Net-Centric Information Sharing

The Department of Defense (DoD) is engaged in an initiative known as the Joint Information Environment (JIE) where users will have access to information and data through a single secure, reliable, and agile DoD-wide information environment. Solers is an industry leader in providing information-centric solutions for the Department of Defense (DoD) and Intelligence Community (IC). Solers has extensive hands-on experience in researching, architecting, developing, integrating, fielding, and maintaining core enterprise services and service-oriented architecture (SOA) infrastructures. We have developed significant expertise working with initiatives in key areas such as Net-Centric Enterprise Services (NCES) and the Net-Centric Data Strategy and working closely with multiple Programs of Record (POR) and Communities of Interest (COIs) to facilitate a move away from the stove-piped systems of old. Our goal is help our customers optimize their information environments, modernize their architecture and infrastructure, and improve their mission effectiveness all while reducing costs. Utilizing the skills and expertise we have developed over the years we are positioned to assist our customers with the engineering support and technology necessary to meet the challenges of the JIE.

Key Features:

  • Software Defined Networks (SDN) / Software Defined Enterprise (SDE)
  • Cloud solutions including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS), providing a flexible, multi-tenant cloud infrastructure
  • Prevalent SOA technologies and open standards, to include Java (JEE), web services (REST, SOAP), OASIS, W3C, WS-* Interfaces, PKI, WS-Security, integrate COTS / GOTS / Open Source solutions
  • Enterprise-wide, asynchronous messaging based information dissemination
  • Identity Management including Attribute Based Access Control (ABAC) and Role Based Access Control (RBAC)
  • Directory Service Engineering, Public Key Infrastructure (PKI) integration with encryption, data integrity, and non-repudiation