Contact Us

Use the form on the right to contact us.

You can edit the text in this area, and change where the contact form on the right submits to, by entering edit mode using the modes on the bottom right. 

         

123 Street Avenue, City Town, 99999

(123) 555-6789

email@address.com

 

You can set your address, phone number, email and site description in the settings tab.
Link to read me page with more information.

GettyImages-842944268.jpg

Cybersecurity

Cybersecurity

Perspecta Labs is bringing the following next-generation products to market:


GettyImages-648822853.jpg

Z-Day

Z-Day Enterprise Security System defeats the most serious of malware-based IT attacks that foil existing security solutions. Its novel integration of application-, host-, and enterprise-level monitoring across a spectrum of thematic, behavioral, and social activities enables extremely effective malware activity detection with a false positive rate of less than one per day for the enterprise. The system has been independently tested and shown to defeat nation-state quality zero-day attacks and to limit maximal enterprise infection to less than one percent while recovering infected systems within six minutes.


180602-N-AT135-054C.JPG

Bus Defender

Bus Defender is a proven solution for cyber defense on the MIL-STD-1553 data bus. Bus Defender protects against diverse run-time attacks (zero-day and known vulnerabilities), as well as supply chain attacks, and without requiring any modifications to 1553 line-replaceable units or underlying platforms, systems software, or configurations. Bus Defender can be flexibly deployed in a variety of configurations to meet platform-specific and other requirements.


CTA (GettyImages-542957664).jpg

IP assure

IP assure is a true breakthrough in IP Network management.  This customizable, one-of-a-kind software protects your mission-critical IP traffic by non-intrusively analyzing the entire network and alerting you to problems that could compromise security, regulatory compliance, and availability. 


GettyImages-157168456.jpg

DADC

Configuration is the DNA of cyber infrastructure. Due to the large gap between end-to-end requirements and detailed configurations, a large number of configuration errors are made, resulting in 50-80% of network vulnerabilities and downtime. Our researchers have developed the Distributed, Assured and Dynamic Configuration (DADC) system to address these problems through automated configuration synthesis and repair, visualization and verification, and moving-target defense through configuration space randomization.


GettyImages-505640145.jpg

CyberVAN

CyberVAN provides sophisticated capabilities for cyber experimentation in tactical as well as strategic environments. It enables arbitrary applications (including tactical as well as enterprise applications) running on Xen-based virtual machines (VMs) to communicate transparently via a simulated network implemented in OPNET, QualNet, ns-2, or ns-3.


shutterstock_505369192.jpg

ISAAC: Information Systems Access and Authorization Center

Organizations of all types are requiring increasingly sophisticated & secure tools to manage access to their information systems and applications. The Information Systems Access and Authorization Center (ISAAC) meets that need via a centralized, web-based, intuitive interface that streamlines the definition and maintenance of access and authorization requirements for essentially any information system or application.