PLEX Solutions
Cybersecurity services for DoD, IC, and commercial clients

PLEX Solutions
Cybersecurity services for DoD, IC, and commercial clients
450+ Data Points Per Product and Company
Track competitive landscapes, evaluate vendor risk for investments, or find the right security stack for your clients.
PLEX Solutions Description
PLEX Solutions, LLC operates two main divisions: PLEX Solutions and PLEX Cyber. The company provides cybersecurity services and solutions primarily to the Department of Defense (DoD), Intelligence Community (IC), and commercial industry clients ranging from Fortune 100 companies to small businesses. PLEX Cyber focuses on offensive and defensive cybersecurity capabilities. The team includes subject matter experts in software, hardware, radio frequency, vulnerability assessment, reverse engineering, exploit development, and penetration testing of networks, systems, and devices. They identify Advanced Persistent Threat (APT) attacks within client networks and create security barriers through custom solutions. The team competes annually in the USAF Space Security Challenge (Hack-A-Sat) with consistent top 10 finishes. PLEX Solutions provides systems engineering, mission engineering, and cyber operations support to government and defense clients. Their work includes network defense, security enforcement, and engineering support for intelligence and special operations platforms. The company maintains expertise in cryptologic engineering, ISR platforms including UAV intelligence systems, and cyber warfare operations. The company was founded by Paul Weidow and Stan Nolen, both with extensive backgrounds in aerospace, intelligence, and cybersecurity. Leadership includes veterans from IBM, HPE, NTT, and military cyber warfare units. Services span consulting, managed security, digital forensics and incident response (DFIR), application security, GRC, penetration testing, SOC consulting, and enterprise security architecture.
POPULAR
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox