Software Development (Mobile Solutions)
Through Mobile First and Responsive design, we develop platform agnostic, advanced User Experience capabilities that maximize functionality for users on desktop and mobile platforms, providing them a common User Experience and maximizing the efficacy of the solutions that we deliver to the federal and commercial market place.
Our AgileView methodology delivers capabilities that will be offered to customer stakeholders through varying delivery channels including desktop and mobile devices. This ensures that users have a common user experience across platforms and delivery channels, and simplifies core development interdependencies such as security architecture, data integration and workflow.
Using our AgileView methodology, our team will support the delivery of incremental and deployable capabilities in shortened timeframes across Requirements Analysis, Software Design, Development and Testing.
We provide tools and techniques that empower user groups to analyze data in order to gain knowledge, business value and empower decision-making, the goal being to allow for the answering of questions that the user may have not even known to ask.
The solution to the big data challenge requires the ability to capture and analyze data from multiple sources in real-time - - a complex task that necessitates the convergence of multiple technologies into an integrated system for data collection, analysis, and dissemination.
Our team brings the right blend of human intelligence from skilled data scientists, data managers, mission experts and business analysts who can apply advanced analytics concepts to the agency's most urgent data challenges. We apply the principles of data management and governance aid our customers at various stages of their data maturation stages. We provide expertise in the areas of Natural Language Processing (NLP), open source statistical modeling (R, Orange, Perl etc…) and advanced and predictive analytics.
Our mission is to consistently deliver superior analytic and decision support services to our clients while fostering a climate of innovation and customer ROI (return on investment), by helping our customers understand and solve complex challenges and build self-sustaining internal analytics capability, all while leveraging the customer’s current infrastructure investments.
Data Warehouse Design
Disparate Data Sources
Open Source Software
Time-Series and Forecasting
Enterprise and System Integration Solutions
Many organizations have migrated to Enterprise Resource Planning (ERP) systems supported by commercial-oﬀ-the-shelf (COTS) packages designed to contain the primary components of an organization’s business operations. The complexity of implementing and standardizing processes to achieve the expected returns on the investment requires organizational commitment and the right partner. LTS, Inc. employs leaders that have led large, complex transformations to leverage the latest COTS packages integrated into distributed legacy environments to support operations across the country and around the globe. Our business-centric approach, combined with a deep understanding of the capabilities and limitations of COTS systems, complementary reporting alternatives, and the importance of user optimization, provides our clients with unrivaled support across the full life cycle of enterprise application systems.
Our Program Management Approach was developed over 10 years on a number of technology driven projects. We derived our management principles from the PMI’s PMBOK, ITIL, and packaged software implementation methodologies such as Oracle’s AIM/OUM and SAP’s ASAP. We tailor our approach for each client to provide business driven results on complex IT projects.
Enterprise Application and System Integration Service Offerings:
Enterprise Application Planning Services
Enterprise applications projects are substantial based on the cost of the project, the duration, and the impact on the organization and its mission. LTS, Inc. offers a structured approach to conceptualize, plan and, initiate technology projects. We support our clients by establishing clear governance and minimizing risk during the entire lifecycle of the project. We offer an array of services based on the specific needs and requirements of the client and environment, including:
Providing Program Management support, including establishing the framework under which the project will operate, including the schedule, earned value management, establishing governance and risk management processes, and other controls.
Developing the Enterprise Solution Roadmap that includes identifying the relevant solution modules, the phasing, and the ultimate to-be state. This visioning process aligns technology with the mission and relevant timeframes.
Conducting an Alternative Analysis to support objective decision making for major IT investments based on relevant guidance, including OMB and other authorities. The alternatives are identified, analyzed, compared and documented to provide consistent decision support information. It includes quantitative and qualitative factors that are quantified for comparison and a recommended alternative.
Developing a Business Case to document the expected costs and return on investment of the selected solution. This support includes quantitative and qualitative discussions of the solution and the justification for the investment.
Supporting Requirements Definition, which centers on identifying functional, technical, and general requirements that support the approved solution with a focus on what the solution needs to accomplish. Standard requirements may need to be reviewed for applicability and in support of standardization across the Agency, Department or Government entity.
Performing Package Selection and Evaluation, which is frequently included in the Alternative Analysis but may be done separately. The different packages are evaluated against the documented requirements to determine the vendor solution that provides the best value to the government.
Conducting Organizational Change Management during the planning phase. We identify stakeholders, users, and other interested parties and prepare initial communications and stakeholder assessments to establish a baseline against which to measure effectiveness of change management activities.
Enterprise Application Transformation Services
To take full advantage of an investment in technology, the project must be viewed and treated as a transformation. The impact on stakeholders, customers, and users must be addressed to limit risk, provide a mature solution, and control overall investment costs. LTS, Inc. offers a comprehensive approach that benefits the entire enterprise and external stakeholders by providing lower risk solutions from Day 1. We offer an array of transformational services to meet client’s needs and specific requirements, including providing:
Program Management, including ongoing management of the project work streams, the schedule, risks, reporting and project change control.
Functional Analysis, including translation of functional and general requirements into solutions, fit gaps of requirements to solutions, and functional design for approved extensions, reports, or other development.
Technical Analysis, including translation of technical requirements to solutions and processes, technical design and coding for approved extensions reports, and other development.
Infrastructure Analysis, including design, development, and deployment of infrastructure to support development and production.
Business Transformation, including regular internal and external communications, stakeholder impact, and user readiness. This support helps companies rethink business, operating and models to deliver value.
Training, including instructor led, virtual, and other training delivery methods to provide the right training to the right user at the right time.
Testing, including unit, integration, performance, user acceptance, and regression testing. Each test focuses to specific areas to provide an optimal solution at go-live.
Compliance Analysis, including identifying various compliance requirements and incorporating them in the design, development and testing of the solution. This approach reduces rework after the solution deploys.
Enterprise Application Management Services
The deployment of the technology investment starts the process of realizing the return on investment. Our approach combines all decisions and assumptions to deliver a tested solution where users are fully prepared to operate the system. There is a stabilization period where users move from prepared to proficient. LTS, Inc. offers post production support focused on minimizing the stabilization period, accelerating the return on investment, and applying lessons learned to future application deployments and enhancements. We offer an array of application management services to meet client’s needs and specific requirements, including:
Operations Support, which begins with the definition and measure of service following ITIL guidance. We establish and execute operations and support procedures to provide service and support to the end users. We identify and track metrics to measure the effectiveness and efficiency of end user support. We manage the deployment of changes to the environment in the Operations Support effort, which maintains configuration control of the production environment.
Enhancement Support, including changes to existing processes and procedures and deployment of new functionality. This support includes unit, integration, and regression testing of changes prior to introduction to the production environment.
Infrastructure Support, including maintaining stability of the production, disaster recovery, and other supporting environments. We provide integration and regression testing for patches and upgrades prior to their introduction into the production environment. Our support includes maintaining technical configuration control between production and other environments.
Compliance Support, including post production monitoring of compliance, which includes Governance Risk and Compliance, audit requests, and other external requirements.
Clients Supported by LTS Enterprise Applications Offerings
Department of Housing and Urban Development / Public and Indian Housing – Next Generation of Management Support Budget Formulation and Forecasting
USTRANSCOM Transportation Financial Management System (TFMS)
Air Mobility Command (AMC) ES / SOA Enterprise Application Framework (EAF)
Infrastructure (Cloud Computing)
We design cloud collaboration environments, mature existing solutions to the cloud, and optimize the security, support, and sustainment requirements to allow for the realization of cloud strategies and the realization of planned Return on Investment (ROI).
LTS is a leading provider of managed hosting services, delivering secure, reliable and compliant hosting and management for some of the world’s most demanding enterprises and federal agencies. LTS has supported hundreds of customers in achieving compliance with both industry and regulatory standards.
We are the preferred vendor for those organizations that want to utilize our managed infrastructure to support their complaint solutions/applications or dedicated private clouds. Our clouds can be used internally to develop software/applications, as a federally compliant platform for PaaS/SaaS, or white-labeled and sold directly to customers as a proprietary solution.
LTS offers an experienced staff that helps your organization navigate the “path to the cloud” offering an agnostic set of services, solutions, and strategy around multiple cloud platforms (IaaS & PaaS) such as AWS, Microsoft Azure, Google, Terremark, and vCGS.
Modern networks open up vast opportunities for individuals and organizations, but also introduce new risks through cyber-attacks that can originate from anywhere around the world. LTS, Inc. helps clients manage cyber risk with a comprehensive suite of cybersecurity service offerings to protect information assets and data from cyber-attacks. We have highly skilled, experienced consultants who provide clients with cyber risk management consulting, engineering, operations, and compliance management support. We tailor solutions to specific client needs for system protections to ensure the proper functioning of network, server, application, and database technical security controls.
Cyber Security Service Offerings:
Security Operations Center Management
Our Information System Continuous Monitoring (ISCSM) approach helps more closely align compliance needs with security gaps that in turn helps mature our client’s cybersecurity posture to be ready for ever evolving threats and changing system operational environments. Specific activities include:
Manage security event log aggregation tools that collect network and syslog data from security devices including routers, switches, firewalls, IDS, web and email gateways.
Develop cyber analytic dashboards to increase security posture visibility and actionable data on the highest priority threats. Perform continuous monitoring activities to remediate and mitigate server, endpoint, network, application and database vulnerabilities with automated vulnerability scan tools.
Build and implement an ISCM strategy aligned with the Risk Management Framework (RMF) and automation of security controls.
Establish an ISCM program to supports the collection, analysis, development, and detection of security risk-related information.
Our Active Response Solutions benefit organizations by stopping suspicious activity in real time, initiating forensic analysis and information security process improvements, and providing an additional protective layer to secure sensitive data. Specific activities include:
Secure and harden systems at appropriate assurance levels through vulnerability identification and reduction following the National Checklist Program (NCP), DISA STIGs and NIST SP 800-53 Rev. 4 security control guidelines.
Implement application and database security solutions to uncover information system configuration weaknesses, identification and access control issues, missing patches, or any toxic combination of settings that could lead to escalation of privileges attacks, data leakage, denial-of-service (DoS), or unauthorized modification of information systems.
Define and implement automatic responses to specific types of suspicious and unauthorized behavior. Types of responses include: alerting IT, alerting SIEM systems, opening trouble tickets, initiating malware scans, and blocking activity or closing sessions
Our Software Assurance Support provides a more secure software product at release which, in turn, creates a reduction in compliance findings, lowering the cost of fixing and maintaining application security risks. Specific activities include:
Develop secure coding quality practices as part of web and mobile application approach throughout the Software Development Life Cycle that covers design phase, code base, and the entire information system as a whole.
Perform manual and automated vulnerability scans for custom and open source code that are both static and dynamic using a variety of industry leading tools to make sure vulnerabilities are found and fixed well in advance of a compliance assessment.
Governance, Risk, and Compliance Management
Our Governance, Risk and Compliance Support services enable customer readiness and efficient delivery, minimizing impact to your technology support teams and supporting efficient deployment and maintenance of information technology resources. Specific activities include:
Prepare Information Assurance (IA) compliance documentation for Assessment and Authorization (A&A) activities to address DoD, Risk Management Framework (RMF), FISMA, and FedRAMP accreditation requirements; perform IA policy and technical security control risk assessments based on NIST SP 800-53 Rev. 4 security controls; and mitigate residual risks through Plan of Action & Milestones (POA&M) management.
Develop, update and review of all required security documentation, services are implemented in accordance with the guidelines specified within NIST SP 800-37 Revision 1, Guide for Applying the Risk Management Framework to Federal Information Systems.
Advise clients on their overall cyber risk posture in terms of a Cybersecurity Maturity Model to help visualize the effectiveness of current and desired protections in terms of people, process, and technology.
Clients Supported by LTS Cybersecurity Offerings
Defense Health Agency (DHA) / Joint Medical Logistics Functional Development Center
DHA / Pacific Joint Information Technology Center
Department of Commerce / National Security Program Support
Department of Energy / Office of Corporate Information Systems CF-40
United States Air Force / Air Mobility Command
Veterans Administration / Interagency Program Office
Veterans Health Administration (VHA) / VA Mobile Application Framework
VHA / Telepathology Application Innovation
Program Management and Functional Support