Independent evaluation of technology provides a strong basis for ensuring strong security and assurance.
Effective systems assurance includes elements of technology, people, and processes, and the intersection of all three.
Tresys maintains extensive experience working with cryptographic programs that support global US DoD and Intelligence communities.
Tresys provides Common Criteria (CC) evidence generation support to the DoD and Intelligence community, and commercial customers.
Tresys develops solutions to bridge the gaps between capability developers and war fighters, and ensure information flows where it is needed and when it is needed.
- High integrity security by using a proven technology that secures some of the most demanding environments in the world.
- Maximum protection by leveraging OS security in application design that is otherwise not possible in Microsoft Windows.
- Flexible security integration by using Flexible MAC and SELinux enabled tools and the intent for knowledge transfer for developers.
- Recognized expertise by Red Hat, NSA, IBM, and others for advancing the best technologies for high security environments.
- All of our solutions are designed to enable quick development, deployment, and certification.
Tresys white papers & customer profiles contain more detail about our Systems Assurance expertise. They can be found in our Library.Read More