Cyber threats are a continuous challenge for all sectors, but even more so for the government. Exposing personally identifiable information could unleash a chain reaction that would be dangerous and costly to individuals and the U.S. economy. Anticipating, minimizing, and actively defending against cyber threats requires the ability to stay ahead of bad actors to protect our citizens, government, military, industries, and businesses.
T-Rex is responsible for designing, developing, and operating one of the most massive, most complex, and most secure cloud Systems of Systems (SoS) for the federal government. We employ full-spectrum cybersecurity with proactive defense to protect the infrastructure, systems, and data for this mission critical operation. Our expertise, best practices, and innovative IT solutions are applicable to projects of any size and scale.
CAPABILITIES, SERVICES, AND TOOLS
- Data Loss Prevention
- Intrusion Prevention & Detection
- Risk & Threat Profiling
- Cyber Threat Hunting
- Adv. Persistent Threat Testing
- Static & Dynamic Code Analysis
- Key Management
- Access & ID Management
- Continuous Diagnostics & Mitigation
- Network Visibility / SSL Decrypt Processing
- Database Security Enforcement, Database Configuration, Access Control Policy Enforcement
- SOC Operations & Management
- Security Orchestration, Automation and Response
- Zero Trust
- Security Application Design/Implementation
CASE IN POINT
U.S. Census Bureau Technical Integrator Program
T-Rex is supporting the USCB with their effort to deliver the U.S. Decennial Census using a secure hybrid cloud and hyperconverged on-premise solution. T-Rex provides architecture, engineering, operations, and cybersecurity to deliver an integrated, scalable, secure, and highly available environment for the 2020 Census Operations. We used a rapid, prescriptive, phased approach to mapping, integrating, and securing over 50 systems into a scalable System of Systems (SoS). Our team members strategically define and implement state-of-the-art technology solutions to detect and eliminate fraud, increase the security posture, and ensure business continuity through a disaster recovery solution.