Cloud Architecture And Security

Cloud Architecture and Security

Providing clients with secure, innovative cloud solutions

Drawing on our experience as a U.S. Government contractor, Concurrent Technologies Corporation (CTC) ensures a security-first approach for each client. At the core of our cloud offerings are strong Information Technology and cybersecurity management processes.

Our team has deep knowledge of emerging cloud architectures as well as the performance and security challenges inherent to cloud migration. From development of the first FedRAMP-compliant Software as a Service (SaaS) to our efforts to deploy complex capabilities in the U.S. Government’s classified cloud environment, we offer clients a wide range of cloud development and security expertise.

CTC has experience with:
  • Complexity of inherited NIST 800.53/CNSSI 1253/ICD-503 security controls from the AWS or C2S host and Enterprise Services
  • Nuances of firewall settings, limits on firewall rules, and related network configurations specific to C2S
  • Processes for, and limitations of, dynamic provisioning within AWS or C2S while still complying with Attribute-Based Access Control (ABAC)
  • Methods to manage users and AWS or C2S role-based access control (RBAC)
  • Designations and management of privileged and general users in AWS or C2S
  • Federated identity and access management , and more.


Kevin Pudliner
Executive Director, IT Division


Representative Projects
Cloud Migration Services
 Cloud Migration Services
Navigate the complexities of cloud migration and deployment using CTC as your single source to assess, evaluate, and develop the correct architecture and execute a successful move to the cloud.
On December 20, 2013, CTC became the first in the nation to earn FedRAMP authorization for a Software as a Service (SaaS). We were the first SaaS to be authorized by FedRAMP, the first to deliver a virtual desktop environment, and the first to have an agency sponsor.

Our experience offers clients a distinct advantage.
Cloud Architecture and Security
We have expertise to protect and defend your data and networks against exposure or compromise so you can focus on your strategic business or mission goals. Our experts develop cross domain solutions to securely exchange information across different levels of security, perform NIST Cyber Framework based risk assessments, support system authorization and assessments (A&A), and develop secure cloud environments.
Copyright © 2022 Concurrent Technologies Corporation. All rights reserved. Send comments & questions to the Webmaster.

We are an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability status, protected veteran status, or any other characteristic protected by law.
CTC on Facebook    CTC on LinkedIn    CTC on Twitter    CTC on YouTube