Booz Allen Hamilton, a leading strategy and technology consulting firm, has deep functional knowledge and expertise spanning strategy, engineering, operations, technology, and analytics to help clients solve their toughest problems.
Live demonstrations include the following capabilities and services:
AI Cybersecurity Solutions: Cyber Precog is the only end-to-end, fully graphics processing unit enabled cyber defensive capability on the market. Through collaboration and co-development with NVIDIA, Booz Allen has architected a novel artificial intelligence (AI) solution than can be deployed to both the network center or the network edge to provide adaptive AI-powered enrichment at network speed. Cyber Precog’s pipeline has been designed to provide cyber-oriented workflows and use cases to a network security operations center, delivered in an intelligent and interpretable manner. The AI suite offers advanced capabilities to detect adaptive domain-based attacks, malware, beaconing-based attacks, and credential misuse resulting in lateral, adversarial movement. The suite also offers a novel, adaptive reinforcement learning capability to detect malicious anomalies that are signature agnostic, with 95% accuracy and full user interaction.
AI Cyber Defense: Expanding attack surfaces and increasingly sophisticated adversaries have driven organizations to deploy more tools and sensors to increase visibility and control across the enterprise. While providing improved visibility, these tools and sensors have increased the workload of cybersecurity experts and inundated them with alerts and false positives. AI can be used to analyze data from various sensors and quickly identify attacks using behavior analysis, versus relying on traditional signature-based methods. Malicious events identified by the AI system can be fed into automation and orchestration platforms to take immediate action in triaging and remediating the threat. Booz Allen leveraged experience from software-defined, machine learning (ML), and unified collaboration (UC) engagements to deliver an automated threat detection and response capability accessible to help desk operators. Our Machine Intelligence, Network Defense, Security Orchestration, Automation, and Response (MINDSOAR) capability utilizes a containerized ML platform and develops a continuous training environment where models are constantly being trained and deployed and are accessible to help desk operations through a chat client.
Automation and Orchestration: As networks become more complex with multi-vendor environments, frequent user changes, and changing compliance validation requirements, network automation can configure systems, deploy software, and orchestrate more advanced tasks such as continuous deployments or zero downtime rolling updates improving network resiliency by increasing change accuracy and performing changes faster. We’ve implemented automation tools like Ansible to reduce manual labor and simplify activities to address these challenges.
Immersive Cyber Learning: Cyber Centurion is a virtual cyber environment that allows the entry-level analyst or operator to view the network from multiple aspects, display different features of the network, learn about network requirements, and expand abstract thought related to network behaviors with the aid of a virtual interface to guide and prompt the user. Within the environment, users can maneuver in and around a network, manipulate the network from a macro perspective, and work with individual elements of the network to build and then defend their network. As students engage with different components of the network, such as firewalls or routers, they must identify the component and then select the appropriate course of action to remediate the event to return their network to normal state.
Network Access Control Capability for Comply to Connect (C2C): Every device connected to an agency network should comply with appropriate policies and configurations for that type of device (e.g., printer, laptop). It’s important to enforce this compliance before devices connect and before rogue, unauthorized, or already infected devices can be used as an attack vector. We are implementing robust network access control solutions for the Federal Government that can be applied to C2C by performing security posture checks as each device connects—before allowing any access privileges. Our solution stack monitors, classifies, and authorizes endpoint access across an enterprise. From simple MAC Address Bypass to complex security posture assessments, our solution integrates with enterprise security capabilities for a comprehensive assessment of endpoint compliance.
Resiliency Decision Support: Modern enterprise networks are complex and vulnerable to degradation and disruption. This begs the question: How should an organization identify the biggest impacts to their network performance and apply resources, so these issues can be resolved quickly and within budget? We’ve taken a proactive stance toward network modernization by engineering a resiliency maturity index based on five core network key performance indicators (KPI): bandwidth, latency, resource utilization, topology redundancy, and compliance. The index educates and guides leadership into making smart investments by backing the decision-making process with resiliency scores supported by actual data.
Secure Tactical Mobility: The National Security Agency’s Commercial Solutions for Classified (CSfC) Program enables secure wireless access to classified information within a tactical environment using commercially available products. Explore our ruggedized, deployable Secure Tactical Mobility offering that leverages CSfC-approved software components and WiFi-connected end-user devices to provide classified voice and collaboration services over private network connections.
About Booz Allen
For more than 100 years, business, government, and military leaders have turned to Booz Allen Hamilton to solve their most complex problems. Together, we will find the answers and change the world. To learn more, visit BoozAllen.com.
CONSULTING | ANALYTICS | DIGITAL SOLUTIONS | ENGINEERING | CYBER