Atlanta,  GA 
United States
  • Booth: Sponsors

Envistacom provides counterterrorism, cyber and communications solutions to U.S. and coalition partners in the aerospace, defense and intelligence communities. Customers rely on us for technology and subject-matter expertise to identify anddefeat global threats. We are a trusted partner in protecting military, civilians and critical infrastructure around the world.


  • Counterterrorism
    We collect and analyze operational data from multiple sources to support counterterrorism, exploitation and intelligence missions....


    • Weapons Technical Intelligence (WTI)

    • Counter IED Forensics 

    • Computational Sciences Research and Development

    • Stabilization, Security, Transition, and Reconstruction Operations


    • Design, Build and Maintain Biometrics Networks

    • Forensics Exploitation

    • Theater Exploitation Database (TED) Administration

    • Document and Media Exploitation (DOMEX)

    • Cellular Exploitation (CELLEX)

    • Exercise Planner


    • Information Sharing

    • Analytical Support

    • IT Infiltration/Technology/System Integrated Architecture

    • Open Source and Social Media Analysis and Exploitation 

    • All Source Analysis

    • Counterintelligence (CI)

    • Human Intelligence (HUMINT)

    • Intelligence, Surveillance, and Reconnaissance (ISR) PED

  • Cybersecurity
    We combine a full-spectrum of synchronized offensive and defensive cyber capabilities to protect national security and critical infrastructure....


    • Information Operations

    • Electronic Warfare

    • Cyber Intelligence, Surveillance and Reconnaissance (ISR)

    • Offensive Cyber Operations (OCO)

    • Defensive Cyber Operations (DCO)

    • Research and Development


    • Policy Development and Compliance / Governance

    • Risk Management Framework (RMF), Including Certification and Accreditation of Networks and Systems

    • Migration from DIACAP to RMF

    • Vulnerability Assessments/Risk Analysis

    • Security Operations and Management, Including Facility Security Officers (FSO)

    • Network and Perimeter Security Engineering

    • Software and Server Security Engineering

    • Mobile Device Management, Including Endpoint Encryption

    • Identity and Access Management via Multifactor Authentication

    • High Availability and Disaster Recovery

    • Penetration Testing 

    • Technology Exploitation

    • Implementation of Security Technical Implementation Guide (STIG)

  • Communications
    We are a vendor-agnostic communications technology supplier. We provide strategic and tactical C5ISR, satellite communications (SATCOM) and systems integration with full lifecycle support....


    • Engineering and Implementation

    • CDMA/GSM/3G/4G/5G

    • Wi-Max

    • LTE

    • HF/VHF


    • Fixed, Mobile and Airborne Satellite Terminals in all Commercial and WGS Frequency Bands

    • Mobile and Transportable Terminals in Vehicular, ISO, Transit Case and Manpack Form Factors

    • Intelligence, Surveillance and Reconnaissance (ISR) System and Architecture Integration

    • Satellite Terminal Certification for WGS Operation (ARSTRAT)


    • Site Planning/Surveys

    • Systems Architecture 

    • Sensor Integration

    • Operation, Maintenance and Upgrades

    • Training 

    • 24-7-365 Monitoring

    • Centralized and Distributed Call Center

    • Disaster Recovery