Capabilities
Cyber Solutions
Our cyber practice solves challenging problems to benefit national security. We help our customers succeed in their missions by offering cutting-edge solutions and services. Our expertise spans software engineering, vulnerability research, reverse engineering, network systems, and custom tool development.
Lawful Interception & Collection Management
We understand the internet, how it works, and how the billions of people connected to the internet communicate. We apply that expertise to identify intelligence from data collected for law enforcement, intelligence, and private sector customers. We develop and maintain enterprise data procession systems in cross-domain hybrid cloud environments. We automate, process, and disseminate large scale datasets for operational use.
Cyber Tool Development & Digital Forensics
Identifying, extracting, and processing data at rest on devices is key to missions ranging from law enforcement analyzing seized media to private sector organizations mitigating insider threats. Redhorse is highly skilled in performing these functions, making sense of the data, and making it relevant to our customers’ missions. We have invested nearly 20 years developing institutionalized knowledge around reverse engineering, vulnerability research, cryptanalysis, CNO/CNE, and protocol exploitation on a variety of software platforms and applications. Our solutions enable the decryption of various encrypted communications, files, and device data and provide both defensive and offensive cyber tools and application capabilities.
Network Systems Engineering
Our network engineers design and develop networks to operate in a resilient, scalable, and secure manner to support 24/7 operations operating in both classified and unclassified environments. We provide security engineering expertise to design, deploy, and support security systems that protect the customers’ information technology assets. These systems include firewalls, Intrusion Detection Systems (IDS)/Intrusion Protection Systems (IPS), network traffic analyzers, vulnerability scanners, and Security Information and Event Management (SIEM) solutions like Splunk.
Enterprise Data Feed Management, Big Data Analytics, & Advanced Analytics
Redhorse develops toolkits to extract key information from digital data, drive innovation for customers, enhance and automate analytic capabilities, and increase knowledge of adversarial threats. We create analytics applications that provide specialists with a “big picture” view of lawfully intercepted network traffic over significant periods of time in support of CNE operations.

CALEA and Lawful interception
Our software performs compliance functions as tasking, mediation, and implementing the CALEA handover interfaces to transport intercept data to law enforcement agencies while ensuring CALEA compliance.

Network Forensics
With our network forensics software, end users can easily view detailed information to answer questions related to a network’s security posture, insider threat activity, and devices present on the network over the past 30 days.

Custom Network Protocol Processing Solutions
Our Growlan data processing framework is a collection of reusable modules that allows us to build custom applications with a reduced time to market and lower price point. We build applications for network forensics, lawful interception, cyber security, and network diagnostics.