AIST Services and Capabilities
Information Technology & Management Professional Services
Advanced Integrated Software Technology (AIST) is a full service Information Technology and Management Services Consulting firm.
AIST's management team is comprised of experts in mathematics, cyber security, telecommunications, networking, and information technology services that span more than 80 years of total proven experience executing service contracts with the U.S. Department of Defense and Commercial customers.
AIST is certified by the U.S. Small Business Administration and is currently providing a full range of IT services to five of the largest military hospitals in the US.
Core Business Areas
Information Technology (IT) Solutions and Services include network engineering and security technologies; systems integration; software engineering (design, development, and integration); database solutions; information security; systems administration. Technology areas include, operating systems support, communications protocol support, and network architectures.
System Information Assurance and Network Security Solutions AIST security engineers provide system and network security system design, analysis and support from the user through the network infrastructure. Our association with DOD provides a real time technology backdrop to our network security delivery capability. We provide network security monitoring and analysis services to our DOD client. Capabilities in this area include active network monitoring, consulting, security policy and plan development, vulnerability and penetration testing, security awareness training, risk assessment, forensic information collection and analysis and network system security integration engineering.
Administrative Management and Support Services include providing leading-edge admin support to a national level program. AIST administrative support involves records management, medical records administration and support, operations documentation, procedures and methods. With clients such as the Bureau of Medicine and Surgery, AIST currently maintain logs, records and files, provides end-user support, and performs general administrative duties.
Capabilities
PRIMARY NAICS CODES
NETWORK ENGINEERING
AIST provides a strategic approach to identify and mitigate network risks and issues. Through the application of standardized processes and best practices, we help organizations achieve full life cycle network solutions.
CYBERSECURITY
Helping you to understand and manage your cyber risk and recover from any cyber attack.
AIST is a U.S. cyber defense company. We protect government and companies from the threat of cyber attack. In addition to our range of cloud services, we also offer customers a suite of cyber technical services to help you prepare and protect yourselves from cyber threats, as well as expert help to remediate and respond to any successful cyber attack that may impact your business. Our cyber technical services include:
Our cyber threat intelligence team investigates and tracks cyber attacks against organizations. From this we build rich profiles of high-priority threat actor campaigns which we continuously update as new information is obtained. Threat intelligence customers receive both technical data feeds and contextualized reports via a secure portal. Our technical experts will assist with investigating suspected cyber-attack activity. This spans the range of activities from deeply technical malware reverse engineering to the broader understanding of socio-political situations and attribution analysis. Our threat intelligence services enable both enhanced threat detection and greater situational awareness. In addition to regular reporting our experts undertake bespoke assessments to understand how and why an organization might be attacked and who might be the perpetrators. This increases the value of penetration testing by ensuring it is conducted in accordance with the latest threat intelligence and is tied to the business context. This intelligence led insight enables penetration testing services to be more targeted and focused in their approach.
Penetration testing ensures that products, applications and networks are sufficiently robust to cope with cyber threats.
Prior to penetration testing being conducted, specific threat intelligence can be acquired to provide added insight into contemporary cyber risks. The purpose of the penetration testing services then becomes to mimic the approaches that real, current threat actors can adopt in attacking the network; identifying relevant security weaknesses, vulnerabilities and possible attack vectors in the process. These tests can be conducted so as to try and avoid detection wherever possible, emulating the approach a real attacker would take, finding key security holes that would allow an attacker in and thus also testing the effectiveness security monitoring capabilities: how soon do they detect an attack which is in progress and how do they respond?
This allows comprehensive and relevant recommendations to be produced which enable organizations to determine the best way to readjust or allocate resources to further enhance their protection and more effectively mitigate attack vectors that were identified at the business level.
When a successful cyber attack impacts your network and business processes we are here to support you. We offer a full range of expert emergency Cyber Incident Response services to enable you to act rapidly and effectively. We combine technical skills with strategic guidance to make sure an organization makes the right decisions at the right times to limit the impact of these attacks.
If a breach of your security has already made the headlines or attracted regulator attention, then our team can help you move forward by managing internal and external stakeholders as well as the press.
CYBER ANALYTICS AND INTELLIGENCE SERVICES
WHAT ARE CYBER ANALYTICS AND INTELLIGENCE SERVICES?
AIST’s Cyber Analytics and Intelligence Services are designed to efficiently sift through the noise, find needles in globally distributed haystacks, and convert raw data into meaningful, actionable intelligence and insights. Our deep, multi-domain knowledge and interdisciplinary subject matter experts, coupled with advanced data collection, processing, analysis and visualization tools, enables our clients to be successful and to stay ahead of their competition and adversaries.
BUSINESS INTELLIGENCE
We use business intelligence tools to put actionable information at users’ fingertips. BI tools to eliminate guesswork, monitor key metrics, and gain valuable insight into customer behavior. Give business users anytime, anywhere access to decision-ready intelligence . Flexible and scalable, self-service BI makes it easy for users to discover and share insights in real time.
DATABASE SOLUTIONS
AIST provides everything from data platform architecture design through implementation and 24/7/365 support for mission critical systems Database Administration & Support, ETL, SAS, INFORMATICA, Business Objects.
SYSTEMS ADMINISTRATION
Linux, Windows, UNIX system set-up, computer set-up, installation, troubleshooting, service, upgrades, and maintenance. Maintenance of servers, storage and network infrastructure and to help ensure maximum performance and availability of all systems Leave Health IT Section where it is and add above categories above Health IT as listed Change heading on Application Services to Software Development.
DATA ANALYTICS
AIST empowers decision-makers, data scientists, and business analysts as well as embedded systems to make mission impacts with real-time, big data analytics.
Our Data and Analytics solutions integrate and analyze all relevant data using Big Data, Cloud-hosted Analytics, Data Science and Artificial Intelligence, Enterprise Data Management, and Modern Business Intelligence disciplines.
Big Data Analytics enables enterprises to analyze their data in full context quickly, and some offer real-time analysis. With high-performance data mining, predictive analytics, text mining, forecasting, and optimization, enterprises that utilize Big Data Analytics are able to drive innovation and make the best business decisions.
Leverage Cloud-hosted data analytic services to offer fully managed database-as-a-service, data warehouse-as-a-service, elastic big data-as-a-service, deep learning, and AI/ML.
Assist customers to select and learn how to use data science tools, and build embedded data science solutions to get the most out of their data.
Apply Bi-Modal approach to data management by treating high-value data assets with a best practice Data Governance - while landing data for immediate exploitation and eventual governance.
Build Big Data Warehouses and Modern Business Intelligence solutions that make all data available for reporting and analytics.
FULL LIFE-CYCLE SOFTWARE DEVELOPMENT
Application Services
AIST delivers modern application development methodologies, tools, infrastructures, and work cultures enabling responsive, intuitive, and mission-focused solutions for our government customers.
AIST's Application Services integrate and tailors Agile, Cloud-native Application Development, and Customer & User Experience disciplines to accelerate delivery of secure, elastic and resilient application solutions.
Apply Agile techniques at scale, tailored to our government customers, accelerating delivery of value.
Build applications designed to be resilient and scalable leveraging modern cloud platforms.
Develop services to efficiently evaluate and transform legacy applications that are optimized for modern cloud platforms and aligned with business objectives.
Create human-centered design to align systems and services with user needs, increasing performance and end-user satisfaction.
We perform all stages of software development, either as a project managed entirely by AIST or as part of a team of partners. Our experience includes all general phases of development, including—
Our technical experts work with the customer and all stakeholders to develop the requirements for the application being developed. Our team is well versed in the ability to solicit requirements and codify them.
With all stakeholders in agreement on the system requirements, a design and architecture is developed. Programming languages, frameworks, and toolsets are chosen to best satisfy requirements.
Depending on the complexity of the project, a prototype may be developed to demonstrate areas of particular concern. The prototype may be a user interface mockup to allow stakeholders to “test drive” the application prior to actual implementation, or a proof of concept implementation of a specific technical issue.
Our ISO 9001 registered quality management system helps reduce the number of bugs or other issues during the development process, ensuring the development of a high quality application that meets all of the agreed to requirements at the onset of the project.
Prior to release, we always subject the application to a rigorous regression and QA testing process. Specifics of each test plan are developed during the requirements analysis, but are designed to not only discover defects in coding, but test interoperability, compliance with requirements, and application stress testing.
AIST can assist in documentation, packaging, distribution, and installation during the deployment phase of any application.
While our testing procedures ensure a high-quality release, changing mission requirements and evolving technologies call for ongoing support of an application. We stand behind our applications and have strong processes in place to ensure that knowledge and experienced gained developing an application remains available to support and maintain the application throughout its functional life.
Health IT
We provide application development, network support, help desk and database administration for military hospitals. We offer program management support for projects such as the Defense Health Information Management Systems (DHIMS) EHR program, which develops, deploys and maintains the systems that make up the military's EHR, the world's largest.
AIST Health IT Services provides HIPAA-compliant healthcare information technology solutions including on-site staff augmentation, trouble ticket processing, 24×7 Help Desk services, server and application support, professional services (projects and IT architecture), hosted communication services (email and voice), remote and collocated infrastructure, and disaster recovery platforms.
- Cloud Hosting Services:
- Microsoft Azure Hosting
- AWS Cloud Hosting
- Managed Cloud Connected Storage
- Cloud Migration Services
- Cyber Security Services:
- IT Security as a Service
- Cloud Security Services
- Security Information and Event Management (SIEM)
- Network Anomaly Detection Service
- Virtual Chief Information Security Officer Service (vCISO)
- Install and manage servers, workstations and VoIP systems, Clinical and non-clinical support
- Install and manage Microsoft Exchange Servers, your email, and provide secure access to email anywhere from any device, HIPAA compliant email archiving
- 24 x 7 x 365 Help Desk services from our four Help Desk centers
- Provide secure data backup and disaster recovery
- Implement and manage Microsoft Office 365
- Provide mobile device management