Capabilities
IT & Cyber Security
Cape Fox FCG is leading the way by partnering with the Department of Defense (DoD) and other federal agencies to provide advanced, solution-based technology methods. Utilizing ITIL and PMP-based processes, we offer proven technology solutions, emerging technology trends, advanced research and development, and expert testing and evaluation. Our IT and Cybersecurity capabilities include support in areas such as unmanned weapons systems, healthcare IT solutions, biosafety engineering, next-generation systems, and much more.
Capabilities
IT & Cyber Security
Cape Fox FCG is leading the way by partnering with the Department of Defense (DoD) and other federal agencies to provide advanced, solution-based technology methods. Utilizing ITIL and PMP-based processes, we offer proven technology solutions, emerging technology trends, advanced research and development, and expert testing and evaluation. Our IT and Cybersecurity capabilities include support in areas such as unmanned weapons systems, healthcare IT solutions, biosafety engineering, next-generation systems, and much more.
01 Bringing the Future Into Today
We use our technology expertise to develop and implement training solutions, provide logistics support, recommend network configurations, ensure appropriate security solutions, manage assets, provide testing and evaluation, and support intelligence missions. We offer rapid solutions and quality delivery while expanding our capabilities to meet the growing need to modernize and expand existing technology systems and applications. As a leader in technology services, we are able to work with top talent and specialized industry leaders to ensure complete mission support. Our expert methods are your first steps to success – let’s work together and bring the future of technology to your business today.
02 Our Technology Offerings Include:
Connectivity / SD-WAN
(Fiber, Cable, Wireless, Satellite)
Unified Communications as a Service
UCaaS – (Hosted VoIP Solutions)
Security
(Firewalls, Threat Detection, DDos Mitigation, Malware, Virus & Phishing Protection)
Cloud
(Hosted Infrastructure, Public/Private & Hybrid Cloud, Data Center & Collocation, Disaster Recovery, Managed Office 365)
Mobility
(Wireless Services, Expense Management, Internet of Things)
SaaS
(Microsoft Office 365, Google G-Suite, Application Services, CRM, Client Based Security, IT Service Management)
Customer Experience
(Contact Center, CRM Integration, OmniChannel, SMS & CPaaS)
Managed Services
(Professional Services, Managed 365, App Help, IT Services Management)
03 Mission Success
United States Air Force (USAF)
Airborne Intelligence, Surveillance, and Reconnaissance (ISR) operations deliver top-secret intelligence related to enemy strength, movements, and activity to key Command & Control (C2)/Intelligence centers. Planning, carrying out, and ensuring the security of each mission depends on having the correct information at the right time gained through systems connectivity and availability. Leveraging highly experienced, certified, and trained individuals to support the 30 RS Special Access Program Facility (SAPF) helps ensure we remain ahead of our enemies and have consistent mission success.
Read More
We have extensive experience in all facets of multi-level security network and mission systems support, especially in collateral, Sensitive Compartmented Information (SCI), and SAP activities deriving from more than ten years of experience with RPA site design, installation, and maintenance support. We provide daily network oversight for operations and testing and training personnel/students for SAP/Special Access Required (SAR)/SCI networks and systems. We support operations during deployments to enable mission connectivity between multiple locations. We implement processes and procedures that result in more robust and stable networks and network management systems. We use proven system administration tactics, techniques, and procedures to quickly resolve or preempt outages before they become a problem through continuous monitoring and optimization.
Our team supports and performs daily Communications Security (COMSEC) tasks such as loading keying materials as well as coordinates completion status. CFFI personnel obtain, remove, replace, operate, store, transport, support, and manage COMSEC items and keying materials associated with required encryption devices installed at the site. We ensure personnel requiring access to classified COMSEC information meet the access requirements stated in AFI 33-201, Volume 2, and all COMSEC User Requirements. We comply with all local security measures and procedures for accessing and handling all COMSEC equipment or materials.
Team CFFI Network Support personnel serve as technical SMEs on multi-level security networks, providing full-scale technical support and administration for operations worldwide, where we:
- Provide operational and technical assistance for installation, configuration, and maintenance of communications systems and networks supporting the warfighter
- Plan for Enterprise network architectures to include routers, switches, and hubs
- Monitor and control networks, available bandwidth, and hardware and software resources
- Activate circuits, perform end-to-end troubleshooting for circuit and network outages, and coordinate with theater J6, AF Network Control Center (NCC), and operational sites as required
- Maintain equipment and communications infrastructure in support of ISR taskings
- Implement and enforce national, DoD, and AF security policies to protect networks from internal and external threats, including Perimeter Security System (PSS), Boundary Security System (BSS), and Information Support Server Environment (ISSE) guard, as required
- Install, configure, and upgrade security hardware and perform security intrusion assessments and monitoring
- Apply and validate security patch updates and establish current Standard Desktop Configuration (SDC) compliance on all RPA servers and workstations.
- Monitor C2 system network capabilities and limitations; optimize configurations for effectiveness and efficiency
- Configure network hardware and software to meet operational specifications
We also provide Information System Security Officers (ISSOs) as the principal POCs for Information Assurance (IA) activities for SAP/SCI networks and systems. CFFI ISSOs provide daily network oversight in support of operations to enable mission connectivity between multiple locations. They ensure that appropriate steps are taken to implement information security requirements for the IT system throughout its life cycle, from the requirements definition phase through disposal. CFFI ISSOs participate in reviewing and evaluating existing software procedures and recommend improvements to processes that resolve Automated Data Processing (ADP) security incidents, mishap prevention, classified information spillage, and the associated reporting procedures. Our ISSOs document and track all security patches/fixes and scanning/remediation at the sites, ensuring all required updates are accomplished. The ISSO’s efforts ensure that planned and actual software and equipment installations are completed in accordance with applicable security policies and regulations, ensuring the protection of confidentiality, integrity, availability, authenticity, and non-repudiation of user data. Our ISSO personnel review and maintain audit trails to establish hardware and software baselines for security tracking purposes.
United States Air Force (USAF)
The RPA–SOC program, comprised of the Air National Guard (ANG), Air Force Special Operations Command (AFSOC), Air Combatant Command (ACC), and the Air Education and Training Command (AETC), provides the capability for squadron-level mission planning, airspace coordination, tasking/targeting updates, threat warning, data archival and retrieval, establishing and maintaining situational awareness, dissemination, and support in areas of mission execution, intelligence, weather administration, and communications. The 577th Software Engineering Squadron (SWES) is used as the prime integrator office by the RPA–SOC System Program Office (SPO) to design and maintain the RPA–SOCs for all the major commands (MAJCOM). The SOC is comprised of both unique equipment solutions for interfacing and communication between the crew in the Ground Control Station (GCS), forward aircraft, and C2 centers worldwide at the Unclassified, Secret, and Top Secret/Sensitive Compartmented Information (TS/SCI) levels.
Read More
CFFI delivers an experienced and certified staff of engineers, technicians, and program/project managers who work together to maintain critical systems, troubleshoot, analyze, develop, document, configure, install, test, and provide mission-impacting technical and security solutions. Our team ensures network security by implementing hardware and software mechanisms to protect the network and infrastructure from unauthorized access, disruptions, and misuse. Our network security protocols and procedures help protect RPA assets against external and internal threats. CFFI performs cybersecurity engineering-related technical consultations to include expert assessment of access control systems and methodology, application and file security, security practices, hostile intrusion detection and prevention, logical and physical security, cross-security boundary guards and interfaces, servers (enterprise, distributed, network), public key infrastructure, network architecture, cybersecurity (authentication and integrity), and virtual private networks.
We consistently exceed AF RPA mission requirements, receiving accolades and Exceptional CPARS ratings by:
- Ensuring the availability, reliability, sustainability, operations, and administration of IT servers, data storage, and software applications
- Supporting the identification, reconnaissance, and exploitation of vulnerabilities within cyberspace environments
- Designing, installing, configuring, and sustaining the network and telecommunication infrastructure, distribution media, cryptographic equipment, and associated devices
Providing communications and network systems architecture, video distribution and long-haul communications system, and enhancement support for the RPA-SOC Enterprise