Our Company

AG Grace offers risk management services to provide the guidance and support to select, integrate and automate multiple risk management programs to improve IT governance, risk and compliance across the following services and sectors: Health Care, Information Technology, Finance, Privacy, Supply Chain Management, Cyber Security, Disaster Recovery and Back-Up Solutions.

AG Grace provides 24×7 information technology services and support to our customers, cloud services and integration.  Our employees hold and maintain industry certifications from ITIL, COBIT, ISO, SANS, ISC2, & COMPTIA.  

Developing the Future – Cyber Defense, Security & Intelligence

AG Grace Designs distributed automated and interoperable environments that satisfy 5 key objectives important to our customers: Security, Affordability, Ease of Use, Scalability and Interoperability.

We build secure capabilities into cyber device (computers, software and hardware) configurations that allow them to act preventively or defensively coordinating the response among fixed, mobile or global devices, providing near real time continuous monitoring and reporting. We help our customers thwart attacks in near real time thereby managing risk and building confidence in the integrity of your information and information systems; helping customers comply with federal laws and regulations.

AG Grace helps the Department of the Army achieve its goal to develop, provide, integrate and sustain the logistics and readiness of C4ISR systems and mission command capabilities for joint, interagency and multinational forces worldwide, we are committed to providing a broad array of software development solutions, products and services that foster a secure information technology infrastructure to help protect information and information systems. We take a holistic approach to managing risk to identify and eliminate threats long before they can do damage.

Adaptive Technology – Prevent Instead of React!

AG Grace and our partners have an arsenal of solutions and tools; once deployed provide software integrity protection, defense in depth, secure software provisioning, life cycle management, intrusion prevention, intrusion detection, continuous monitoring and reporting of key security metrics.

We believe that the future of cyber security rests upon the ability of our customers to adapt technologies and capabilities to allow for defensive and preventive courses of action that can be coordinated with other devices within the information technology infrastructure. Cyber defense can be an automated function in the future; meaning that cyber devices must have the ability to communicate in near real time with each other about attacks and have the ability to coordinate with each other in real time to harden the security response and prevent the attack.



DUNS # 788689607 

 UEI #:   NF7UV6N37HP5


519190-All other information services

541511- Custom Computer Programming Services

541512- Computer System Design Services

541513-Computer Facilities Management Services

541519-Other Computer Related Services

541611- Administrative Management and General Management Consulting

541612-Human Resources Consulting Services

541614-Process, Physical Distribution, and Logistics Consulting Services

541618- Other Management Consulting Services

541690- Other Scientific and Technical Consulting Services

541990-All other professional and scientific technical services

561110- Office Administrative Services

561311-Employment Placement Agencies

561320- Temporary Help Services

611420- Computer Training

611430- Professional and Management Development Training

611669- All other miscellaneous Schools and Instruction

611710- Educational Support Services 

Small Business Categories:

  • Woman Owned Small Business (WoSB)
  • Service-Disabled Veteran Owned Small Business (SDVoSB) 
  • Small Disadvantaged Business (SDB) 
  • Small Business (SB)

Security Services – Our Focus and Specialization

Our team includes security professionals possess DOD 8570.01-M Certifications and are experienced in:

  • Project Management
  • Information Assurance
  • Certification and Accreditation
  • Key Management
  • PKI
  • Risk Assessment
  • Security Engineering
  • Security Policy Management
  • Vulnerability Assessment
  • Penetration Testing
  • Risk Management
  • Configuration Management
  • Security Testing and Evaluation 
  • Disaster Recovery/Business Continuity
  • Incident Detection, Response & Reporting


  • FISMA Audit and Compliance