Presented by Jeremiah SteptoeĠ1:14 – ARMS Cyber is an application and secure container cyber security solution that utilizes moving target defense techniques for applications and DevSecOps pipelines to drastically reduce the likelihood of a successful zero day attack by constantly shuffling the code and thus making vulnerabilities almost impossible to find (radio frequency hopping for software). We enable Organizations to know precisely where their most sensitive data is, who has access to it and how it’s being used. Presented by Gentry LaneĠ1:05 – CyberCentric is an AI-driven data categorization company.
MATCHBOOK AI SOFTWARE
Presented by David GoodmanĠ0:56 – ANOVA Intelligence develops AI/ML-powered, enterprise-scale software to find and attribute APT behavior in critical endpoints at first breach. Authentication ensures secret and secure command and control messaging to remote operating equipment, including vehicles, sensors and munitions. We create hardware and software to authenticate messages and code to and from remote operating equipment. Presented by Antonio EspinosaĠ0:48 – Vitro is a Zero Trust IoT platform. Presented by David ShawĠ0:38 – Corlina is a Trust Security Software System that provides a continuous measure of confidence so that an IoT system is trustworthy with a verifiable immutable record of the integrity of observations made by applications deployed on the trusted IoT System. Presented by Ohad HarlevĠ0:29 – Astrapi: Symbol Waveform Hopping unlike alternative approaches provides secure communications in the time domain to enable advanced persistent SATCOM.
Integration of commercial and government data sources.Edge processing and distributed processing to enable rapid, near real-time analysis and response.The Catalyst Accelerator team invites early-stage companies with innovative technologies pertaining to this call to apply to the Spring 2022 Catalyst Accelerator. Advances in technologies pertaining to how and where data is moved, processed, stored, and secured in a multi-level secure environment are some specific items that are relevant to the USSF future architecture. The USSF is seeking companies with innovative technologies that will accelerate development of this hybrid data architecture and ensure the movement of the data happens for USSF in real time, near-real time.
Combatant Commands need a hybrid data environment to pull, move and combine commercial and public data with private US and Ally government data. The disparate manner in which data is currently being delivered is not keeping pace with tactical timelines of the threat.
Critical to our nation’s space superiority is the tactical/operational operator’s ability to receive and send all-domain data in a consolidated, timely, secure manner in order for national decision makers to be able to confidently observe, orient, decide, and act on the data in real or near-real time. WarpCore), additional capabilities are needed. Although there exist numerous databases (e.g., the Unified Data Library) to store data and capabilities to push the data from these databases to command and control centers and tactical users (e.g. The US Space Force, Combatant Command operators, strategic decision makers, and tactical users need capabilities that can support hybrid data architectures to pull, store, move, analyze, correlate, display and push any kind of data to any user at any given time from any source in space or on earth.