Tanager possesses a unique and robust portfolio of services that support our diverse customers in multiple ways through the use of our facilities and at customer sites. Tanager offers the following technical services to support our federal and Large Prime clients.
Cyber Security Services
Tanager’s customers are faced with constantly evolving cyber threats that impact vital infrastructure and data. As threats and attacks are becoming increasingly more sophisticated, robust and cost efficient solutions to help mitigate the risk from these threats and attacks are needed. Tanager provides experienced staff and robust traditional and cutting edge solutions to counter these threats and protect our customer’s enterprise. Tanager’s staff implements traditional cyber defense solutions and services that apply a defense-in-depth approach, as well as solutions to address new security risks introduced to an organization’s enterprise from the adoption of new technologies and changes related to cloud services and architectures.
Information Technology Services
Tanager’s technical service offerings include: facilities management, systems design, infrastructure support, information assurance, cyber security, help desk solutions, systems engineering, network engineering, security services, database administration, hosting services, application development and project management. In addition, Tanager provides big data solutions within cloud-enabled environments. Tanager’s R&D Department was appraised at CMMI Maturity Level 2 in July 2012.
Insider Threat/Fraud, Waste and Abuse
Tanager’s close working relationship with government agencies and corporate partnerships has made our company a small business leader within the insider threat industry. Our process of insider threat management, enterprise monitoring and investigative support allows governmental and commercial enterprises to deploy and seamlessly manage a host-based user monitoring tool on their existing infrastructure. Our multidisciplinary team of dedicated professionals monitors a state-of-the-art application aimed at identifying and responding to insider threats, countering fraud/theft, espionage, sabotage, terrorism, and violence. Tanager offers the services as a custom solution and as a service provider. Tanager supports the Design, Implementation and Maintenance of the service; Device Monitoring/Enterprise Audit; Video Capture/Replay; Counterintelligence/Criminal Analysis & Support.
Tanager provides mission critical 24x7x365 help desk support to the private and federal sector, intelligence agencies and the Department of Defense. Tanager’s understanding of mission needs coupled with intimate knowledge of our customers allows Tanager associates to resolve issues rapidly.
Tanager has the recent experience, physical presence, and ability to provide its services for the below functional areas and geographic zones:
|3.2 Engineering, System Engineering and Process Engineering Support||2, 3, 4, 5 & 6|
|3.6 Software Engineering||2, 3, 4, 5 & 6|
|3.10 Configuration Management (CM) Support||2, 3, 4, 5 & 6|
|3.11 Quality Assurance (QA) Support||2, 3, 4, 5 & 6|
|3.12 Information System (IS) Development, Information Assurance (IA),
and Information Technology (IT) Support
|2, 3, 4, 5 & 6|
|3.14 Interoperability, Test and Evaluation, Trials Support||2, 3, 4, 5 & 6|
|3.20 Program Support||2, 3, 4, 5 & 6|
Relevant SeaPort-e Functional Areas
Overall, the Naval Sea Systems Command (NAVSEA) seeks contractors with proven knowledge and experience who are able to provide multiple mission support services for its SeaPort-e program. Tanager’s core capabilities and demonstrated experience align with the SeaPort-e desired functional areas including:
Engineering, System Engineering and Process Engineering Support
Tanager supports multiple programs that provide engineering support to our Federal, DoD, Intelligence Community (IC), and commercial customers. Tanager staff evaluates, deploys, and administers solutions that have been selected for deployment. Following deployment, our staff administers and ensures that the Computer Network Defense (CND) or other monitoring capabilities are maintained using the government approved processes (i.e. DIACAP, NISCAP, ICD 503,) and industry best practices and standards. Tanager uses architectural standards, techniques, and best practices to support the development of metrics that evaluate and measure the coverage of large data collection and analysis systems. Tanager is familiar with the DoD Architecture Framework (DoDAF) and other frameworks that are used to guide the development of architectures to meet performance and mission criteria. Tanager has developed enterprise architecture systems to support the global deployment of systems that support DIA Computer Network Defense, DIA Insider Threat, and other military programs.
Software Engineering, Development, Programming, and Network Support
Tanager provides cutting-edge cyber security tools and software implementation services. Our best practice delivery methodology, based on CMMI processes and deliverables, ensures that implementations are performed in manageable stages and that an implementation is aligned with the ordering agency’s processes. At Tanager we understand that quite often a critical application has to be as unique as an agency’s mission and goals. Therefore Tanager leverages its expertise in systems/software implementation to provide custom application development services. Specifically our staff has skills in supporting and administering CND tools such as ArcSight, McAfee HBSS, McAfee Intrushield, Palo Alto Firewalls, Proof Point E-mail security gateway, Juniper Firewalls, Forcepoint (formerly Raytheon Oakley) Sureview, Snort, Network Flow (i.e. Centaur), NetWitness, Niksun, WebSense, BlueCoat, and other government/national level developed and deployed systems that support DoD’s CND operations and IC systems.
Quality Assurance (QA) Support
Tanager possesses a proven successful management approach for its federal clients, based on best practices and deliverables. Appraised at CMMI Maturity Level 2 in July of 2012, we currently employ proven processes across our entire enterprise, both internally with our operations and externally with our technical approach and program management.
Information System (IS) Development, Information Assurance (IA), and InformationTechnology (IT) Support
Tanager understands that the Navy’s IT needs are mission-based and dynamic. Tanager provides a host of IS Development, IA, and IT support services which are designed around supporting the overall mission of SeaPort-e participants by providing professional support staff to perform technical functions and processes. This allows Navy agencies to focus on their mission critical functions. From help desk to enterprise level support, Tanager is able to assist SeaPort-e agencies to do their job better and cheaper. Our mission is to always go above and beyond and provide IT technical personnel who act independently with little oversight. We understand that time is valuable, Tanager’s experience and expertise will allow agency stakeholders to spend more time focusing on primary tasks and less time addressing support issues.
Our services include:
- 126.96.36.199 Tier I, II, and III Operational Support.
- Network Engineering Expertise
- Information Assurance
- Spear Phishing, Embedded Malware and Zero-day / Non-signature Threats.
- Domain Name System (DNS)
- Configuration Management (CM) Support and Interoperability, Test and Evaluation,Trials Support
Tanager has established and maintains development, integration and testing environments for many clients, most recently for the Centers Medicare and Medicaid Services (CMS). Tanager was appraised at CMMI Maturity Level 2 in 2012 for Development and has created policies and procedures for testing that are in line with the CMMI guidelines. Requirements, Use Cases and Test Cases are developed, reviewed, approved and maintained in Tanager’s change management system using the IBM Rational Suite. Changes to these documents follow an internal change request process and must receive signoff by an approval authority. The test environment is a mirror of the production environment with the hardware, network infrastructure, system software and application software all duplicated from production. This allows regression testing and performance testing to be completed such that no environmental differences will impact the test result. This environment is used to assure the quality of the applications as well as changes in hardware, operating systems and system software. Test plans are executed and test evidence is gathered. The test evidence is stored in a repository and is under the control of change management. As new changes are implemented, the base lines are updated. Base lines are also maintained in a change managed repository so that historical references can be made for analyzing changes in performance results.
Tanager works with agency stakeholders to understand their organizational cyber security challenges, develop and align a solution strategy, and implement that strategy to achieve success. Our consultants provide management consulting by leveraging years of in-depth industry experience and Tanager’s best practice delivery methodology. Whether it’s cyber security assessments, plans, or monitoring, Tanager can meet and exceed task order deliverables. Tanager has extensive experience supporting the insider threat mission at both the Department of Homeland Security (DHS) and the Defense Intelligence Agency (DIA). Tanager developed the Concept of Operations (CONOPS) to implement host-based insider threat monitoring tools in support of both agencies. The CONOPS at DHS is focused on support and capabilities, specifically the sixteen (16) best practices for implementing a host-based monitoring tool. Providing DHS with the CONOPS that plays a critical role in the process of combating insider threat detection by defining how active and passive monitoring for indicators of malicious activity will be conducted across the enterprise. It further defines how documenting, reporting and coordinating alerts with Counterintelligence, Law Enforcement, General Counsel, and Inspector General Offices will be conducted. The strategy of the CONOPS is deliberately aimed at long-term “fixes” that can be implemented to mitigate the risks through a combination of technical, behavioral, administrative, analysis, investigative, or other response actions. Tanager also was involved in developing the CONOPS, Standard Operating Procedures (SOP’s), Policies and watch floor operations to support the enterprise wide insider threat mission at DIA. Tanager currently provides insider threat analysis and reporting in support of the Threat Mitigation Cell. Analysts continuously monitor host-based tools and multiple data sources in support of insider threat detection. All findings are reviewed for indications of malicious activity, and documented via an insider threat report. The team is also capable of providing additional special or “ad-hoc” reports that provide analysis or information about activities observed, anomalies, or information/intelligence collected in support of the insider threat mission.