Cybersecurity Services

Telos in Action: Pentagon Telecommunications Center

The Pentagon Telecommunications Center (PTC) is the Army’s nerve center for operating and managing critical IT infrastructure related to secure communications for Army installations, the Office of the Secretary of Defense, Joint Chiefs of Staff, military services’ headquarters, the White House, combatant commanders, civil departments and agencies, allies and foreign embassies.

The information that passes through these systems is extremely sensitive and messages must be delivered among its 27,000 users without fail.  PTC has selected Telos to support the integration, operation and maintenance of these mission-critical systems. The scope of the work includes all functions, services and tasks associated with system management and operation, including 24x7x365 customer service support.

Managed Cybersecurity Services

Telos’ heritage lies in cybersecurity, identity assurance, and information assurance.  One reflection of our expertise is that the U.S. Department of Defense – whose demands for premium cybersecurity are unsurpassed — relies on Telos tools, services, and methodologies for managing and ensuring the security of its network backbone.

Our team has experience with the onsite management of personnel and physical security, COMSEC, OPSEC, and information assurance (IA) management including computer security and A&A (assessment and authorization) services. Our personnel work on-site as part of your cyber operations team to monitor, manage, and improve your security posture on an ongoing basis.

Telos offers an integrated range of skills and services to prevent, protect, detect, and respond to cybersecurity incidents to ensure operational integrity, security and performance in your network environments. These services include:

  • Cybersecurity policy and procedure development
  • System protection / continuity / contingency planning
  • Cybersecurity architecture design and implementation
  • Network security testing and evaluation
  • Incident response management and reporting
  • Cybersecurity operations and management
  • Assessment and authorization services
  • Cybersecurity awareness training
  • Risk and vulnerability assessment/mitigation
  • Identity assurance and management