Skip to content Arcus
Orchestration. Validation. Collaboration. Protection.

Take your cloud to the edge.

Orchestration.

Be secure and productive in any cloud

Arcus delivers security and orchestration solutions simultaneously across any public, private, or hybrid clouds and platforms, so you don't get locked in. Connect existing tools and fill in the gaps in your flow. Take advantage of Arcus to make hard tasks easy, repeatable, and reliable.

Orchestration image

Validation.

Operational success without the overhead

Arcus gives your organization easy access to a library of certified devops, testing, and security automation products as well as the tools to build your own. Assess functionality, performance, and vulnerabilities in real time as part of every workflow.

Validation image

Collaboration.

Say goodbye to organizational silos

Arcus is built with a disciplined system and development design at its core, ensuring development, security, and operations are in sync from the start. Access systems and services in the cloud, fast and easy, right from your browser.

Collaboration image

Protection.

Automated, leading-edge security measures

Arcus delivers secure, separated environments that are both productive and safe. All the monitoring and protection without the disruptions and delays. Users can develop, test, and field systems with confidence.

Protection image

Full RMF accreditation with overlays

Multiple classification levels

PKI and CAC support

End-to-end encryption

DISA STIG and Cloud SRG compliant

Security image
Don't just take our word for it
Open quote Close quote
At your service

Let us do the heavy lifting

For those organizations that lack the time or resources to 'do it yourself', the Arcus team offers a full set of professional services to assist in getting things done.

Asset Development

The Arcus team can provide your team with purpose-built, automated software assets; moreover, the Arcus team can train users to develop and field applications of their own.

Cloud Migration

Arcus allows users to securely and seamlessly transition from physical to virtual, from virtual to container, and from one cloud to another, without sacrificing your favorite tools.

Event Support

Arcus is ready and able to support complex events in real-time with event management, evaluation support, and mission expertise.

Launchpad for success stories

Continuous integration

Running a PlugTest event

Cyber operations

As part of their Continuous Integration (CI) workflow, developers check in code to a DoD Bitbucket site throughout the day. A nightly Jenkins job pulls day's code and puts the software and container artifacts in the Arcus library. This process, which is all automated thanks to the Arcus ReST API, produces twenty Deployment Runs, many of which also include an ElasticTest case. Once the Deployment Runs are complete, the systems are released, and the results posted back – becoming issues in JIRA as tickets, and summary results in a Confluence Wiki. As a result, each morning the Project Manager and their team can see the PASS/FAIL results for hundreds of criteria. The team was able to reduce their release cycle by 75% and bugs by 95% after starting this flow.
As part of an Air Force PlugTest event, Arcus stood up multiple cyber-soldier defensive cyber operations (DCO) environments with data input from three base installations. These environments – sixty machines, multiple networks, extensive compute resources – typically take months to build in a physical space, and lack the flexibility to effectively add or remove components as needed. But with Arcus, a dozen vendors worked in parallel, each with their own private environment, and the ability to quickly and painlessly redeploy in the case of failure. The program office was also able to save the assets and data created during the event, and deploy new environments as virtual training grounds.
Arcus has played a key support role for multiple DoD Cyber Units’ and Red Teams’ efforts by providing environments in which to conduct non-destructive and destructive penetration tests; malware assessments; training; and operations. Once these activities are completed, the compromised systems are released, and the resources reconfigured, and redeployed – minimizing down time without losing data. Activities take place in segregated resource pools with the necessary isolation and protection to ensure the safety of the entire community. Automation plays a key role in allowing the operators to pick back up where they left off. And the resources available - virtual machines, containers, physical systems, networks, storage, etc. - allow them to create completely accurate representations of the offensive and defensive tools needed.
Rocketship

Command the power of the Cloud