Distinguishers
- Designed and currently provide 24/7 operations for DISA’s Kwajalein-to-Guam fiber-optic submarine cable system.
- Provide C&A support to 19 major USCG Command, Control, Communications Engineering Center systems.
- Designed the software for the U.S. Coast Guard Data Delivery System (CGDDS) and led system development and training.
- Provide OSD’s Joint Improvised-Threat Defeat Organization (JIDO) J6/CIO with SETA support including Configuration Management and Information Security.

We employ ITIL best-practices and an integrated process approach to effectively deliver managed services to meet business and customer requirements.
IT, Communications, and Cyber Security Services
Supporting your systems and their security requirements across the entire development life cycle
Truestone IT and cyber security architects, engineers and subject matter experts bring with them a top down, holistic understanding of our customer’s mission, its IT and communications systems, their relationships to each other, their data flows and the principles that govern their acquisition, design and evolution. This strategic perspective enables us to effectively align the system security level processes, policies and best practices of DoD’s Risk Management Framework (RMF) with the System Development Life Cycle (SDLC), successfully transition from systems Certification and Accreditation (C&A) to Assessment and Authorization (A&A), and provide effective ongoing cybersecurity support after transition.
Truestone and the U.S. Coast Guard
Since 2005, Truestone has successfully supported USCG cyber security efforts:
- Primary USCG Tempest and C&A partner
- Visual TEMPEST Inspections (VTI) and Instrumented TEMPEST Surveys (ITS)
- TEMPEST Library and Documentation Support
- TEMPEST Personnel Development Program Support
- Participated in rewrite of COMDTINST TEMPEST manual
- Achieved ATO for USCG Bertholf, resolving 496 discrepancies
- Developed more than 100 C&A packages for USCG systems
- Built USCG C&A process for virtualized environment
- Wrote and standardized USCG firewall installation instructions and baseline configuration
- Worked with TISCOM to achieve a USCG-wide ATO as a Computer Network Defense Service Provider (CNDSP)
- Successfully transitioned from Certification and Accreditation (C&A) to DoD’s Risk Management Framework with its Assessment and Authorization (A&A) security processes, policies and best practices.
Aligning the Risk Management Framework with the System Acquisition Lifecycle provides our customer not only secure systems, but also an understanding of the system’s Total Cost of Ownership.
Securely connecting vital installations worldwide
The success of today’s military missions and federal agency initiatives rely on easily scalable and secure IT and communications systems — systems that can successfully withstand today’s brutally complex and ceaselessly evolving threat environment. Also, forces and agents around the world, operating far from their central commands, must be confident that if a breach of any type occurs, response, damage mitigation and remediation will return your enterprise to full operational resiliency with industry leading practices. Truestone offers a complete array of services and solutions designed to meet these critical obligations while driving streamlined operations, escalating efficiencies and lowering costs.
On-shore, Off-shore, and Undersea
From offshore oil rig inspection crews and missile ranges on remote islands, through IT and communications systems on U.S. Navy carriers and Coast Guard vessels, Truestone has proven it continually delivers the high-end technology services and solutions that keep missions moving forward — anywhere in the world. Our teams have specialized experience in satellite, terrestrial, and undersea communications systems including design and build-out of infrastructure, managing installations and augmenting and upgrading systems, circuit work and provisions.
We provide proven expertise across the entire spectrum of IT and communications systems operations — from Initiation, Design, and Implementation, through Operations and Maintenance, to final system Disposal. Where appropriate, Truestone utilizes the Agile methodology, an iterative approach to system and software development allowing us to work smarter and deliver critical functionality sooner while continually meeting the rigorous and changing requirements of a customer’s mission.
We provide proven expertise across the entire spectrum of IT and communications systems operations — from Initiation, Design, and Implementation, through Operations and Maintenance, to final system Disposal. Where appropriate, Truestone utilizes the Agile methodology, an iterative approach to system and software development allowing us to work smarter and deliver critical functionality sooner while continually meeting the rigorous and changing requirements of a customer’s mission.
The Truestone Advantage
Truestone’s IT and cyber security capabilities have and will continue to earn the trust of today’s most demanding and high-visibility Department of Defense (DoD) and Federal Civilian customers at installations across the globe — trust that can be earned only with fierce customer commitment and exceptional program performance. This is the Truestone advantage.
IT and Communications
- Complete System Development Life Cycle (SDLC) support
- Enterprise and network operations
- Server and systems administration
- Desktop and work center support
- Application development and management
- Telecommunications infrastructure
- Compliance
- Mission and business applications, tools, portals, and web services
Cyber Security
- TEMPEST Control Plans, Design, Inspection, and Certification
- Assessment and Authorization (A&A)
- Threat detection, network vulnerability management and continuous monitoring
- Configuration Management
- Data protection and encryption
- Web and URL filtering
- Protection services for networks, servers and desktops
- Disaster Recovery/COOP