Advanced Integrated Software Technology

AIST Services and Capabilities

Information Technology & Management Professional Services

Advanced Integrated Software Technology (AIST) is a full service Information Technology and Management Services Consulting firm.

AIST's management team is comprised of experts in mathematics, cyber security, telecommunications, networking, and information technology services that span more than 80 years of total proven experience executing service contracts with the U.S. Department of Defense and Commercial customers.

AIST is certified by the U.S. Small Business Administration and is currently providing a full range of IT services to five of the largest military hospitals in the US.

Core Business Areas

Information Technology (IT) Solutions and Services include network engineering and security technologies; systems integration; software engineering (design, development, and integration); database solutions; information security; systems administration. Technology areas include, operating systems support, communications protocol support, and network architectures.

System Information Assurance and Network Security Solutions AIST security engineers provide system and network security system design, analysis and support from the user through the network infrastructure. Our association with DOD provides a real time technology backdrop to our network security delivery capability. We provide network security monitoring and analysis services to our DOD client. Capabilities in this area include active network monitoring, consulting, security policy and plan development, vulnerability and penetration testing, security awareness training, risk assessment, forensic information collection and analysis and network system security integration engineering.

Administrative Management and Support Services include providing leading-edge admin support to a national level program. AIST administrative support involves records management, medical records administration and support, operations documentation, procedures and methods. With clients such as the Bureau of Medicine and Surgery, AIST currently maintain logs, records and files, provides end-user support, and performs general administrative duties.

Capabilities

  • Business Intelligence, Data warehouse, Business Objects, SAS, Crystal Reports.
  • ETL Services - Informatica, Oracle Data Integrator, IBM – Infosphere Information Server, Microsoft – SQL Server Integrated Services (SSIS)
  • Network Systems Design, Integration, and Testing.
  • Enterprise Management Engineering (Tivoli, BMC, HP OpenView, SNMP, etc.).
  • Software and network installation for municipalities such as federal, state and local governments, hospitals and schools.
  • Database Design, Development and Administration (e.g., ORACLE, SQLSERVER, TERADATA, SYBASE, ACCESS).
  • Operating Systems Administration (e.g., UNIX, LINUX, WINDOWS).
  • Business Intelligence and Data Warehouse Solutions (ORACLE, MS SQLSERVER, SYSBASE).
  • Client–Server and Peer–to–Peer Technology Development and Support.
  • Systems Design, Integration, and Testing, Desk Top Support.
  • Programming – JAVA, C++, SAS, BUSINESS OBJECTS ENTERPRISE REPORTING.
  • CMM/SEI Leading–Edge Software Integration.
  • NETWORK SECURITY – Firewall setup, management, and administration – WIDE AREA NETWORKS (WAN).
  • Website development (e.g., HTML, PHP, JavaScript), ECOMMERCE, HOSTING , HIGH SPEED INTERNET ACCESS, T1, T3 Lines.
  • PROGRAM MANAGEMENT & TRAINING.
  • SharePoint.

PRIMARY NAICS CODES

  • 541511 Custom Computer Programming Services
  • 541512 Computer Systems Design Services
  • 541513 Computer Facilities Management Service
  • 5416 Management, Scientific, and Technical Consulting Services
  • 54161 Management Consulting Services
  • 541611 Administrative Management and General Management Consulting Services
  • 611420 Computer Training
  • 238210 Electrical Contractors and Other Wiring Installation Contractors
  • 561210 Facilities Support Services
  • 811212 Computer and Office Machine Repair and Maintenance

NETWORK ENGINEERING

AIST provides a strategic approach to identify and mitigate network risks and issues. Through the application of standardized processes and best practices, we help organizations achieve full life cycle network solutions.

  • Core networking delivers the foundation for advanced, unified communication systems with an integrated infrastructure that builds audio, video and wireless on a grounding of secure, automated IT systems.
  • AIST consolidates infrastructures of multiple satellite organizations together into a single, streamlined operation.
  • AIST applies industrial wireless technologies to business and industrial processes to deliver rapid operational efficiencies from design to deployment.
  • Broadband wireless supports high-speed connectivity in almost any operational environment.
  • Frontier solutions connect multiple facilities for unified communications that support mobile and remote operations.

CYBERSECURITY

MONITOR -----> ANALYZE -------> DEFEND

AIS TechnologyHelping you to understand and manage your cyber risk and recover from any cyber attack.

AIST is a U.S. cyber defense company. We protect government and companies from the threat of cyber attack. In addition to our range of cloud services, we also offer customers a suite of cyber technical services to help you prepare and protect yourselves from cyber threats, as well as expert help to remediate and respond to any successful cyber attack that may impact your business. Our cyber technical services include:

Threat Intelligence

Our cyber threat intelligence team investigates and tracks cyber attacks against organizations. From this we build rich profiles of high-priority threat actor campaigns which we continuously update as new information is obtained. Threat intelligence customers receive both technical data feeds and contextualized reports via a secure portal. Our technical experts will assist with investigating suspected cyber-attack activity. This spans the range of activities from deeply technical malware reverse engineering to the broader understanding of socio-political situations and attribution analysis. Our threat intelligence services enable both enhanced threat detection and greater situational awareness. In addition to regular reporting our experts undertake bespoke assessments to understand how and why an organization might be attacked and who might be the perpetrators. This increases the value of penetration testing by ensuring it is conducted in accordance with the latest threat intelligence and is tied to the business context. This intelligence led insight enables penetration testing services to be more targeted and focused in their approach.

Penetration Testing

Penetration testing ensures that products, applications and networks are sufficiently robust to cope with cyber threats.

Prior to penetration testing being conducted, specific threat intelligence can be acquired to provide added insight into contemporary cyber risks. The purpose of the penetration testing services then becomes to mimic the approaches that real, current threat actors can adopt in attacking the network; identifying relevant security weaknesses, vulnerabilities and possible attack vectors in the process. These tests can be conducted so as to try and avoid detection wherever possible, emulating the approach a real attacker would take, finding key security holes that would allow an attacker in and thus also testing the effectiveness security monitoring capabilities: how soon do they detect an attack which is in progress and how do they respond?

This allows comprehensive and relevant recommendations to be produced which enable organizations to determine the best way to readjust or allocate resources to further enhance their protection and more effectively mitigate attack vectors that were identified at the business level.

Emergency Response Services

When a successful cyber attack impacts your network and business processes we are here to support you. We offer a full range of expert emergency Cyber Incident Response services to enable you to act rapidly and effectively. We combine technical skills with strategic guidance to make sure an organization makes the right decisions at the right times to limit the impact of these attacks.

If a breach of your security has already made the headlines or attracted regulator attention, then our team can help you move forward by managing internal and external stakeholders as well as the press.

CYBER ANALYTICS AND INTELLIGENCE SERVICES

WHAT ARE CYBER ANALYTICS AND INTELLIGENCE SERVICES?

AIST’s Cyber Analytics and Intelligence Services are designed to efficiently sift through the noise, find needles in globally distributed haystacks, and convert raw data into meaningful, actionable intelligence and insights. Our deep, multi-domain knowledge and interdisciplinary subject matter experts, coupled with advanced data collection, processing, analysis and visualization tools, enables our clients to be successful and to stay ahead of their competition and adversaries.

BUSINESS INTELLIGENCE

We use business intelligence tools to put actionable information at users’ fingertips. BI tools to eliminate guesswork, monitor key metrics, and gain valuable insight into customer behavior. Give business users anytime, anywhere access to decision-ready intelligence . Flexible and scalable, self-service BI makes it easy for users to discover and share insights in real time.

DATABASE SOLUTIONS

AIST provides everything from data platform architecture design through implementation and 24/7/365 support for mission critical systems Database Administration & Support, ETL, SAS, INFORMATICA, Business Objects.

  • Oracle
  • Microsoft SQL Server
  • MySQL
  • PostgreSQL
  • Microsoft Access
  • Teradata
  • IBM DB2
  • Informix
  • SAP ASE
  • Amazon’s SimpleDB

SYSTEMS ADMINISTRATION

Linux, Windows, UNIX system set-up, computer set-up, installation, troubleshooting, service, upgrades, and maintenance. Maintenance of servers, storage and network infrastructure and to help ensure maximum performance and availability of all systems Leave Health IT Section where it is and add above categories above Health IT as listed Change heading on Application Services to Software Development.

DATA ANALYTICS

AIST empowers decision-makers, data scientists, and business analysts as well as embedded systems to make mission impacts with real-time, big data analytics.

Our Data and Analytics solutions integrate and analyze all relevant data using Big Data, Cloud-hosted Analytics, Data Science and Artificial Intelligence, Enterprise Data Management, and Modern Business Intelligence disciplines.

Big Data Analytics

Big Data Analytics enables enterprises to analyze their data in full context quickly, and some offer real-time analysis. With high-performance data mining, predictive analytics, text mining, forecasting, and optimization, enterprises that utilize Big Data Analytics are able to drive innovation and make the best business decisions.

Cloud-Based Analytics

Leverage Cloud-hosted data analytic services to offer fully managed database-as-a-service, data warehouse-as-a-service, elastic big data-as-a-service, deep learning, and AI/ML.

Data Science/Artificial Intelligence

Assist customers to select and learn how to use data science tools, and build embedded data science solutions to get the most out of their data.

Enterprise Data Management

Apply Bi-Modal approach to data management by treating high-value data assets with a best practice Data Governance - while landing data for immediate exploitation and eventual governance.

Modern Business Intelligence/Data Warehousing

Build Big Data Warehouses and Modern Business Intelligence solutions that make all data available for reporting and analytics.

FULL LIFE-CYCLE SOFTWARE DEVELOPMENT

Application Services

AIST delivers modern application development methodologies, tools, infrastructures, and work cultures enabling responsive, intuitive, and mission-focused solutions for our government customers.

AIST's Application Services integrate and tailors Agile, Cloud-native Application Development, and Customer & User Experience disciplines to accelerate delivery of secure, elastic and resilient application solutions.

Agile

Apply Agile techniques at scale, tailored to our government customers, accelerating delivery of value.

Cloud-native Application Design & Development

Build applications designed to be resilient and scalable leveraging modern cloud platforms.

Application Modernization

Develop services to efficiently evaluate and transform legacy applications that are optimized for modern cloud platforms and aligned with business objectives.

Customer and User Experience

Create human-centered design to align systems and services with user needs, increasing performance and end-user satisfaction.

We perform all stages of software development, either as a project managed entirely by AIST or as part of a team of partners. Our experience includes all general phases of development, including—

Requirements analysis

Our technical experts work with the customer and all stakeholders to develop the requirements for the application being developed. Our team is well versed in the ability to solicit requirements and codify them.

Preliminary design

With all stakeholders in agreement on the system requirements, a design and architecture is developed. Programming languages, frameworks, and toolsets are chosen to best satisfy requirements.

Prototyping

Depending on the complexity of the project, a prototype may be developed to demonstrate areas of particular concern. The prototype may be a user interface mockup to allow stakeholders to “test drive” the application prior to actual implementation, or a proof of concept implementation of a specific technical issue.

Development

Our ISO 9001 registered quality management system helps reduce the number of bugs or other issues during the development process, ensuring the development of a high quality application that meets all of the agreed to requirements at the onset of the project.

Quality assurance (QA) and testing

Prior to release, we always subject the application to a rigorous regression and QA testing process. Specifics of each test plan are developed during the requirements analysis, but are designed to not only discover defects in coding, but test interoperability, compliance with requirements, and application stress testing.

Release

AIST can assist in documentation, packaging, distribution, and installation during the deployment phase of any application.

Maintenance and support

While our testing procedures ensure a high-quality release, changing mission requirements and evolving technologies call for ongoing support of an application. We stand behind our applications and have strong processes in place to ensure that knowledge and experienced gained developing an application remains available to support and maintain the application throughout its functional life.

Health IT

We provide application development, network support, help desk and database administration for military hospitals. We offer program management support for projects such as the Defense Health Information Management Systems (DHIMS) EHR program, which develops, deploys and maintains the systems that make up the military's EHR, the world's largest.

AIST Health IT Services provides HIPAA-compliant healthcare information technology solutions including on-site staff augmentation, trouble ticket processing, 24×7 Help Desk services, server and application support, professional services (projects and IT architecture), hosted communication services (email and voice), remote and collocated infrastructure, and disaster recovery platforms.

Complete Health IT Managed Services:

  • Cloud Hosting Services:
  • Microsoft Azure Hosting
  • AWS Cloud Hosting
  • Managed Cloud Connected Storage
  • Cloud Migration Services

End-to-end Cyber Security protection, HIPAA compliance, and threat prevention including virus, spam, and spyware protection:

  • Cyber Security Services:
  • IT Security as a Service
  • Cloud Security Services
  • Security Information and Event Management (SIEM)
  • Network Anomaly Detection Service
  • Virtual Chief Information Security Officer Service (vCISO)

Manage and monitor your entire IT infrastructure:

  • Install and manage servers, workstations and VoIP systems, Clinical and non-clinical support
  • Install and manage Microsoft Exchange Servers, your email, and provide secure access to email anywhere from any device, HIPAA compliant email archiving
  • 24 x 7 x 365 Help Desk services from our four Help Desk centers
  • Provide secure data backup and disaster recovery
  • Implement and manage Microsoft Office 365
  • Provide mobile device management