See our Cloud Architecture and Security Fact Sheet (PDF) See our Cloud Architecture and Security Fact Sheet (PDF)  

Cloud Architecture and Security

Providing clients with secure, innovative cloud solutions



Drawing on our experience as a U.S. Government contractor, Concurrent Technologies Corporation (CTC) ensures a security-first approach for each client. At the core of our cloud offerings are strong Information Technology and cybersecurity management processes.

Our team has deep knowledge of emerging cloud architectures as well as the performance and security challenges inherent to cloud migration. From development of the first FedRAMP-compliant Software as a Service (SaaS) to our efforts to deploy complex capabilities in the U.S. Government’s classified cloud environment, we offer clients a wide range of cloud development and security expertise.
CTC has experience with:
  • Complexity of inherited NIST 800.53/CNSSI 1253/ICD-503 security controls from the AWS or C2S host and Enterprise Services
  • Nuances of firewall settings, limits on firewall rules, and related network configurations specific to C2S
  • Processes for, and limitations of, dynamic provisioning within AWS or C2S while still complying with Attribute-Based Access Control (ABAC)
  • Methods to manage users and AWS or C2S role-based access control (RBAC)
  • Designations and management of privileged and general users in AWS or C2S
  • Federated identity and access management , and more.





For more information, contact:


Randy A. Weaver
Executive Director, Advanced Intelligence Solutions

Phone 814-269-6223
Email IITS@ctc.com

Representative Projects
Cloud Migration Services
 Cloud Migration Services
Navigate the complexities of cloud migration and deployment using CTC as your single source to assess, evaluate, and develop the correct architecture and execute a successful move to the cloud.


FedRAMP
FedRAMP
On December 20, 2013, CTC became the first in the nation to earn FedRAMP authorization for a Software as a Service (SaaS). We were the first SaaS to be authorized by FedRAMP, the first to deliver a virtual desktop environment, and the first to have an agency sponsor.

Our experience offers clients a distinct advantage.


Cybersecurity
Cloud Architecture and Security
We have expertise to protect and defend your data and networks against exposure or compromise so you can focus on your strategic business or mission goals. Our experts develop cross domain solutions to securely exchange information across different levels of security, perform NIST Cyber Framework based risk assessments, support system authorization and assessments (A&A), and develop secure cloud environments.


Advanced IT Leadership

George Appley
Specialties: leadership, defense and intelligence community IT, applied research and development, software engineering, secure systems, information management


Randy Weaver
Specialties: operational applications of technology; advanced analytics; intelligence planning and operations; interagency operations; counterterrorism, counterinsurgency and counterdrug operations; counter-threat/counter-terrorism finance analysis; homeland/border security; organizational (threat) analysis & profiling; document and media exploitation