With TELESIS' global presence our professionals can deliver business value across time zones, countries and cultures.
With diverse expertise and a history of performance excellence, we embrace and solve some of the toughest challenges. TELESIS professionals serve our customers situated globally in the integration and application of information technology, engineering, and cyber security to solve our customers’ most demanding requirements. We continue to expand our presence and strengthen our international relationships.
The Challenge: A TELESIS Government agency client awarded a 5-year, multi-million dollar data center contract to a new hosting provider for housing all of its systems. Telesis, which is official FISMA/FISCAM auditor for the agency, was tasked with assessing and performing the Authority to Operate (ATO) for the new General Support System (GSS) which included a Network and Security Operations Center (NOC/SOC) that used the latest technology to monitor, track, and scan its customer networks for issues and potential threats and vulnerabilities.
The Solution: TELESIS performed four Authorizations to Operate (ATOs) for our customer within a very aggressive timeline for completion. The team conducted on-site physical and environment assessments of data center facility, vulnerability assessments and reviews, system security documentation assessments, interviews with key personnel, and met the aggressive timeline for the ATO and go-live timeframe.
Overlapping this effort was the requirement to complete the ATO of a financial system being relocated into this new GSS. Our team brought Federal Information System Controls Audit Management (FISCAM) FISCAM expertise, reaching the go-live goal. This timeline was extremely aggressive and required careful coordination between our customer and the two other contractors involved.
TELESIS was tasked with providing responsive technical support to maintain the maximum levels of readiness needed to sustain operations for the globally deployed C4ISR systems. C4ISR systems and subsystems include a broad range of technologies, platforms, software and dependencies that must be effectively maintained to deliver the full range of required mission capabilities. The knowledge and understanding of these crucial services are essential to the success of deployed forces. The expertise TELESIS provides is the critical continuity in a technology set that is rapidly evolving and we constantly are adapting our service models to accommodate these advancements to ensure operational continuity throughout the change process.
TELESIS developed courses of action to establish an alternative method of network operations management to increase reliability and eliminate redundancy. Using our experience and familiarity with the operational environment, we implemented our selected course of action and consolidated 3 operations centers into a single multi-mission operations center with increased capabilities, saving the government over $2M per year.
TELESIS has supported the C4ISR systems for the past 17 years and throughout that time we have sustained our deployed workforce in the active theaters such as Europe and Korea. TELESIS has extensive experience with the systems our customers use to manage forward deployed workers (SOFA and TESA, for example). Our ability to stay current with the latest policy and regulatory requirements to ensure the integrity and security of our forward deployed workforce is crucial.
Testimonial: Received from a supported unit following a support mission:
“Thank you very much for the outstanding service that you provided us. Not only did we accomplish the all primary and secondary goals, with your support, we also managed to accomplish our tertiary goals. Your knowledge and expertise, and superior customer service went above and beyond our expectations. The <UNIT’S> readiness is, without a doubt, considerably better.”Close Lightbox
The Challenge: The on-premise server reliability and uptime was very volatile impacting the availability, performance, and security of the systems that were critical for operations at customer site.
The Solution: TELESIS professionals were tasked to improve the performance and availabiity within a very short period of time and without any downtime or data loss. The team stood up to the challenge and stablized the volatility of the systems.
The Result: Significantly improved reliability and performance, without any customer downtime or data loss. The team transformed On Premise server reliability and uptime from very volatile to stable within a month, further improving availability, performance, and security.Close Lightbox
The Challenge: In November 2016, one of the supported organization within DHHS initiated a Division Organization Restructure to support a programmatically aligned organization located across the United States. This resulted in system changes to several business applications that are core to the organization’s ability to conduct the agency’s business. As the first line of support for these business applications, TELESIS was tasked with the planning and implementation of ramped up support to meet the increased support needs expected to result from the Division Organization Restructure.
The Solution: TELESIS applied our knowledge of the business applications to identify the applications that were likely be most impacted by the organization restructure, and analyzed historical volume trends for identified business applications to forecast the increased support needs. Based on the detailed analysis it was determined that the overall helpdesk support for the impacted applications would increase by approximately 40%. TELESIS scaled the existing application support capacity to accommodate the expected support increase prior to the execution of the organization restructure. This included expansion of the overall helpdesk infrastructure, recruitment of qualified support staff, and training of new and current support staff on the application changes and updating of all applicable helpdesk documentation.
The Difference: TELESIS has successfully delivered Tier 1, 2, and 3 application helpdesk services to the Department of Health and Human Services (DHHS) for over 15 years. Throughout this period, TELESIS maintained frequent communications with the application development teams and provided testing support for the impacted applications prior to deployment into the production environment.
Testimonials: TELESIS’ application support team was in place and ready to take on increased support 1 full week ahead of schedule. The DHHS users received seamless continuity of application support services and delivery of all contractual service levels. To quote the customer leadership “This is why your Helpdesk is considered the platinum customer service model for the organization.”Close Lightbox
The Challenge: The purpose of this initiative was to develop and meet the requirements of the Congressionally Mandated Warrior Care Policy Report. The report requires metrics from all facets of the Warrior Care Program (WCP) which are to be aggregated and presented in a predefined format. Metrics that were currently not being maintained by the WCP were to be reviewed to see if they could be extracted indirectly from existing data or if they have to be created from the ground up and retroactively populated.
The Solution: The WCP Team engaged the government to determine what deliverables were required. The team developed a comprehensive plan to modify the existing database to meet the requirements. The changes included data enhancements and migrations as well as altogether new attributes. Once the new architecture was in place, an intensive data migration was initiated with careful filtering of existing data. Front-end form modifications were then published so that the customer could begin entering data. Once in place, the WCP Team developed the SQL and SSRS necessary to create a dynamic automated report which could be accessed at will by the customer.
The strict timeline imposed by the client required that the WCP Team work closely with the customer providing continuous updates on project deliverables. Any issues identified were properly logged and prioritized and were discussed periodically for resolution.
The Results: The Warrior Care Policy Report was developed and automated for customer use with redesigned architecture and forms which catered to customer needs.Close Lightbox
The Challenge: TELESIS was tasked with providing secure access to the On-Premise Vulcan Backend Servers in the C4 IDF Lab. Vulcan is a web-based application that provides portal presence for vendors looking to advertise and generate interest in new/developing technologies and capabilities to the SOF Community. The Portal also allows SOF users to discuss these technologies with vendors and other users. The application has been running for three years and boasts over 3000 users and is a regular fixture at the annual SOFIC event in Tampa FL. The purpose of this initiative was to design and secure access of the Vulcan cloud-based front-end reverse proxy servers to the on-premise web and database servers located in the C4IDF Lab at USSOCOM HQ. Users were accessing the Vulcan application through one of two Cloud sites provisioned by a third party located in New York, NY and in San Francisco, CA. The reverse proxy servers would receive the user traffic and then route the traffic to the servers located at USSOCOM. However, only light-weight encryption was being used to secure the traffic, which became an issue as Non-Disclosure Agreements and other sensitive information was becoming more and more prevalent. A more secure method was needed to protect the traffic, while at the same time minimizing disruption to the functioning of the current reverse proxy servers.
The Solution: The Telesis C4IDF Team designed a Site to Site IPSec VPN topology utilizing 256-bit encryption. Working with the Vulcan Development team at Cylitix, the Telesis C4 IDF staff implemented and configured Ubuntu Linux virtual servers to act as network gateways, running StrongSwan VPN clients at both the New York and San Francisco sites where the Vulcan reverse proxy servers were located. The VPN tunnels were then setup to terminate at the C4 IDF Perimeter Firewall, providing full encryption of all of the user traffic down to the network. For additional security, a third network gateway was stood up at a third cloud site in New York to allow a secure and separate management path for the Cylitix Developers to access the Vulcan back end servers remotely for ongoing maintenance and development without disturbing user traffic in the other tunnels
The Challenge: A federal agency in the mission support arena collects, analyzes, and disseminates independent and impartial energy information to promote sound policymaking, efficient markets, and public understanding of energy and its interaction with the economy and the environment. The data and analyses are widely used by federal and state agencies, business & industry, media, researchers, financial markets, and educators. The information is disseminated in different ways, including reports, web products, press releases, data browsers, API’s, and map on a regular basis. As such is it paramount that the confidentiality, integrity, and availability of this information be maintained to support the Agency’s mission and its stakeholders. During the course of carrying out its research, collection, analysis, and reporting missions, users collect and process many different types of information, including financial, proprietary, academic, medical, human resources, and other personally identifiable information. These information assets are highly valued resources and all persons who use these information assets have a responsibility to protect this resource. Federal Law, regulatory requirements, industry standards, and best practices also impose obligations on the Administration to protect information relating to its employees, contractors, and stakeholders.
The security program at the agency needed a major overhaul to ensure the protection of the information assets.
The Solution: TELESIS recommended the implementation of the Enterprise Cyber Modernization Program to support the effort. TELESIS kickstarted the implementation of the program with the establishment of the Enterprise Cybersecurity Modernization Program (ECMP) that outlined the scope, authority, enforcement, and the roles and responsibilities of the ECMP.
TELESIS as part of the modernization effort aligned the program with the Administration’s business units and introduced cybersecurity policies and standards that compliment institution policy, federal, state and local laws, maintaining the necessary balance between risk mitigation and related costs.
The Telesis Team detected threats and worked with all the OIT Support staff and applied security patches on affected systems to mitigate issues. The team re-architected the data log server for the SPLUNK SEIM integration, redesigned VMware clusters and added a new Unity 500 SAN storage.
The team has been foremost in leading the Administration down the Cybersecurity path.Close Lightbox
The Challenge: TELESIS was tasked with assessing security compliance on CISCO switches and routers prior to the Command Cyber Readiness Inspection (CCRI).
The Solution: TELESIS provided an automated method of auditing compliance of Cisco switches and routers which resulted in an extremely efficient way of assessing the security posture with a quick review of a dashboard. Telesis offered this new method for scanning and reporting compliance audits on Cisco IOS routers and switches using Tenable SecurityCenter custom audit files and Nessus scanners. The audit files make use of DISA Security Technical Implementation Guides (STIGs) and are built for the specific site with custom modifications made to meet the unique implementation in place.
The method was employed at numerous United States Marine Corps sites. Regional assessments were performed using this new method prior to the site’s Command Cyber Readiness Inspection (CCRI). This resulted in a dramatic reduction in the time required to assess Cisco devices as a majority of the required checks were automated and identified vulnerabilities were remediated rapidly. This allowed the site, at a glance, to gauge the status of their compliance across all Cisco network devices at their installation or region.Close Lightbox
Cyber Security Framework Implementation
The Challenge: Executive Memorandum 13800 was released in May 2017 requiring all federal departments and agencies to perform an annual analysis of the current implementation of their Cybersecurity Framework (CSF). This reporting requires that agencies first determine the desired Implementation Tier Level (Partial, Risk Informed, Risk Informed and Repeatable, or Adaptive), and then report annually on their current status. Unfortunately there is no guidance other than subjective definitions of these four tier levels, and no guidance on metrics and measurements to determine the current tier level. TELESIS started supporting a Federal civilian agency in 2017 to determine and improve their Tier level. The agency was at CSF Implementation Tier Level 1, and FISMA grade of C-. This agency wanted to improvement its CSF implementation Tier level and grade rapidly.
The Solution: TELESIS took on the challenge. We performed automated regional assessments for the agency to gauge the status of their compliance across all network devices in a fraction of the time. Each site adopted the TELESIS method of auditing networking devices to rapidly remediate identified vulnerabilities.
As part of this program TELESIS also developed the Cybersecurity Dashboard tool for the customer. We developed extensive metrics available from several sources, including the Cybersecurity Assessment Management (CSAM) tool, to analyze and determine the current implementation tier. TELESIS also determined ranges for each metric to represent the four implementation tier levels. The combination of the dashboard and these extensive metrics allows for the instantaneous assessment of the current implementation tier level. Without this tool and metrics, this assessment would take the agency several months to complete.
The result was a successful centralized and standardized enterprise cybersecurity program aligned with the organization’s strategic goals that fully implements the CSF and RMF and integrates and synchronizes with daily IT operations providing the ability to quantify and communicate risk to support senior leadership decision making.
After one year of TELESIS working with this customer, their CSF Implementation Tier Level is now at Level 2, and they achieved a FISMA grade of B, both significant improvements. Our goal is for our customer to get a FISMA grade of A+.Close Lightbox
The Challenge: Effective Communication within forward deployed combat units for those US Forces that are not fielded with Common Operating Picture (COP) systems in order to continue mission planning and operations. The TELESIS customer wanted to provide a capability to those users while not disturbing their current operations or adding additional equipment to their inventory.
The Solution: TELESIS took its years of engineering and knowledge of how tactical systems work and developed fully web based Common Operating Picture (COP) Application. The new tactical software allows commanders to communicate more effectively with forward-deployed combat units. TELESIS created an intuitive user interface and applied its in-house experience to develop an application using design elements for a familiar look and feel.
The software, known as Tactical Interface Tracking Application Node (TITAN), enables detailed communications while displaying a common operational picture for a single or multiple area of operations, such as the Middle East and Europe. TITAN uses the existing Blue Force Tracking network infrastructure that enables friendly force tracking for tens of thousands of Army and Marine Corps vehicles with Joint Battle Command-Platform hardware and software.
The software allows users to log in anywhere in the world with a computer on the Secure Internet Protocol Router Network(SIPR), using an internet browser, with no downloads necessary. Commanders can use TITAN to communicate with deployed units all over the world from one location. TITAN users can pull up maps, view multiple global locations and color-code their soldiers’ locations. It enables chat, messaging, sending attachments, filing situation reports and creating distribution lists.
The Challenge: The Iridium network is comprised of Low Earth Orbit (LEO) satellites that form a global mesh network. Iridium Short-Burst Data (SBD) devices that operate on this network currently have no interoperability with the Joint Battle Command-Platform (JBC-P) Family of Systems (FoS) systems. These JBC-P systems are the primary means of communication for units throughout the world using the Blue Force Tracker (BFT) network. The BFT network is managed through the Network Operations Center (NOC) located at the Mission Command Support Center (MCSC). The JBC-P FoS systems cannot currently communicate with the Iridium devices presenting a limit in communications between dismounted soldiers equipped with Iridium devices and JBC-P FoS (Vehicle and Command Post).
The Solution: TELESIS developed a plan to design and implement a solution to resolve this interoperability limitation. This plan was brought to TELESIS and approved for implementation. This plan had two steps. The first was new firmware for the SHOUT TS Iridium devices, and the second was the development of the MIG server located at the MCSC.
The TELESIS Team worked with NAL Research to develop a new firmware for the SHOUT TS device that can natively send and receive limited Command and Control (C2) and Situational Awareness (SA) messages with JBC-P FoS. This firmware uses the Variable Message Format (VMF) 6017A+ message standard that is already in use by JBC-P platforms. The MIG server was then developed to interface with the Department of Defense (DoD) Iridium Gateway to send and receive messages to/from the JBC-P NOC and talk directly with Iridium SBD devices that use this new firmware.
The MIG also uses leverages the existing architecture within the JBC-P NOC Software to process the message flow between Iridium devices and JBC-P devices.
The MIG was developed to allow for future Iridium SBD devices that can send (or act as a modem for a system that sends) VMF 6017A+ message standard to utilize the limited C2/SA capabilities that the MIG provides.Close Lightbox
The Challenge: USSOCOM required the ability to test new and improvements to existing technologies in an unrestricted environment on a simulated SOCOM Information Enterprise (SIE). They had limited facilities to test and evaluate not only new technologies but also any improvements to existing technologies in a non-restricted or locked down enterprise environment. Most of the technologies required development of new procedures that are non-existent in the commercial and military arena. This made it difficult to evaluate against any established standards. They were of the opinion that new technology can be selected for evaluation based on the ability to fill gaps in existing programs of record or adding more capabilities to existing technologies. Other challenges were the development of network configurations that would both satisfy operational and security requirements.
The Solution: The Telesis IDF team, along with their government leadership, reached out to programs of records for their requirements and shortfalls. Once the need was identified the team researched and contacted various venders, to see what they had to offer to fill these gaps. If their product(s) were a viable option the team recommended bringing in the technology, creating test procedures and configurations to assess the requirements. If one stood out as a worthwhile product or software it would be sent up to the SOCOM Integration Facility (SIF) for further testing and secured under Security Technical Implementation Guide (STIG) protocols. Testing was not limited to just fill shortfalls but also included possible new ways of doing business. The results were stored or forwarded to the section that would most likely benefit from the new technology.
During the testing procedure the Telesis IDF team, when directed, produced manuals, quick reference guides and training curriculums for future implementation into the SIE. The documents were sent with the evaluation reports to the program of record to provide them with a base line for official technical material. The team also provided helpdesk support and training to site personnel either CONUS or deployed locations as required.
The Challenge: TELESIS was presented with a significant challenge after receiving a Help Desk award from a Civilian agency on January 25. Transition needed to be completed from the incumbent prior to the Feb 1 termination of the incumbent’s contract. Incumbent was situated in Colorado and TELESIS in Virginia!
The Solution: The challenge basically left us with one week (7 days) to hire and standup a new desk. Our proposal called for a one month transition period. The one month transition period was necessary to properly train new staff on the existing support knowledgebase and specific application training. We advised our customer that it would be in their best interests that we retain the incumbent staff which resided in Colorado and we would establish a help desk there and capture the incumbent staff. We immediately went out and interviewed the current Help Desk and retained enough skilled staff to stand up a desk in Colorado.
For standing up the Help Desk, we worked with our customer and, were able to obtain, configure, and ship out agency approved notebook computers with broadband access that allowed our Customer Service Representatives to connect directly to the agency’s network. We used a third party Contact Management Service to route calls directly to the CSR. On January 31 at noon the incumbent help desk number was redirected to our new service seamlessly. The CSR’s worked with these tools for about two months until we set up their office space. The Colorado facility was stood up with a new phone system and network seamlessly with ZERO interruption to services.Close Lightbox
The Challenge: TELESIS support for a Government’s secure application started with serving 60,000 users in 12 agencies. Within 12 months, the user base increased to 2.2 Million users in 70+ agencies and offices. TELESIS was tasked to service a quickly expanding user base without a increase in staff to match the workload increase.
The Solution: TELESIS implemented business applications that promote information-sharing, facilitate workflow, improve service delivery, and support long-term planning. To meet the challenge of a rapidly expanding user base, TELESIS leveraged business rules engineering and content parsing to facilitate automations. Business Rules were re-engineered to interpret incoming formatted application emails and execute appropriate actions. The success of these measures was demonstrated in the achievement of over 60% response and closure rate of incidents via automation.
While customizing our technical infrastructure to meet the increased support requirements, TELESIS simultaneously collaborated with our customer to redesign and prioritize contract Service Levels such as to provide maximum business value to the customers. TELESIS analyzed the pattern to determine periods of peak activity. Drawing upon this intelligence, TELESIS provisioned for maximum support during peak periods while allowing for moderated service levels for low priority issues serviced during non-peak hours.
We accomplished our goals by applying innovative solutions, state of the art technologies; creative staffing and CMMI based program management processes to successfully deliver customer requirements. Our innovative approaches blending technology solutions, real world experience, subject matter expertise and industry best practices resulted in high customer satisfaction scores from our users, maximum return on investment for our customer while still allowing the achieving of above industry standard service levels.Close Lightbox
At TELESIS, we value the diversity of our employees and the broad scope of each Individual’s talents. We honor our commitment to treating everyone with fairness and respect and offer unique career development oportunities allowing for personal and professional growth.