligence and government networks are under a constant state of attack. As we develop increasingly complex systems, the security issues associated with these systems are becoming just as complex. Our cyber engineering teams work with customers throughout the government to address security and survivability issues throughout the software development lifecycle. In particular, we provide systems/software engineering and exploitation, software development, operational test and evaluation for cyber capabilities and 24/7/365 network security monitoring and analysis.
With a tremendous depth of experience in Test and Evaluation (T&E), we have conducted Cyber capabilities Operational Test and Evaluation (OT&E) for Air Force organizations since 2003. We are experts in all aspects of OT&E activities required by AFI 99-103 and have planned, conducted, analyzed and reported OT&E activities including Operational Assessments (OA), Operational Utility Evaluations (OUE), Force Development Evaluations (FDE), Initial and Final Operational T&E (IOT&E/FOT&E) and Tactics Development and Evaluation (TD&E).
Cyber Threat Fusion is the timely collection and processing of Open, Closed and Classified information used for strategic and tactical risk mitigation decision making. Risk identification and management are achieved through the observation, detection, and mitigation of attacks and exploitation against our customer’s critical assets. We are experts in the collection, aggregation, correlation, and interpretation of cyber threat Tactics, Techniques and Procedures (TTPs) for the establishment and maintenance of proactive Network
Because wireless networks do not require a wire between a device and the internet connection, it is possible for attackers who are within range to hijack or intercept an unprotected connection. We have extensive experience in preventing unauthorized access to wireless environments and harden against threats. Specifically, our teams designed and developed software that works with all types of traffic, including TCP/IP, 802.11 and Voice over IP. In addition, our Software Defined Radio system is capable of tuning and demodulating signals across frequency bands, protocols and standards.
Forensics and Reverse Engineering is the identification, acquisition, recording and analysis of indicators used to quantify risks and discover the true source of a security attack. We are experts at vulnerability identification through static and dynamic analysis, bypassing hardware and software security controls, co-opting adversary exploit tools, and quantifying zero-day capabilities. We develop state-of-the-art analysis and system forensic tools to monitor, recover and analyze host and in-transit data for investigation, intrusion detection and service restoral.
MacB’s Enlighten IT Group (EITG) developed its proprietary Rapid Analytic Deployment and Management Framework (RADMF) for the key analytic components of the Big Data Platform (BDP). RADMF deploys within minutes and eliminates hardware, power, space, cooling and sustainability requirements and utilizes Amazon Web Services (AWS), the very first cloud service provider (CSP) to achieve a U.S. Department of Defense (DoD) Security Level 3-5 Authorization.
Utilizing ArcSight in an enhanced mode, we provide security information and event management (SIEM) services to analyze relevant data about an enterprise’s security from multiple locations, and look at all the data from a single point of view, thus permitting near real-time analysis for faster defensive actions. We also achieve better visibility into what network segments are at greater risk. This enables creation of a “risk score”, relating IP ranges to “named parts” of the network, and filtering/categorizing the types of network traffic expected from different parts of the network.
The globalization of the technology supply chain has changed the way the DoD approaches the trustworthiness of technology used in communications and weapon systems. In the past, it was thought that technologies such as integrated circuits could be trusted: known to perform the functions for which they were designed and to have no unintended functionality. Those times have past. Manufacturing has been globalized. The use of integrated circuit technology across the world has increased dramatically, and the market for critical integrated circuit technologies such as Application Specific Integrated Circuits (ASICs) and Field Programmable Gate Arrays (FPGAs) is no longer dominated by DoD. To counter this global threat, we have developed methods that can be used to assure trust in microelectronics designs subject to requirements in DoD Instruction 5200.44 ‘Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN)’.
For more information on our Cybersecurity services and solutions, please contact us at firstname.lastname@example.org.
Latest News and Events
- Washington Business Journal: MacB buys Linthicum Heights software company
- DBJ: Dayton company acquires Maryland tech firm
- Washington Technology: MacB adds cloud engineering, NetOps depth with latest acquisition
- GovConWire: MacB Eyes Cyber Portfolio Expansion Via Enlighten IT Consulting Purchase
- MacB Welcomes New Vice President of Human Resources