When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Lockheed Martin Information Technology - Wikipedia

    en.wikipedia.org/wiki/Lockheed_Martin...

    In 1999 the British government awarded Lockheed Martin U.K. a contract controlling British census info. In 2002, a 7-year contract for the Centers for Medicare and Medicaid Services (CMS) Consolidated Information Technology Infrastructure Contract (CITIC) program. In 2003 a 7-year, $465,000,000 contract to provide services for the CDC.

  3. Leidos - Wikipedia

    en.wikipedia.org/wiki/Leidos

    The Leidos-Lockheed Martin merger is one of the biggest transactions thus far in the consolidation of the defense sector. Leidos contracts extensively with the Department of Defense, the Department of Homeland Security, and the Intelligence Community, as well as other U.S. government agencies and select commercial markets.

  4. Link 22 - Wikipedia

    en.wikipedia.org/wiki/Link_22

    Link 22 provides beyond line-of-sight (BLOS) communications. It interconnects air, surface, subsurface, and ground-based tactical data systems, and it is used for the exchange of tactical data among the military units of the participating nations. Link 22 will be deployed in peacetime, crisis, and war to support NATO and Allied warfare taskings.

  5. Lockheed Martin - Wikipedia

    en.wikipedia.org/wiki/Lockheed_Martin

    The same month, a deal to merge Leidos with the entirety of Lockheed Martin's Information Systems & Global Solutions (IS&GS) business came to a close. [65] [66] In May 2017, during a visit to Saudi Arabia by President Donald Trump, Saudi Arabia signed business deals worth tens of billions of dollars with U.S. companies, including Lockheed ...

  6. RSA SecurID - Wikipedia

    en.wikipedia.org/wiki/RSA_SecurID

    [23] [24] However Lockheed Martin claims that due to "aggressive actions" by the company's information security team, "No customer, program or employee personal data" was compromised by this "significant and tenacious attack". [25] The Department of Homeland Security and the US Defense Department offered help to determine the scope of the ...

  7. Cyber kill chain - Wikipedia

    en.wikipedia.org/wiki/Cyber_kill_chain

    Intrusion kill chain for information security [1]. The cyber kill chain is the process by which perpetrators carry out cyberattacks. [2] Lockheed Martin adapted the concept of the kill chain from a military setting to information security, using it as a method for modeling intrusions on a computer network. [3]

  8. CollabraSpace - Wikipedia

    en.wikipedia.org/wiki/CollabraSpace

    CollabraSpace is a computer software and consulting services company located in Annapolis Junction, MD. [1]The company is a provider and developer of secure, real-time, web-based collaboration software for government and commercial clients, [2] with a traditional market in the Intelligence Community, Department of Defense (DoD) and other public and private agencies with enterprise software ...

  9. Boldon James - Wikipedia

    en.wikipedia.org/wiki/Boldon_James

    Boldon James is a UK-based software company incorporated in February 1985, and specialising in data classification and secure messaging solutions aimed primarily at the commercial, defence, intelligence and government marketplaces. The company is named after its founders Peter Boldon and Roger James.