Cybersecurity Solutions at Concurrent Technologies Corporation

CTC’s experts are nationally recognized, trusted providers of advanced cyber solutions

Concurrent Technologies Corporation (CTC) offers cybersecurity professional services and advanced information technology solutions to both public and private organizations.

Our clients benefit from our:
  • Technical innovation – CTC invests heavily in identifying and building the future of technology. CTC was the first FedRAMP accredited cloud provider and continues to lead the way for government and commercial clients to migrating and securing cloud operations.
  • Commercial industry and government expertise – As a nonprofit sitting at the intersection of academia, government, and private industry, CTC can uniquely provide the best products and research to meet your organization’s needs.
  • Professional excellence – As a research and development organization, CTC focuses on building and providing best-of-breed services to put your organization at the forefront of technology.

The CTC team offers strategic level (CISO, Boardroom) planning assistance, cyber training capabilities, assessment services, and incident response planning capabilities.

CTC has skilled personnel throughout the country to provide cyber support services that allow our clients to exceed their cybersecurity goals.


Mark Soyka
Information Technology


CTC Cybersecurity Mission
CTC's Cybersecurity Solutions
Industrial Control Systems (ICS) Cybersecurity
Industrial Control Systems (ICS) Cybersecurity
CTC offers services to manage cyber risks and improve the confidentiality, integrity, and availability of digital manufacturing processes, products, and information. Services include technical consulting to address identified cyber security gaps, network vulnerability assessments, incident response planning and consulting, and cyber awareness training.
Supply Chain Cyber
Supply Chain Cyber
CTC has invested significant research and development into the emerging threats posed through the cyber security supply chain. Multiple recent high-profile breaches have demonstrated the importance of understanding the risk that third-party suppliers pose to the organization. CTC has developed risk management and assessment methods to enable clients to dynamically visualize the cyber security posture of third-party organizations in their supply chain.
Cloud Computing Security
Cloud Computing Security
As organizations continue the mass migration of applications and data to the cloud, CTC will help ensure that confidentiality, integrity, and availability remain constant. We can also assist with the DoD Cloud Computing Security Requirements Guide (CC SRG) and Federal Risk and Authorization Management Program (FedRAMP) authorization processes. We have the real-world experience, skills, and record of performance to recommend the best approach in support of FedRAMP accreditation.
Cross Domain Solutions
Cross Domain Solutions
Is your organization struggling with identifying and stopping malicious inbound attachments? CTC has developed and supported initiatives to transfer sensitive information across security domains for more than a decade. The Advanced Guard for Information Security (AGIS) (available for implementation through our affiliate Enterprise Ventures Corporation) identifies and blocks malicious content in attachments, performing white-list checking that protects your organization from unknown threats.
Cybersecurity Compliance and Assessment
Cybersecurity Compliance and Assessment
The need has never been greater to strengthen and document internal controls over a company’s IT infrastructure. Sensitive government data can be vulnerable to breaches and cybercrime, and the government has strict requirements for safeguarding covered defense information and cyber incident reporting. CTC’s security team members have significant experience providing technically deep, rigorous compliance assessments because of our experience building the underlying security technologies to meet compliance requirements.
Cybersecurity Maturity Model Certification (CMMC)
Cybersecurity Maturity Model Certification
In 2020, all defense contractors will need to meet at least the basic level of the Cybersecurity Maturity Model Certification (CMMC) to be eligible to work on government contracts. CTC can help your organization (industry and government) understand what CMMC is, how it affects you, and how to best prepare for implementing it.
Copyright © 2024 Concurrent Technologies Corporation. All rights reserved. Send comments & questions to the Webmaster.

We are an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability status, protected veteran status, or any other characteristic protected by law.
CTC on Facebook    CTC on LinkedIn    CTC on YouTube