Our Past Projects and Projects you may be interested in.

Due to an increase in Insider Data Breaches we can help you to Stop these unwanted intrusions.

Assessment: We gather, through interviews and other means, your organization’s IT architectural vision, how it relates to business objectives, and what current execution plans exist. We execute a thorough discovery of your current approaches to intrusion detection, including those built into systems applications, networks, email servers and gateways, digital certificates, credentials policies, federated access, and others. We assess these findings against best practices related to risks, complexity, testability, scalability, and current technology trends to find gaps. The end result is a detailed report that provides a strategic view of the gaps in your current Insider Threat Management procedures.   


Implementation Planning: Everything included in the above Assessment engagement, plus the creation of a detailed comprehensive plan to implement an Insider Threat Management solution customized to your organization’s needs and based on the Assessment findings. This also includes the definition of all user roles and responsibilities, an implementation schedule, and a training plan to ensure a smooth transition to the end-user community.   


Implementation: Everything included in the above Assessment and Implementation Planning Engagements, plus managing the successful implementation and rollout of the comprehensive Insider Threat Management solution. The emphasis will be on a phased approach that facilitates quick successes, educating executives and end-users to ensure project support, resolving implementation issues as they arise, all while minimizing organizational and business disruption.  

We can help you to stop vendor-vector cyber breaches like Home Depot, Anthem & Target.

Assessment: We gather, through interviews and other means, detailed information on how vendors interact with various areas of the enterprise (e.g., procurement, information and physical security, legal and regulatory compliance) and what value these vendors provide. We review your internal governance system and policies, review your vendor terms and conditions, assess vendor risks (relationship, business profile, and control), and review your audit procedures. We assess these findings against best practices related to risks, complexity, testability, scalability, and current technology trends to find gaps. The end result is a detailed report that provides a strategic view of the gaps in your current vendor risk and security management systems and procedures.


Implementation Planning: Everything included in the above Assessment engagement, plus the creation of a detailed comprehensive plan to implement a solid vendor risk and security management program customized to your organization’s needs and based on the Assessment findings. This also includes the definition of comprehensive corporate-wide policies covering all areas of vendor interaction related to risk and security, and the description of an on-going risk monitoring process, to keep abreast of any significant changes to your vendor’s environment. We also describe all user roles and responsibilities, an implementation schedule, and a training plan to ensure a smooth transition to the end-user community.   


Implementation: Everything included in the above Assessment and Implementation Planning Engagements, plus managing the successful implementation and roll-out of the comprehensive Vendor Risk and Security Management solution. The emphasis will be on a phased approach that facilitates quick successes, educating executives and end-users to ensure project support, resolving implementation issues as they arise, all while minimizing organizational and business disruption.  

We can help to improve security in facilities with access control and Surveillance systems.

Assessment  We gather, through interviews and other means, your organization’s present security plans, operational procedures, crisis management plans, and physical response capability and timing. This can optionally include an actual clandestine breach of your security for a real time test of your response capabilities. We assess these findings against best practices related to risks, complexity, testability, scalability, and current threat trends to find gaps. The end result is a detailed report that provides a strategic view of the gaps in your current Facilities Security procedures.   


Implementation Planning: Everything included in the above Assessment engagement, plus the creation of a detailed comprehensive plan to implement a Facilities Security solution customized to your organization’s needs and based on the Assessment findings. This also includes the definition of all user roles and responsibilities, an implementation schedule, and a training plan to ensure a smooth transition to the end-user community.   


Implementation:  Everything included in the above Assessment and Implementation Planning Engagements, plus managing the successful implementation and rollout of the comprehensive Facilities Security solution. The emphasis will be on a phased approach that facilitates quick successes, educating executives and end-users to ensure project support, resolving implementation issues as they arise, all while minimizing organizational and business disruption.

By-pass local carriers to connect your facilities with the lowest cost and the highest security

For Accounting firms and others that value not using a public network and best protecting their data from a breach, we have used Free Space Optics to link a companies facilities together. All the above were connected to our head-end atop one of the highest hills in this island country.


This narrow band technology does not require licensing and it is near impossible to capture carried data without terminating the connection. Data rates can be up to 2.5 GB per second with near zero latency.

Due Diligence Investigations

If you are interested in merging or acquiring an Information Technology company, we have the the team that can look at the books, the technology and judge the profitability of the merger or acquisition.

Do you need an Expert Witness to help you in a litigation?

Our SME' are qualified in State and Federal courts and have successfully served clients over a dozen times. These clients have included major telephone companies and information technology manufacturers - all successfully.


Examples of projects are:

  1. Manufacturer using the Intellectual Property Rights of another.
  2. Contractor or seller not delivering per contracted specifications.
  3. Management not acting in the best interest of shareholders.
  4. Contractor claimed government did not award contract properly.
  5. Government agency violated Equal Opportunity Employment act. 

Surveillance Cameras and Network for a City

For this city, municipal government was concerned about the growing level of terrorism by foreign persons coming into their country to do harm. They were equally concerned about such activities being initiated by local person. 


A clear mandate for this protection was that terrorists would not be able to destroy the connection to surveillance cameras. This resulted in the design of a separate network that used MESH technology and numerous redundant links.


Al of the above monitoring activity took place in a Fusion Center where failure of anything or the detection of unwanted activity would immediately cause a response with the dispatch of appropriate services (Police, Medical personnel or the Military.


Special cameras were also used to monitor leaks in fuel lines passing through the area. 

City-Wide Critical Telecom Network Infrastrure

For the most part telecommunications networks for small to medium Competitive Local Exchange Companies (CLECs), State Government or Educational Campus-Wide Enterprise systems, and International Postal Telephone and Telegraph companies ( PTTs); have grown on a link by link basis, and now have multiple Network Management systems (NMS) with some of these links not even connected at any NMS systems. The result is that identifying a failure, and where precisely is the exact point of failure, takes a long time that causes customer complaints and may also include a loss of revenue. Some failures are only reported by customers when they lose service. Sometimes entire systems might be replaced due to a bad connector or power supply. All this leads to long outages and disgruntled customers.   


For this major city in Africa we proposed the above diagrammed Mesh network. Selecting the appropriate technology for this network was critical to its success. The major problem we encountered here was a lack of policing the spectrum used and the degree to which users boosted the power on their links interfering with most available frequencies. 


The solution here was to use a mix of Narrow Band technologies, namely: Free Space Optics (FSO) at THz frequencies and Narrow Band radios at 70 – 80 GHz. With these technologies licensing was not required and a single Network Management system was selected. The result of the above design was to achieve a very significant up-time and a fast restoration for outages.  

Rural Distance Learning Network

We have designed and proposed Distance Learning projects for two foreign countries.


Unique aspects for our design include:

1.  Mobile and modular classrooms that can hold a class at one location in the morning and be set up to teach a seperate class in the afternoon.


2.  There is an additional module that may be attached to the primary classroom module or be in a separate connecting module that would supply power generation, air conditioning and food stuffs for a colplete teaching experience.


3.  On the roof of the classroom module there will be combinations of microwave and satellite antennas. 


4.  Teachers for these classrooms and students are expected to be Expatriates from the US. UK or other countries. 

International Information Technology Projects

  Working internationally requires more than technical prowess, It requires a comprehension of dealing with persons who think differently from Americans. To further complicate this issue the current perception of Americans world-wide has taken on negative connotations that needs to be dealt with in a most effective manner. Our SMEs have years of experience internationally and know how to best proceed.

 Some of the countries we have worked in include the Bahamas, Bonaire, Canada, Curacao, Dominican Republic, Guadeloupe, Guyana, Haiti, Holland, Martinique, Nigeria, Poland, Suriname, Trinidad & Tobago, Turks & Caicos, Virgin Islands (US & UK), Venezuela and incidental business meetings in all other Caribbean countries.   

Rural Health Care Network

For the US Federal Communications Commission and the state of Louisiana we designed a rural Health Care Network.


This network was designed the connect Rural Health Care facilities back to mayor hospitals in the states largest cities.


Data connectivity rates were such that local eXray and other health telemetry devices could be read at major facilitiest staffed by experts.


Connecting links were composed of microwave links to tower sites or fiber nodes.

Fusion Centers for Medical Disaster Relief.


USAID, a Federal Governement Agency has a project waiting on the release of funds that will provide help to lesser developed countries who are having a medical or health disaster.


In these situation USAID will disapatch us to promptly setup a Fusion Center to best deal with the coordination and communications of medical and other emergency needs.  Essentially these centers will be self sufficient and enable all forms of communications to these centers and from these centers to dispatch appropriate personell and equipment, such as a helicopter to bring in distressed persons and or dispatch police, fire or military persons to help out where needed.


Key to this operation is to rapidly deploy a fully operational center is as little time as possible.

Contact Us with Questions or Ask for our Help.

We will respond quickly. There are no 9 to 5'ers in our Alliance.

Our Senior SME's are eager to help you with advice or services.

Our Senior SME's are eager to help you with advice or services.o visit during normal business hours.

Tech-Consultancy

Marietta, Georgia, United States

(770) 628-0211