Spathe Systems assists a secure, reliable, 24x7x365 global Command, Control, Computer, Cyber, and Information (C5I) Environment.

CAPABILITIES

   DEVSECOPS

   BIG DATA

   NETWORKING

   APPLICATION DEVELOPMENT

   CYBER SECURITY

   BLOCK CHAIN

C5I SUPPORT

Hover over any of the icons below to read more about that C5I capability

Hover over any of the icons below to read more about that C5I capability

CLOUD COMPUTING

Spathe Systems will help you modernize your organization to a Cloud Computing environment. We will bring our experience transforming DOD clients like yourself by guiding you though all phases of the transition including assessment of your current environment, recommend solutions with IAAS industry leaders, implementing the solutions, assessing your current application catalog and identify those that could modernize to a container environment, and modernize the applications.  Spathe Systems has direct relationships with Amazon, MicroSoft, Pivotal, IBM, Google, Red Hat and various other Cloud services and technology providers, and these relationships ensure the SPATHE is situated to provide you with the highest level of support.  Spathe can leverage our cloud experience to assist with completing the following:

    • Develop a best practice prioritization criterion for application assessments and obtain government approval of the criteria.
    • Assess applications and their associated data stores in government designated priority order and determine the modernization requirements for each application. These requirements may include rehosting on IaaS, refactoring for PaaS, revising for IaaS or PaaS, rebuilding on PaaS, or replacing with SaaS based on cost, schedule and/or performance factors.
    • Collaborate with application developers, functional leads and program offices to obtain information on application programming language, functions, programming Interfaces (APIs), server-client relationships, data structure, system dependencies, and other data points as needed to complete the assessments.
    • Identify dependencies required for modernizing applications to operate on a private cloud.
    • Identify standards for how applications are to be developed in accordance with industry best practices for cloud security.
    • Upon request, provide guidance and assistance to local developers who are refactoring, revising, or rebuilding their applications and/or performing application testing or validation steps prior to delivering containerized applications for operation on the private cloud.

SYSTEMS/SOLUTIONS INTEGRATION

Spathe Systems will help you modernize your organization to a Cloud Computing environment. We will bring our experience transforming DOD clients like yourself by guiding you though all phases of the transition including assessment of your current environment, recommend solutions with IAAS industry leaders, implementing the solutions, assessing your current application catalog and identify those that could modernize to a container environment, and modernize the applications.  Spathe Systems has direct relationships with Amazon, MicroSoft, Pivotal, IBM, Google, Red Hat and various other Cloud services and technology providers, and these relationships ensure the SPATHE is situated to provide you with the highest level of support.  Spathe can leverage our experience providing  Cloud Computing to assist with completing the following:

 

  • Develop a best practice prioritization criterion for application assessments and obtain government approval of the criteria.
  • Assess applications and their associated data stores in government designated priority order and determine the modernization requirements for each application. These requirements may include rehosting on IaaS, refactoring for PaaS, revising for IaaS or PaaS, rebuilding on PaaS, or replacing with SaaS based on cost, schedule and/or performance factors.
  • Collaborate with application developers, functional leads and program offices to obtain information on application programming language, functions, programming Interfaces (APIs), server-client relationships, data structure, system dependencies, and other data points as needed to complete the assessments.
  • Identify dependencies required for modernizing applications to operate on a private cloud.
  • Identify standards for how applications are to be developed in accordance with industry best practices for cloud security.
  • Upon request, provide guidance and assistance to local developers who are refactoring, revising, or rebuilding their applications and/or performing application testing or validation steps prior to delivering containerized applications for operation on the private cloud.

IT OPERATIONS & MAINTENANCE

Spathe Systems provides skilled resources to keep the SIE Operations available and accessible to the SOF operator.

 

DEVSECOPS

Hover over any of the icons below to read more about each DevSecOps Security Step

Spathe Systems can help to transform your organization and modernize your application development towards a DEVSECOPS focus, and to capture the value that it brings – the speed, agility, and flexibility to deliver faster. Transitioning to an application development approach with security and operations in mind at the outset will help to reduce the cycle times of development and decrease the re-work inherent in a traditional development approach. Spathe Systems can help to create a Certification process using as much automation as possible to provide easily consumable Cyber Security verification documentation to aid in rapid decisions of application net worthiness.

 

Perform DevSecOps training as necessary.

“Dev” training could include:

Agile/Scrum software development principles and practices

Microservices Architecture and software development principles

Container software development principles in relation to Greenfield development of new applications and modernization of monolithic applications into containers

Microservices based database development for High-Availability (HA)

Test Driven Development principles and processes

SOF CI/CD Pipeline review

“Sec” training could include:

Container Security principles (Dev Scanning, PROD Support, Remediation, etc.)

Application STIG requirements and certificate of Net Worthiness process

Software Defined Networking and associated security

“Ops” training such as

Explanation and examples of selected container orchestration tools

Traceability of requirements from Product Owners to Development along with Test Driven Development Principles as it relates to functionality requirements