Business description of TELOS-CORPORATION from last 10-k form

 
Page 2 of 65

Special Note Regarding Forward-Looking Statements
This annual report contains statements that constitute forward-looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934.  In addition, in the future the Company, and others on its behalf, may make statements that constitute forward-looking statements. Such forward-looking statements may include, without limitation, statements relating to the Company’s plans, objectives or goals; future economic performance or prospects; the potential effect on the Company’s future performance of certain contingencies; and assumptions underlying any such statements.
Words such as “believes,” “anticipates,” “expects,” “intends” and “plans” and similar expressions are intended to identify forward-looking statements but are not the exclusive means of identifying such statements.  The forward-looking statements are and will be based upon management’s then current views and assumptions regarding future events and operating performance and are only applicable as of the dates of such statements.  The Company does not intend to update these forward-looking statements except as may be required by applicable laws.
By their very nature, forward-looking statements involve inherent risks and uncertainties, both general and specific, and risks exist that predictions, forecasts, projections and other outcomes described or implied in forward-looking statements will not be achieved.  The Company cautions you that a number of important factors could cause results to differ materially from the plans, objectives, expectations, estimates and intentions expressed in such forward-looking statements, including without limitation the risks described under the caption “Risk Factors” in this Annual Report on Form 10-K.  You are cautioned not to place undue reliance on the Company’s forward-looking statements.
Item 1.    Busi
Overview
Telos is an information technology leader focused on designing and providing advanced technologies to deliver solutions that empower and protect the world’s most demanding enterprises. We empower our customers with secure solutions that leverage mobile communication and real-time collaboration.  We protect vital assets that include the critical operational and tactical systems of our customers so that they can safely conduct their global missions. Our customer base consists primarily of military, intelligence and civilian agencies of the federal government and NATO allies around the world.
We generate approximately 88.8% of our revenues by delivering these solutions at a fixed price to our customers.  This focus on fixed price delivery has enabled us to significantly reduce life cycle costs for our customers.  We have been able to achieve this by investing in intellectual property development so that we can use automation, when appropriate.
While we were incorporated in 1971, we liquidated and/or sold our original businesses and refocused on delivering secure solutions beginning in 1997.  Our Company includes Telos Corporation, Xacta Corporation, Teloworks, Inc. and a 60% interest in Telos Identity Management Solutions, LLC (“Telos ID”, formerly “TIMS LLC”).  In July 2011, we acquired all of the assets of IT Logistics, Inc. (“ITL”), see Note 15 – Acquisition of IT Logistics, Inc.
We are incorporated in Maryland, and our headquarters are located at 19886 Ashburn Road, Ashburn, VA 20147, and our telephone number is (703) 724-3800.  Our website is www.telos.com.
Our Mission
Our mission is to secure critical assets by protecting communications, systems, networks, and access.
We believe that our customer focus is the foundation of our success to date. We also believe that this focus is critical for the creation of long-term value.
How We Provide Value to Our Customers
We serve our customers by developing solutions that are quickly and efficiently deployed so that our customers have the assurance that they can safely conduct their vital missions around the world.  Some of the key benefits we offer our customers include:
Protecting and Securing Assets. Whether we are guarding access to systems, networks, communications, or people, our solutions work to protect what is most important to today’s security-conscious enterprises.
Applying Specialized Expertise. Our teams of security professionals, such as those we provide to protect the Pentagon’s critical networks, are some of the industry’s most experienced in the design and operation of communications systems that must be reliable and secured 24/7.
Achieving Regulatory Compliance. From embedding the latest security standards in our information assurance software, to complying with network security requirements on a particular military base, our solutions give our customers the confidence in their ability to meet established security regulations.
Page 3 of 65
Ensuring the Reliability of Operations. Our testing is comprehensive, assuring our customers of a dependable product when delivered. Our support is worldwide, extending from helpdesk resources for government agencies throughout the country, to field support overseas.
Leveraging Customers’ Existing Infrastructure. Our pre-deployment assessment of our customers’ environments, ranging from secure network site surveys to evaluations of physical security access, assures our customers of the technical and operational compatibility of our solutions.
Selected Examples of How We Accomplish Our Mission
We protect and enhance the communications of our customers through the development and delivery of our Telos Secure Information eXchange (T-6) platform for unified communication and collaboration.  T-6 includes Telos Automated Message Handling System (“AMHS”), which has been adopted by the Department of Defense to carry all official message traffic and is implemented throughout all branches of the military, the intelligence community and other critical civilian agencies. AMHS is also used by U.S. Central Command to meet its critical organization and communications requirements in the CENTCOM Theater of Operations including Iraq and Afghanistan.
We protect the systems of our customers through the development and delivery of our Xacta IA Manager software (“Xacta”). Our Xacta solution is the dominant provider of continuous certification and is used throughout the Department of Defense, intelligence communities and civilian government.  To date, we have performed over 4,000 certifications and our product has been adopted as the risk management framework for numerous enterprises.
We protect and extend the networks of our customers by developing and delivering over 40,000 high speed, long range, secure tactical wireless network modules providing last mile connectivity between our warfighters around the world and the U.S. Army logistics networks. We also empower our customers with advanced applications that leverage mobile devices and multi-user, multi-touch interfaces to put mission-critical information literally at users’ fingertips.
Through an exclusive subcontractor relationship with Telos ID, we assess, design and deliver identity and access solutions to protect national security assets, people and facilities.  Among these programs is the premier federal identity application, which has issued almost 27,000,000 smart card based secure credentials for active and retired military, military dependents and contractors.  Additionally, we provide near real-time data collection on personnel movement and location information for operating forces, government civil servants and government contractors in specified operational theaters.  This system has captured over 300,000,000 scans with more than 156,000 deployed contractors.
We would not be able to design, deliver, install, and support any of our solutions without our employees. They are a vital element of our success. Our employees know this because we reflect it in their compensation and benefits.
Solutions For Our Customers
Our solution development philosophy involves rapid development and continuous innovation in an effort to keep pace with the dynamic and evolving nature of our customers’ requirements.
Our IT solutions consist of the following:
 
·
Secure Networks – Secure wired and wireless network solutions for Department of Defense (“DoD”) and other federal agencies.  We provide an extensive range of wired and wireless voice, data, and video secure network solutions and mobile application development to support defense and civilian missions.
Information Assurance – Software products and consulting services to automate, streamline, and enforce IT security and risk management processes enterprise-wide.  We offer information assurance consulting services and Xacta brand GRC (governance, risk, and compliance) solutions to protect and defend IT systems, ensuring their availability, integrity, authentication, and confidentiality.
Secure Communications – The next-generation messaging solutions supporting warfighters throughout the world.  Telos Secure Information eXchange (T-6) and the AMHS platform offer secure, automated, Web-based capabilities for distributing and managing enterprise messages formatted for the Defense Messaging System as well as collaborating in real-time through video, text, whiteboarding, and document sharing.
Identity Management – End-to-end logical and physical security from the gate to the network.  Our identity management solutions provide control of physical access to bases, offices, workstations, and other facilities, as well as control of logical access to databases, host systems, and other IT resources.