Software & Cyber

World-class software and cyber solutions.

DevSecOps

Software development is an inherently collaborative process involving developers, security practitioners, and IT operations. Our DevSecOps approach assigns small cross functional teams into a series of agile development sprints to deliver software at a higher release velocity, and with more frequent feedback intervals from the product owner. This ensures that our code has integrated security and will migrate seamlessly from the testing into the final production environment. This integrated approach leads to faster release pacing and quicker time to value for new software products.

Cybersecurity

INTUITIVE maintains a staff of cybersecurity professionals experienced in systems security engineering capabilities that allow our customers to acquire, develop, or enhance new and current platforms such that they remain capable of performing mission essential functions during and after a cybersecurity or electronic warfare incident. We administer a systematic approach by applying best cybersecurity practices into a system from concept until decommissioning throughout the entire system lifecycle. INTUITIVE ensures that security is developed and designed into the system, so the system can continuously deliver the intended mission, despite adverse cyber-attacks. We aim to provide our customers with authorized cyber-resilient information systems, enclaves, and weapons platforms in support of their global operations.

Cybersecurity

Independent Validation & Verification

INTUITIVE has a long and proven track record of ensuring software performs as expected in support of critical mission systems enabling Ballistic Missile Defense and Unmanned Aerial Systems operations globally. Our automated, well-defined, and proven methodology for evaluating the quality and correctness of software consistently results in the identification of catastrophic software defects that otherwise would have resulted in system operational failure. We tailor our processes to specific program requirements, verify the software is built right, and validate the right software is built.

Defensive Cyber Operations

INTUITIVE leads the way in defensive cyber operations, providing advanced solutions and expertise to protect and defend tactical and enterprise architecture. Our team of experts develop cutting-edge software tools utilizing agile software development methodologies to safeguard the architecture and proactively respond to the evolving threat landscape. By integrating specific software suite of tools informed by leading threat intelligence platforms, as well as AI and Machine Learning algorithms, INTUITIVE‘s cyber solutions are proven to protect against advanced persistent threats and anomalous behavior in high impact 24/7 operational environments.  

Chipset on circuit board. Red circuits identify a potential threat.

Usability Research and Evaluation

INTUITIVE provides independent third-party usability research and evaluation analysis and recommendations to any program or project. Our Usability Specialists are trained and experienced with utilizing different usability methods to capture key performance indicators such as user errors, time-on-task, usefulness, usability, cognitive workload, user situational awareness, learnability, and user satisfaction. Usability research and evaluations conducted throughout the design and development process minimizes risk and costs while providing increased effectiveness, efficiency, and project longevity.

Modeling and Simulation

INTUITIVE is prepared to meet the growing demand to utilize modeling and simulation methods. With dedicated facilities and equipment, along with experts possessing hands on experience covering the full spectrum of Live, Virtual, and Constructive, we create innovative simulation solutions. Our teams produce tools and results that meet the needs of our customers, whether it be analysis of Integrated Air & Missile Defense (IAMD) systems, training operators using augmented reality/virtual reality systems, or performing program-level requirements verification and validation (V&V).

Software Engineering

INTUITIVE software engineers develop and maintain software systems that behave reliably and efficiently, satisfy all customer and stakeholder requirements, meet schedule, and ensure life cycle affordability. Our experience covers all phases of the Software Development Life Cycle. We are adept at using the latest tools, models, and analysis techniques to produce required documentation, artifacts, and optimal solutions.

Autonomous UAS

The future of air warfare will involve machine autonomy at a much larger scale than we have ever seen. INTUITIVE is at the cutting edge of development and experimentation activities to incorporate greater autonomy into Uncrewed Aircraft Systems (UAS). Our capabilities include integration of flight safety mechanisms and open-air testing approaches to gain confidence and increase trust in these systems. We’ve provided large scale autonomous flying test beds, delivered new data distribution and analysis infrastructure, provided modeling and simulation support, and supported test logistics and safety for these projects. It is primary concern of ours to add military capability through machine autonomy in an ethical and safe way that benefits our national defense objectives.

Artwork courtesy of AFRL

Managed Cybersecurity

The INTUITIVE DECIDE® Managed Cybersecurity solution is built on our cloud-scale DECIDE® Platform which allows us to deliver leading cybersecurity tools and expertise to our customers leveraging a proven shared-services model. The result to our customers is enterprise-grade cybersecurity capabilities at a fraction of the cost of going on your own. Our solution integrates relevant threat intelligence from multiple open source, proprietary, government, and law enforcement feeds with a 24/7/365 detection engine powered by learning artificial intelligence (AI) and machine learning (ML) algorithms. While others focus solely on known threats, the DECIDE® Platform is built to also detect emerging threats and anomalous behavior in your specific environment. The result is a more robust approach to cybersecurity risk management and growing compliance requirements.