Contact Us

Use the form on the right to contact us.

150 Mount Airy Road 331
Basking Ridge, NJ 07920

(908) 748-2000

Vencore Labs delivers transformative results for Research, Engineering, and Technology Products. We are more than a research lab serving many markets including Telecommunications, Energy,  Financial, Life Sciences, Government and Defense.

Cyber Security

Subhead Can Go Here

CYBER SECURITY: More Than A Research Lab.  
Solutions for Real World Impact. 

Vencore Labs is bringing the following next generation products to market:


Z-Day Enterprise Security System defeats the most serious of malware-based IT attacks that foil existing security solutions. Its novel integration of application-, host-, and enterprise-level monitoring across a spectrum of thematic, behavioral, and social activities enables extremely effective malware activity detection with a false positive rate of less than one per day for the enterprise. The system has been independently tested and shown to defeat nation-state quality zero-day attacks and to limit maximal enterprise infection to less than one percent while recovering infected systems within six minutes.


IP assure is a true breakthrough in IP Network management.  This customizable, one-of-a-kind software protects your mission-critical IP traffic by non-intrusively analyzing the entire network and alerting you to problems that could compromise security, regulatory compliance, and availability. 


Configuration is the DNA of cyber infrastructure. Due to the large gap between end-to-end requirements and detailed configurations, a large number of configuration errors are made, resulting in 50-80% of network vulnerabilities and downtime. Our researchers have developed the Distributed, Assured and Dynamic Configuration (DADC) system to address these problems through automated configuration synthesis and repair, visualization and verification, and moving-target defense through configuration space randomization.

See DADC in action 


CyberVAN provides sophisticated capabilities for cyber experimentation in tactical as well as strategic environments. It enables arbitrary applications (including tactical as well as enterprise applications) running on Xen-based virtual machines (VMs) to communicate transparently via a simulated network implemented in OPNET, QualNet, ns-2, or ns-3.

See CyberVAN in action 

ISAAC: Information Systems Access and Authorization Center

Organizations of all types are requiring increasingly sophisticated & secure tools to manage access to their information systems and applications. The Information Systems Access and Authorization Center (ISAAC) meets that need via a centralized, web-based, intuitive interface that streamlines the definition and maintenance of access and authorization requirements for essentially any information system or application.

Read more about ISAAC