Blog

OST is honored to be a team member in support of ManTech, our Prime Contractor, for the COMPS II program.

Open Systems Technologies Corporation (OST) was recently recognized as a Leading IT Services Company by The Technology Headlines at thetechnologyheadlines.com.Read more
Under GSA Schedule Contract GS-35F-184DA, Open Systems Technologies Corporation (OST) was recently awarded Task Order #HQ003417F0137 to provide Enterprise Level security support for the DoD Pentagon Force Protection Agency (PFPA).Read more
Open Systems Technologies Corporation (OST) was recently recognized in the Northrop Grumman Enterprise Supplier Recognition Program. OST was recently presented the "Customer Relationship" award at an award ceremony held in February.Read more
December 27, 2016 AKO Enterprise Services Contract Award for the US Army Gainesville, Va., Dec.Read more

During development on the Army side, typically its The Director, Operational Test & Evaluation (DOT&E) that handles requirements such as information assurance / cyber security for weapon systems. They even go so far as to ensure the Threat Systems Management Office (TSMO) Red Team gets involved while the system is still in development. However, after the development portion is complete and the system is in production, it becomes harder to update / patch due to those actions taking additional funding that wasn't allotted during the acquisition phases (e.g., paying a software engineer to develop those patches or make those configuration changes).


Fortunately, thanks to Section 1647 of the 2016 ...

Read more

A long-delayed cybersecurity executive order due out from the Trump administration could be a launching pad for a major push to replace outdated government technology, the House Homeland Security Chairman said Thursday.


That modernization drive will likely be led by a modernizing government technology bill, sponsored by committee member Rep. Will Hurd, R-Texas, which passed the House last Congress but stalled in the Senate, Rep. Michael McCaul, R-Texas, said at a cybersecurity event hosted by the wireless industry group CTIA.



So glad to see we are moving in the right direction to make "America Safe Again!"

Cloud computing can help you right-size your infrastructure investments so you can focus on your core business functions. Of course, you have to be smart about how you procure and manage your services. We recommend a “trust but verify” strategy so that you are well aware of the quality of service you are receiving at any point in time.

The answer to this question is “it depends.​” The WebDAV standard itself can support the basic operations of cloud storage – create/​rename/​delete/​move files and folders. And from a WebDAV client perspective, most operating systems have a built-in implementation of WebDAV. It all sounds promising until you realize the differences in implementation on the various operating systems and the limitations of authentication and session handling. For instance, Windows XP has a very nice integration with being able to interact with the virtual mounted WebDAV drive; but Windows VISTA makes it very clumsy and provides a step backwards from Windows XP. Why should a WebDAV drive act d...

Read more