Bigstock 49850954Sentar’s employees have provided many valuable services and solutions to problems in domains which leverage our expertise in Cyber Security, Information and Software Assurance, multi-agent and machine-learning systems, knowledge-based integration, as well as in intrusion detection, information fusion, secure configuration, certification and accreditation.

Our R&D engine is powered by dedicated, creative researchers who are attracted to Sentar by our enthusiasm, our commitment to innovative research, and most importantly, by the many opportunities we offer to enhance the means by which people can make significant contributions within their fields.

Our R&D customers have included the Air Force, the Army, the Missile Defense Agency, and DARPA. Over dozens of years, Sentar has assembled a base of researchers as well as a multidisciplinary group of strategic partners who together approach the challenge of information consolidation, correlation, and fusion in such crucial domains as Computer Network Operations, Computer Network Defense, Net-centric Warfare and Information Assurance and Protection. While our current areas of focus provide valuable insight within those areas, we feel there are few limits to the domains where our technological expertise can be applied.

  • Applied mathematical modeling
  • Machine learning
  • Semantic Engineering
  • Automated data classification
  • Distributed knowledge-based systems
  • Multi-agent systems
  • Malware analysis
  • Agile R&D
  • Ontology design and development
  • Cloud computing design and architecture
  • Cyber Mission Assurance and Cyber Resilience technologies

Cyber R&D Specialties:

Computer Network Operations (CNO)

CNO refers to defensive and offensive measures taken to protect and defend information, computers, and networks from disruption, denial, degradation, or destruction. Applications of CNO address incident response, disaster prevention and recovery, intrusion prevention, secure infrastructure, malicious insider detection, latency reduction, and forensics as they relate specifically to missile defense systems and networks.

Computer Network Defense

CND describes the actions taken to protect, monitor, analyze, detect, and respond to unauthorized activity within information systems and computer networks. CND protection activity employs information assurance principals and includes deliberate actions taken to modify an assurance configuration or condition in response to a CND alert or threat information.

Net-centric Warfare

From a broad perspective the introduction of networking techniques into war fighting systems is the military equivalent of the digitization and networking asset evolution. Military networking, especially between platforms, is far more challenging than industry networking due to the heavy reliance on wireless communications, high demand for security, and the need for resistance to hostile jamming and cyber attacks. Therefore, it shouldn’t surprise anyone that the introduction of networking into military environments has proven more painful and more protracted than commercial and private industry experiences.

Information and Software Assurance and Protection

IA is an application-oriented approach to protecting critical software. The thrust of IA is to slow the acquisition of application software by adversaries, make cost-prohibitive the exploitation of software when it does leak, and to ensure technology/policy protection measures are appropriately applied. Solutions to protect software include piracy prevention, ensuring code integrity, and preventing unauthorized usage of critical software applications.

Share This Post

Stay up to date with the latest news.