CORE

WANT TO LEARN MORE ABOUT CORE?

CYBERSECURITY OPEN-SOURCE READINESS EVALUATIONS

CYBERSECURITY OPEN-SOURCE READINESS EVALUATIONS

Organizations utilize CORE by NTS for obtaining unbiased, in-depth evaluations of potential vendors, subcontractors, and partners as a matter of due diligence. With an emphasis on cybersecurity, data integrity, and FOCI concerns, NTS analysts scrutinize publicly and commercially available information using a myriad of cutting-edge forensic tools to protect our clients’ reputation and ensure they remain compliant with all relevant regulatory requirements.

THE PROCESS

Our partnership begins with an in-depth consultation to fully understand your requirements and evaluation objectives. Once the scope is defined, NTS initiates a detailed business intelligence and cyber evaluation protocol, that is tailored to the unique needs of your organization. Upon completion, you will receive a report that comprehensively outlines identified risks, potential foreign influences, and relevant attribution insights.

THE REPORTS

While our investigative protocols are fully customizable, every CORE report provides a baseline analysis of each identified entity against several critical parameters:


  • Organizational Compliance with Regulatory Requirements
  • Corporate (and / or Program-Level) Cybersecurity Posture
  • Security of Data Architectures
  • Performance Against Simulated Adversarial Attacks
  • Cyber Performance and Data Integrity of Offered Products / Solutions
  • Instances of Potential or Actual Foreign Ownership, Control, or Influence
  • Analysis of Patents and Other Intellectual Property Risks
  • Employee and Consultancy Affiliations

PAST PERFORMANCE

NTS investigators on CORE contracts have uncovered instances of foreign influence that were not identified through standard due diligence methods.


In one such case, an organization within a federal agency nearly entered into a partnership with a vendor who was discovered to have hidden connections to the People’s Republic of China. This was not a matter of benign or insignificant influence, either - this vendor was actively stealing software resulting in litigation and fines, and was ultimately dissolved months later.


Without CORE’s specialized processes, our client would have unknowingly entered into a partnership with a bad actor who slipped through the cracks of standard government vetting. Thankfully, the risk to national security was mitigated long before any damage could be done.


Apart from the time and financial resources preserved through CORE’s findings, NTS prevented our client from becoming embroiled in litigation or jeopardizing their reputation.

CURRENT CUSTOMERS

The majority of our CORE customers are from agencies that conduct highly sensitive missions around the world and require extremely condensed procurement timelines for testing, integrating, and employing cutting edge technology. These organizations rely heavily on our ability to quickly analyze, assess, and evaluate new technology to prior to their adaptation and use on the modern battlefield.

Share by: