Our Partners

McAfee Compatible

The TYCHON product suite is fully integrated with the McAfee Data Exchange Layer (DXL) and is engineered in partnership with the McAfee Security Innovation Alliance. All TYCHON products are tested, authorized, and digitally signed by McAfee as “McAfee Compatible.”

ecsnowhite

TYCHON partners with ECS, a leading information technology provider delivering cloud, cybersecurity, software development, IT modernization, and advanced science and engineering services.

sewp_logo_new3

TYCHON partners with SEWP Solutions LLC, a Joint Venture comprised of four small businesses with a mission to provide the DoD and government agencies with access to the widest possible variety of leading edge technologies.

bomgarnowhite

TYCHON leverages Bomgar to lock down users when they are out of compliance with Cyber Scorecard login types.

ForeScout Counteract

TYCHON leverages ForeScout CounterAct to enforce Cyber Scorecard compliance by automatically quarantining/un-quarantining systems when their status changes and the risk is to great for complete exposure.

RSA Archer

RSA Archer provides the DoD with guiding users through the RMF process and ATO validation.  TYCHON integrates with this system to automate the workflows needed to gather information from the endpoint.  TYCHON also ensures systems reporting cyber scorecard data have a valid ATO package and are approved to be on the network.  Furthermore RSA Archer can provide views into Cyber Scorecard reporting metrics being pulled by TYCHON in real-time.

Tenable

TYCHON leverages Tenable Nessus Scan engine to enrich its Cyber Scorecard data as well as force scans on hosts when their information becomes out of date.  Administrators can utilize custom actions in micro-services to retrieve data or force policy actions to occur.

ThreatQuotient

TYCHON uses ThreatQ to check assets for real-time IOC intelligence as well as assessing the impact to the enterprise for critical attacks.  ThreatQ utilizes TYCHON to enrich its datasets with Fuzzy Hashes so better determine if variants of known attacks exist in the enterprise.