| 
  PORTFOLIO/PROGRAM/PROJECT MANAGEMENT Our Portfolio Management 
              solution offers senior decision makers a complete enterprise 
              solution.  This solution leverages an integrated set of best 
              practices and best-of-breed analysis tools that allow for the:
 
                |  | Selection of investments 
                that have the greatest potential |  |  | Effective program planning 
                and execution, to return the greatest possible value to the 
                business while managing and minimizing risk |  |  | Ongoing governance and 
                active management of the portfolio to ensure the promised value 
                is delivered 
 |  
              Delivering 
              results on time and within budget requires a rare blend of 
              leadership, task visualization, and attention to detail.  Project 
              managers from CipherSync combine all of these elements. They know 
              how to: 
                |  | 
                Identify 
                and manage risks right from the start; |  |  | 
                Define and 
                manage project scope; |  |  | 
                Deliver 
                project results on time and within budget; |  |  | 
                Ensure 
                deliverables meet or exceed user needs; |  |  | 
                Deliver 
                products of high quality; and |  |  | 
                Deliver 
                the benefits that justified your investment. |  The 
              CipherSync project management process supports the complete 
              project life cycle and includes the following steps: 
              Project Initiation and Planning; 
              Project Execution; Project Control; Project Closing. 
  SECURITY SERVICES CipherSync 
              has created a framework for the security objectives of Trustworthy 
              Computing: Secure by Design, Secure by Default, Secure in 
              Deployment, and Communications.  Our services include, but are not 
              limited to:
 
                |  | Building a secure network architecture |  |  | Adding 
                security features |  |  | Reducing vulnerabilities |  |  | Detecting intrusions and violations |  |  | Operational Problems |  |  | Recovering computers that have been compromised |  |  | Coordinating the protection, detection, defense and recovery of 
                critical systems |  |  | Getting accurate information and patches out quickly when 
                vulnerabilities are discovered |  |  | Helping customers understand how to operate their systems 
                securely with tools and prescriptive guides |  |  | Providing warning of new attacks and new best practices that 
                evolve in response to threats and changes in technology |  |  | Security Certification and Accreditation (C&A) |  |  | Compliance (e.g. HIPAA, Sarbanes-Oxley) Security. |  
  ENTERPRISE ARCHITECTURE Our service offerings support the full life-cycle 
              of Enterprise Application Integration, structuring and guiding the 
              transformation of your organization into an agile, streamlined, 
              customer- and partner focused business using Service Oriented 
              Architectures and Business Process Management/Optimization 
              techniques. They include:
 
                |  | EAI 
                Strategy and Planning |  |  | Enterprise Architecture Design |  |  | Architectural Proof of Concept |  |  | Infrastructure Design and Development |  |  | Enterprise Systems Integration |  |  | Migration Support |  
  APPLICATION SERVICES CipherSync's 
              Application Management Service offers a comprehensive life cycle 
              management approach for applications of all types from legacy 
              customer applications to new asos coupon code web-based applications. As the 
              business requirements and priorities change, CipherSync keeps the 
              applications running, up-to-date and evolving over all phases of 
              the life cycle:
 
                |  | Development and Integration |  |  | Ongoing 
                Management and Operation |  |  | Major 
                Enhancements |  |  | Retirement 
                and Replacement |  
               DATA SERVICES CipherSync provides many data and database services related to the 
              user's applications, systems, good business practices and 
              information processing requirements. The data services are 
              designed to optimize date definition, database design, data 
              collection, retention, reporting, and recovery processes utilizing 
              either the Entity-Relationship or the Object Model data 
              methodology.
 There are 
              two major methodologies used to create a data model: the 
              Entity-Relationship (ER) approach and the Object Model. The 
              CipherSync approach using the Entity-Relationship methodology uses 
              the following process: 
                |  | Data 
                Modeling In the Context of Database Design 1. Planning and analysis
 2. 
                Conceptual design
 3. 
                
                Logical design
 4. 
                
                Physical design
 5. 
                
                Implementation
 
 |  |  | Creation of the Data-Model Components 1. 
                Entity-relationship diagram
 2. Data document
 
 |  |