Dcode has worked with more than 100 tech companies across areas like cybersecurity, space tech, analytics, and artificial intelligence, driving more than 200 new implementations of commercial technology in government and over $100 million in federal contracts.
Request an intro

Alumni Spotlight & News
- This company is using drones to replant forests devastated by wildfires
- Vertosoft & DataRobot Win OTA to Advance Federal Financial Transactions
- Air Force bases look to facial recognition to secure entry
- Slingshot Aerospace Raises $8 Million in Series A Funds Led by ATX Ventures
- Amp Human Receives $1.5M Phase II Small Business Innovation Research Contract from US Air Force
- Ion Channel Accelerates Software Logistics and Supply Chain Security for High Assurance Customers
- This cybersecurity company scaled in the federal market fast — here’s how
Our Alumni
-
OutSystems
OutSystems is a low-code platform for developing web and mobile applications at scale that streamline operational processes and workflows and enable greater data accuracy. The platform allows for visual development of applications and easy integration into legacy systems, all while adhering to safe development practices as application models are automatically translated into secure code patterns.
Use Cases
- Mobile and Web application development for citizen and employee facing applications
- Develop new user interfaces for legacy software systems
- Connect internal systems and applications to link data silos across the enterprise
-
Phylum
Phylum helps developers uncover the threats and vulnerabilities behind third-party software, libraries, and packages. Leveraging large-scale data mining across the software ecosystems, machine learning, and heuristic analysis, Phylum continuously identifies, assesses, and reports on threats and vulnerabilities rooted in the software supply chain beyond traditional reactive vulnerability analysis tools.
Use Cases
- Library and package scanning prior to software build that identifies vulnerabilities through software dependency analysis
- Software scanning when moving applications across networks
-
Panaseer
Panaseer, the first Continuous Controls Monitoring (CCM) platform for enterprise security, enables organizations to identify the risks that matter most. Identifying gaps in controls coverage, aligning security with frameworks and substantiating regulatory compliance, Panaseer’s platform aggregates data from security tools across the enterprise and presents them in sleek dashboards for the user, showing every asset, application, user and database in real-time. Panaseer’s automated reports map to the organization’s structure to prioritize risk based on impact, reduce reporting time and tailor insights to stakeholders at every level, enhancing decision-making from leadership to the analyst.
Use Cases
- Proactively identify security gaps with continuous controls monitoring
- Automated compliance for meeting NIST standards
-
Scale
Scale’s AI technologies are able to sift through extraordinary amounts of high quality data. Scales technology works to label machine learning and algorithms, ensuring that accuracy is above a certain threshold. Scale has expanded past computer vision and perception, to document understanding, ADP, Booking.com, analyzing text, analyzing audio, even across multiple languages.
Use Cases
- Imagery analysis (satellite/medical/etc…)
- Document & text processing
- Audio processing
- Autonomous vehicles
- Robotics and manufacturing
- Agricultural review
-
Sepio Systems
Sepio is a leader in Rogue Device Mitigation (RDM) and the developer of Sepio Prime, a SaaS or on-premise solution for protecting organizations from hardware-based attacks and threats. Sepio Prime provides security teams with full visibility into their hardware assets and behavior in real-time. Leveraging a combination of physical fingerprinting technology and device behavior analytics, Sepio’s software-only solution offers instant detection and response to any threat or breach attempt coming from a manipulated or infected element.
Use Cases
- Visibility and transparency into your hardware assets
- Insider threat via rogue or malicious devices
- Understanding supply chain risk of hardware asset purchases
-
SecurityScorecard
SecurityScorecard’s patented rating technology is used by more than 1,000 organizations for enterprise and third-party risk management, board reporting, and cyber insurance underwriting. SecurityScorecard continues to make the world a safer place by transforming the way companies understand, improve, and communicate cybersecurity risk to their boards, employees, and vendors.
Use Cases
- Ensure proper cybersecurity hygiene by efficiently validating and remediating your organization’s security issues
- Third party and software supply chain risk monitoring
- Enable cybersecurity compliance, audit remediation, and attestation with evolving regulations and government mandates
-
Privitar
Privitar is a data privacy management platform that enables data-driven enterprises to de-identify data, minimize risk, and achieve regulatory compliance while freeing them to use advanced analytics, artificial intelligence, and machine learning to extract the maximum value from the sensitive personal data they collect, manage, and use.
Use Cases:
- De-identify data in motion using centrally managed, reusable privacy policies
- Safely and securely provision data for cloud migration
- Protect sensitive data and enable secure information sharing between government entities
-
Remediant
Remediant is a cybersecurity startup focused on the next-generation Privileged Access Management (PAM) solution. Remediant’s product SecureONE takes a completely new approach, continuously monitoring for changes and dynamically allocating privileged access without installing software agents. Nothing else makes PAM this easy, scalable, or secure.
Use Cases
- Streamline and improve security of ICAM (Identity, Security, Credential Access Management) efforts across IT programs.
- Ensure that government developers have secure just-in-time access to only the IT infrastructure they need at the moment and remove access when it’s no longer necessary.
- Ensure that military personnel who PCS do not retain access to IT systems upon departure.
-
MinerEye
MinerEye uses its proprietary Interpretive AITM technology to automatically identify and label mission sensitive data to enable effective collaboration and access control across multiple cloud instances and environments. By continuously and automatically scanning, identifying and categorizing sensitive data, MinerEye improves information governance, enhances data protection and reduces risk and operational costs.
Use Cases:
- Automatically identify and label mission sensitive data to enable effective collaboration and access control
- Prevent data spillage and protect against insider threat by continuous discovery of personal information to redact, encrypt, move, or delete based on mission policy
-
HYAS
HYAS enables enterprises to detect and mitigate cyber risks before attacks happen and identify the adversaries behind them. With HYAS’ exclusive data sources and non-traditional collection mechanisms, HYAS Protect and HYAS Insight keep enterprises safe, find attackers and fraudsters, and identify full attribution. HYAS allows enterprises to focus on the bad actors that are attacking them, not just their attacks, and change their entire security posture from reactive to proactive.
Use Cases
- Threat intelligence with high fidelity signal to proactively counter cyber threats
- Proactive security by blocking identified risky and malicious points of agency infrastructure
- Forensics, incident, and cyber fraud investigations
-
HyperScience
HyperScience’s powerful, Machine Learning solution helps organizations quickly and accurately index and extract information from any document to feed structured data into downstream systems. The HyperScience technology helps reduce dependency on costly, manual processes. It also helps improve customer service and drive new business
Use Cases
- High quality and fast document digitization for:
- Compliance
- Data Analysis
- Storage costs savings
- High quality and fast document digitization for:
-
Imandra
Imandra’s groundbreaking AI helps ensure the algorithms we rely on are safe, explainable and fair. Imandra is a cloud-scale automated reasoning system bringing rigor and governance to the world’s most critical algorithms.
Use Cases
- Intelligence analysis
- Complex system performance analysis and testing
- AI algorithm analysis
- Decision Support
-
Lynq
Lynq changes how devices are connected enabling devices that connect peer-to-peer for miles without networks or infrastructure, in a manner that’s flexible and uniquely difficult to intercept and detect. Our technology adds mobility, security and network independence to data — extending the edge of connectivity, while allowing freedom from it. Data that spans from location to messages, sensor and any low-bandwidth data. Lynq’s licensable software can be integrated into any device and each is able to create their own secure, decentralized network capable of communicating over miles with any device “connected by Lynq”, the foundation for an ecosystem.
Use Cases- Search and rescue
- Battlefield management
- Location tracking for trainees (examples: basic training, SOF training)
-
Sema
Sema is a SaaS solution that evaluates the quality of software, quality of developers, and the contributions of developers to software quality. Sema is transforming software maintenance so organizations can focus on creating the future, not fixing the past. These solutions provide unprecedented visibility into an organization’s code and development teams, so they can make the right choices, faster.
Use Cases
- Managing and evaluating third party development shops and services
- Providing insight and transparency into development efforts
- Technical due diligence and M&As,: understand code base at onset of development projects
-
Sequentum
Sequentum provides a holistic approach to web data extraction in order to meld the art and science of sourcing data from the public web. Sequentum provides customers with publicly sourced web data of the highest quality & enables them to transform this data into actionable business insights while adhering to privacy, security & compliance regulations.
Use Cases
- Extracts insights from web data and transform it into actionable data
-
Teal Drones
Teal Drones is a US based Drone Manufacturer, which focuses on building out the software side. The Teal platform (combination of hardware and software), runs their own SDK. The combination of being made in the USA, exhilarating speed, and easy swap repairs make these drones useful for various applications.
Use Cases
- Warfighter intelligence, surveillance, and reconnaissance for operators in contested environments
- Infrastructure inspection
- Emergency response providing continuous situational awareness
-
Trueface
Trueface has developed a suite of SDK’s and a dockerized container solution that harnesses the powers of machine learning and artificial intelligence to transform camera data into actionable intelligence. Facial recognition, weapon detection and age verification technologies are all easily deployable on your infrastructure, creating safer and smarter environments for your customers, employees, guests and more.
Use Cases
- Facility access control
- Identifying persons of interest
- Weapons detection via security cameras
-
Fraym
Fraym data is created using proprietary artificial intelligence and machine learning algorithms that weave together survey data, remote sensing data, and satellite imagery. The output is human-centric, contextual data that adds an entirely new dimension to analyses and reporting. This innovative approach delivers cutting-edge data with unprecedented accuracy and speed.
Use Cases- Development: predict epidemiology, outbreaks, climate change, famine, and other events
- Predict unrest and disaster
- Understand sentiment of foreign influence, media consumption
-
Constellation
Constellation is the world’s only Blockchain technology designed for Big Data, providing infrastructure for an open decentralized data marketplace and an enterprise grade software solution for data provenance and integrity. It’s secure, cost-effective, scalable, and easy to integrate. Furthermore, Constellation provides data dependency graphs on a decentralized DAG (directed acyclic graph) network – an evolution of existing blockchain technologies. The solution not only secures data pipelines through encryption but creates an audit trail of data downstream to enable a live overview of the status of any data source
Use Cases- Secure system interoperability
- Multi-domain command and control (MDC2)
- Data management, validation, and logistics
- Prevents spoofing and corruption of incoming data streams
-
Builder
Builder’s turnkey platform builds, runs and scales just about anything customers can think of. Builder’s human-assisted AI can build tailor-made software using the collective knowledge of what has been built before; an assembly line connects reusable features with specialist creators. Builder allows customers to build an app fast, without the usual risks – guaranteed costs, set timelines and no techie skills needed. They believe that building software should be as easy as ordering pizza.
Use Cases
- Custom app development
-
Nymbl Systems
Nymbl Systems is a multipurpose practice management solution. Nymbl Systems platform leverages the latest technology to solve complex problems by simplifying work flows which reduces training, times spent in the software, and reporting.
Use Cases
- Healthcare management
- Workflow management
-
Amp Human
Amp Human creates the first and only pre-workout product that gives your body more bicarb, a natural electrolyte, to help push your limits. PR Lotion is applied before strenuous physical activity to push your body further and recover faster so that individuals can come back strong the next day.
Use Cases
- Reducing recovery time after strenuous activity
- Increasing physical performance
- Improving readiness levels with decreased fitness failures
-
FocusMotion
FocusMotion creates data-driven orthopedic recovery solutions to automatically assess and monitor pre- and post-operative patients, building the deep learning and diagnostic AI that will transform human recovery.
Use Cases
- Improving orthotic patient care
-
Uptake
Uptake is an industrial AI software company that aims to help companies digitally transform with open, purpose-built software. Built around a foundation of data science and machine learning, Uptake’s core products include an Asset Performance Management application and a fully managed platform that enables companies to identify systems/equipment that are at risk of malfunctioning before they do. Uptake’s technology is sensor agnostic and can analyze anything with gears or torque.
Use Cases
- Improve uptime and readiness through real-time access into location and health of assets
- Military asset awareness
-
Trifacta
Trifacta provides software that helps individuals and organizations more efficiently explore, transform, and join together diverse data for analysis. Whether you’re working with files on a desktop, disparate data in the cloud, or within large-scale data lake environments, Trifacta will accelerate the process of getting data ready to use.
Use Cases
- Data wrangling for:
- Audit, financial, compliance
- Scientific research
- Intelligence and national security
-
Thresher
Thresher helps organizations find high-value signal hidden in the noisy world of human-generated text data. Thresher helps data analysts and scientists build better datasets by identifying content that is hidden from standard search approaches or at risk for removal. Better data leads to better analysis, and better analysis leads to better decisions. At the core of Thresher’s offering is a query builder that embraces the strengths of keywords while mitigating their weaknesses through machine learning customized for each data set and each user.
Use Cases
- Support the development of keywords for building intelligence monitoring models in the intelligence community
- Enable agencies to better understand user discussions around service delivery within HHS, VA, and others
-
ThoughtSpot
ThoughtSpot makes it easy for anyone to get answers from agency data in seconds. Rather than relying on reports or dashboards, ThoughtSpot brings Google-like simplicity to enterprise data: simply search to analyze your data and get automated insights with a single click. ThoughtSpot also auto-analyzes your data to identify outliers or anomalies, putting the power of 1000 analysts in your hands.
Use Cases
- Workflow Analytics and enable data driven human capital decision making
- Enable supply chain analytics
-
Tamr
Tamr automates processes to clean, unify, and connect data that is siloed across the enterprise to optimize key decisions. Tamr’s enterprise data preparation platform uses machine learning with human-guided input to automate the mastering and organization of an enterprise’s data (suppliers, events, programs, transactions, etc.).
Use Cases
- Quickly generate a complete geographic view of human resources
- Optimize spend and reduce risk in the procurement supply chain by analyzing supplier data and procurement operations
-
StreamSets
StreamSets provides the industry’s only DataOps platform that enables companies to build, execute, operate, and protect the data-flows that drive pervasive analytics. It enables enterprises to manage their data movement as a continuous ingestion practice.
Use Cases
- Ingest data at scale quickly and easily across data sources
- Manage and map data flows and data pipelines through a simple UI
- Protect sensitive data in-stream
- Collected data from IoT sensors and edge servers
-
Stardog
Stardog is an enterprise knowledge graph platform that allows customers to query massive, disparate, heterogeneous data regardless of structure with simplicity of implementation. It removes the hindrances of siloed datasets. Stardog’s enterprise customers include Fortune 500 companies in finance, healthcare, life sciences, energy, media, and government.
Use Cases
- Query data across siloed databases without need to ETL:
- Share and analyze scientific and financial data
- Identify fraudulent patterns
-
Pathmind
Pathmind is an enterprise software company that developed the world’s first open-source, distributed, commercial-grade deep-learning framework for Java: Deeplearning4j.org. Pathmind allows organizations to develop AI-based applications that analyze media, perform image and sound recognition, and recognize complex data patterns.
Use Cases
- Automate detection of fraud and external cybercrime attacks on federal agency IT infrastructure
- Drive applications based on the need for detailed image recognition
- Identify anomalies in behavior of internal actors to prevent sensitive information leaks
-
OmniSci
OmniSci offers a data analytics platform optimized for GPUs to handle data at size and scale. The OmniSci SQL engine dynamically compiles SQL to run across multiple GPUs and CPUs making it orders-of-magnitude faster than other systems, and allowing users to get answers from their data without waiting. OmniSci bridges the divide between traditional business intelligence tools (BI) and geographic information systems (GIS), making location intelligence a first-class citizen of big data analytics. Analysts can now ask questions of volumes of geospatial data to gain new location-insights.
Use Cases
- Geospatial Rendering – Real-time operational analytics for large quantities of sensor data
- Investigative Analytics – Immediate and interactive visualizations to identify anomalies and recognize patterns’
- Real-time logistics and process management – Manage massive caseloads, workflows, and assets at scale
-
NuCypher
NuCypher is a comprehensive encryption layer that sits across an organization’s big data platforms (Hadoop, Kafka, Spark), whether on-premises or in the cloud. NuCypher uses proxy re-encryption to lift more enterprise big data into the cloud and can support agency CIOs in the challenge of securing many disparate data systems simultaneously.
Use Cases
- Data security in big data applications
- Cloud transformation and security
- Secure data sharing and transfer
- Data governance and compliance
-
NexLP
NexLP provides a predictive intelligence software solution that turns electronic data into patterns and stories. Using natural language processing (NLP) and machine learning, NexLP turns disparate, unstructured data – including email communications, business chat messages, contracts and legal documents – into meaningful insight that can be used to make decisions.
Use Cases
- Insider threat detection
- Utilize natural language processing to analyze documents and social media activity for intelligence monitoring
-
New Relic
New Relic offers a SaaS Platform that enables customers to track changes across the breadth of an organization’s apps and services with clarity and full context. The New Relic user interface provides a single, comprehensive view of a customer’s stack—every change, every second, in full context. New Relic also offers mobile monitoring solutions for iOS and Android applications.
Use Cases
- Tracking performance and user experience across a variety of platforms and web environments to better understand public citizen engagement and provide improved service delivery
- Tracking performance metrics of internal government services via web platforms provided by agencies such as GSA and TTS
-
Mythic
Mythic has developed the Intelligence Processing Unit (IPU) which allows AI processing at the edge with significantly lower power and higher throughput than traditional CPU or GPU computing. By leveraging Mythic’s advanced in-memory computation, this will enable drones, devices, and more to leverage AI seamlessly at the edge and in low power or disconnected environment.
Use Cases
- Existing Deep Learning Model to operate on high resolution data stream near the edge
- Increased efficiency of security workforce or for unattended feeds
- FMV, Video or Imagery analysts in the field requiring rapid automated analysis of imagery close to the sensors they operate
-
MARK Labs
MARK Labs was founded in 2015 with the goal of quantifying social impact data with AI technology. MARK Labs offers solutions to charity organizations and foundations to enable them to measure the social impact and productiveness of grants, awards, and charity programs. Organizations can then track and quantify their impact to assess future investments.
Use Cases
- Track grants to ensure an impact is being made
- Create KPIs and track social programs executed by the government
-
Ionic Security
Ionic Security provides consistent data access, control, and protection to unstructured and structured data across any repository or device, on-premise or in the cloud. Through an attribute-based enterprise-defined policy, Ionic’s tech confirms that each use of data is authorized, allowing users to create and share data without forfeiting control. Its zero-trust framework protects the data itself and provides a single panel of control enabling management between clouds.
Use Cases
- Secure and controlled data sharing
- Data protection across multi-cloud environments
- Secure IoT data transmission and access
-
Ion Channel
Ion Channel is a software supply-chain risk-management platform to secure enterprise development and operations. Developed for national defense, Ion Channel allows CISOs and engineering teams to automate governance as software is built and automate actions based on live data. Ion Channel runs in CI/CD pipelines and can monitor and deliver updated components to an S3 bucket.
Use Cases
- Light-lift security automation within a CI/CD pipeline
- Continuous monitoring and assurance of third-party components and open source software
- Speed to ATO – pre-populate compliance controls for software
- Enable DevOps across air-gapped networks
-
InterKn
InterKn provides real-time data on technology IP, investments, acquisitions, and trends in customizable dashboards. InterKn’s award data helps clients find technological innovation opportunities, identify technology trends, and plan strategy around partnerships/investments/acquisition of these start-ups.
Use Cases
- Enable DoD clients to identify where research agencies might be spending money on defense research projects
- Allow innovation centers at federal agencies to identify contract and funding for new technologies
-
identitii
identitii allows financial institutions to enrich payment messages with detailed information about actors and purpose. Leveraging blockchain technology, identitii can provide a data rich secure token to any information exchange. Think of this as the unique ‘identity’ of the transaction and it can be utilized in non-financial use cases.
Use Cases
- Secure and sensitive information exchange
- Fraud prevention
- Identity verification
- Secure document transfer
- Electronic health records
- Supply chain management
- Employee records
-
HYPR
HYPR is a decentralized authentication platform that enables consumers and employees to securely and seamlessly access mobile, web, and IoT applications while increasing the cost for potential attackers. Millions of users rely on HYPR, leveraging FIDO-Certified PKI architecture, to eliminate credential reuse, enhance user experience, and enable true passwordless security.
Use Cases
- Authentication for government employee and workforce access
- Authentication for citizen and public-facing access
-
Hashicorp
HashiCorp enables organizations to provision, secure, connect, and run any infrastructure for any application. HashiCorp’s suite of open source tools including Terraform, Vault, Consul, and Nomad allow developers and security professionals to maintain, provision, and ensure compliance across distributed infrastructure.
Use Cases
- Security and credential management across all infrastructure and applications
- Manage hybrid IT from a single pane of glass
- Automate compliance with NIST, HIPAA, FISMA, etc.
- Enable DevSecOps and simple, compliant deployment and maintenance of cloud infrastructure
-
GridGain
GridGain is an in-memory computing platform, built on Apache Ignite, which dramatically accelerates and scales existing data-intensive applications across a distributed computing architecture. The comprehensive in-memory computing solutions includes an in-memory data grid, in-memory database, a streaming analytics engine, and a machine learning framework. The next generation GridGain platform can function as an in-memory data grid or as a memory-centric database, combining the speed of in-memory computing with the durability of disk-based storage.
Use Cases
- Speed analytics for intelligence/defense/homeland security use cases
- Monitor fraud/waste/abuse and cyber threats at scale
- Manage increasing influx of IoT and sensor data
- Boost performance of citizen-facing legacy databases
-
Gravitational
Gravitational offers solutions to securely deploy and manage applications. Teleport, its open source privileged access management solution, allows users to securely access remote servers across public and private clouds from any device or location while meeting strict compliance requirements. Teleport provides a seamless, unified solution for use across all teams while logging operational actions and recording interactive sessions across an infrastructure.
Use Cases
- Secure and ensure compliance in multi-cloud and hybrid environments
- Visibility into access and behavior of users who access agency infrastructure behind firewalls and on personal devices
- Federated server access permissions across multiple organizations
-
GraphGrid
GraphGrid is a fully managed and securely hosted graph data platform built around Neo4j to deliver efficient data source integration and powerful graph algorithms for master data reconciliation, recommendations, analytics and other use cases through high performance unmanaged extensions. This enables you to maximize the advantage provided by the core Neo4j graph database APIs while still building your applications with your preferred language driver.
Use Cases
- Predictive Health: Lowering veteran suicide rates by correlating mental health factors to identify individuals who may need additional support
- Cyber and Threat Reduction: Understanding the cause of a cyber attack to predict the next occurrence and reduce the odds of it happening again
-
GovReady
GovReady automates and accelerates the federal compliance process for IT systems through its unique assessment engine that both teaches and gathers data. GovReadyQ, built for enterprises, as well as GovReady’s set of automation tools designed to kickstart compliance, guides teams step-by-step through the GRC process to build secure and compliant IT systems.
Use Cases
- Automated management for compliance awareness and documentation
- Online, interactive collaborative database-backed compliance assessment questionnaires
- Drastically reduce time to prepare ATO packages for agencies migrating many systems to cloud
-
Fugue
Fugue’s cloud infrastructure governance solution enforces security and compliance policies across an organization to ensure that an enterprise’s cloud resources are always provisioned according to a single source of truth — and stay that way throughout the lifetime of the organization. Fugue provides automated remediation in near real-time by reverting any infrastructure change back to the “known good state.”
Use Cases
- Support any agency managing cloud infrastructure or going through cloud migration
- Enable DevSecOps
-
Expanse
What is your system of record for public-facing assets? Expanse enables IT Ops teams to know what external assets they own and where they are so that Security teams can fully assess their attack surface to know when and where they are at risk. Using patented technologies and state-of-the-art tools in deep data structuring and analytics, Expanse’s Global Internet Sensing platform collects data from the world’s Internet connected devices, turns that data into knowledge, and organizes it to help organizations understand and secure their networks.
Use Cases
- Supply chain risk assessment
- Network security to identify vulnerabilities for cyber attacks
-
RedLock
RedLock provides threat defense across cloud environments and helps organizations ensure compliance, govern security, and enable security operations. The RedLock Cloud 360 platform uses AI to correlate disparate security datasets including network traffic, user activities, risky configurations, hosts and container vulnerabilities, and threat intelligence, to provide a unified view of risks across fragmented cloud environments.
Use Cases
- Continuous monitoring and compliance assurance for workloads running in Public Cloud
- SOC enablement for Public Cloud
- Security governance and configuration management database for Public Cloud
- Visibility across multi-cloud environments
-
Everlaw
Everlaw is a cloud-only eDiscovery platform for document analysis offering robust features, beginning at data ingestion and extending through review, collaboration, and production. Everlaw is accessible to users with an internet connection and modern web browser on nearly any device. The company was founded as a plaintiff’s side solution, solving the most challenging hardships experienced in electronic discovery, like combing through massive document dumps on a budget, engineering around the receipt of poorly structured data, and effective case collaboration across multiple law firms.
Use Cases
- Support Department of Justice attorneys in eDiscovery and litigation with AI-powered repositories for key case evidence
- Empower government agencies to respond to FOIA requests more quickly through AI powered tools
-
RiskIQ
RiskIQ provides comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence. RiskIQ allows enterprises to gain unified insight and control over web, social, and mobile exposures. The platform combines advanced internet data reconnaissance and analytics to expedite investigations, understand attack surfaces, assess risk, and take action against digital threats.
Use Cases:
- Train and enable SOC analysts, threat hunt teams, digital forensics, etc.
- Map threat actors and supplier networks
- Define and secure your network perimeter or ‘digital attack surface’
-
Contrast Security
Contrast Security provides security technology that enables software applications to protect themselves against cyberattacks, heralding a new era of self-protecting software. Contrast’s patented deep security instrumentation enables accurate analysis and protection of an entire application portfolio, without disruptive scanning or expensive security experts.
Use Cases
- Allow software engineers to do their own application security analyses
- Provide both software assessments and protection software
-
Shape Security
Shape Security detects and deflects against malicious automated cyber-attacks on web and mobile applications in real-time by monitoring and analyzing user interaction data. With a highly flexible deployment capability and an AI technology that continuously discovers new attack signals while deploying countermeasures autonomously, Shape Security’s platform currently protects over 1.5 billion user accounts and has deflected over $1B in fraud losses.
Use Cases
- Prevent account takeover at point of breach
- Detect and prevent account creation attacks
- Prevent manual fraud
-
ChromaWay
ChromaWay has a complete open source enterprise platform that combines the best of blockchain technology with the scale of databases. ChromaWay’s permissioned, consortium blockchain solutions are a strong fit for the high security, privacy, and reliability environment required by government agencies. ChromaWay’s product solutions are compatible with relational databases prevalent in the federal government space.
Use Cases
- Supply chain management
- Smart contracts
- Records management
- Secure data sharing and transfer
- Electronic health records
- Identity management
-
Sumo Logic
Sumo Logic provides a secure, cloud-based service for logistics and metrics management for modern applications, providing real-time analytics and insights. Sumo Logic delivers a cloud-native, real-time machine data analytics platform that provides continuous insights across build, run, and secure disciplines for modern applications.
Use Cases
- Improve threat identification and time to remediation by 90% through single-pane of glass across all machine data
- Improve signal-to-noise ratio with machine learning powered insights
- Provide machine data insights for security, operations, and development teams from one platform
- Cost-effective and scalable analytics for cloud, hybrid, and multi-cloud environments
-
Virtru
Virtru provides easy end-to-end encryption of emails and files. The Virtru Data Protection Platform and all Virtru-enabled applications are built on Trusted Data Format (TDF), an open standard for self-protecting data. Virtru can protect and encrypt any data type and apply fine-grained access control no matter how or where data is shared.
Use Cases
- User-friendly end-to-end email and file encryption with access and policy rules
- Data access control (revocation, expiration, forward control, audit)
- Help agencies address CDM and NIST CUI data protection
- Ensure email and file transfer compliance with CJIS, EAR, HIPAA, PII, GDPR, etc.
-
Wickr
Wickr is an ephemeral communication platform built to protect and expire highly-sensitive forward communication, allowing users to securely collaborate with teams or the millions of Wickr users around the globe with end-to-end encrypted file sharing, messaging, voice/video calling and admin controls across any communication device, IoT, drone or application.
Use Cases
- Secure VTC desktop and mobile
- Crisis communications and incident response
- Retrieve IoT sensor data securely
-
CircleCI
CircleCI’s continuous integration and delivery platform helps software teams rapidly release code with confidence by automating the build, test, and deploy process. Velocity is critical for software teams in today’s competitive landscape, but maintaining speed can be difficult as apps and systems grow larger and more complex. CircleCI’s platform allows developers to rapidly release code (for web and mobile apps) they trust by automating the build, test, and deploy process. CircleCI enables developers to detect and fix bugs before they reach end customers.
Use Cases
- Automate the software development process using continuous integration and continuous delivery
- Improve security of the software development lifecycle by leveraging a fully integrated SaaS solution without relying on multiple plugins
-
Bay Dynamics
Bay Dynamics enables enterprises to continuously measure and reduce the financial impact of cyber risk based on actual conditions detected in their environments. The company’s flagship product, Risk Fabric, is a software platform that calculates the value at risk associated with specific threats and vulnerabilities, that when mitigated, measurably reduces cyber risk exposure.
Use Cases
- Uncovering users who exhibit malicious behavior
- Monitoring and ensuring the security and resilience of IT assets and systems are consistent with related policies, procedures, and agreements
-
CloudApp
CloudApp is an instant video and image sharing platform for professionals and enterprises. CloudApp is the fastest way to capture and embed video, GIFs, screencasts, and marked up images throughout business workflows (eg. software development, design, customer success, support, sales, marketing). Every file created is securely stored in the cloud, and accessible via native Mac and Windows Apps, or shareable on the web through password protected cl.ly short links.
Use Cases
- Reduce onboarding timeline by visually displaying information
- Improve communication with technical team members by allowing non-technical resources to capture a video or annotate a screenshot
-
Iron
Iron’s event-driven computing platform delivers and processes 100s of millions of messages and tasks through its products IronMQ and IronWorker. Its asynchronous workloads operate in public and private clouds, on-premise, or hybrid environments. Iron’s message queuing, task processing, and job scheduling solutions are used for event processing, transaction processing, mobile and IoT compute, microservices, and other asynchronous computing patterns within modern cloud applications.
Use Cases
- Messaging at scale: NOAA, FEMA, DHS, DoD, State, OPM
- Any agencies using Docker Enterprise
- Agencies with high volume asynchronous workloads and tasks
-
Mapbox
Mapbox is a live location platform that enables developers to design and publish custom maps quickly and at-scale. They have flexible tools for visualizing geospatial data available on the web, desktop, and mobile. Mapbox developer maps enable real-time routing and asset tracking, and the ability to add augmented reality to the physical world.
Use Cases
- Any agency-utilized application with a mapping feature
- Track assets on a map with intelligent routing
-
Averon
Averon provides secure authentication with real-time signaling from mobile carriers, invisible to the user — no username, password, or apps. Customers are able to verify the identity of employees, beneficiaries, constituents, and contractors with certainty and through existing devices and systems.
Use Cases
- Identity, control, and access management
- Government payments
- Fraud and identity theft prevention
- Mobile security
-
Alation
Alation is a data catalog that automatically indexes organizational data by source and gathers knowledge about your data. Alation uses machine learning to continually improve human understanding and provides a platform for cross-organizational collaboration on data, data labeling, and data catalogs.
Use Cases
- Identify the right data across databases quickly
- Improve data governance, classify information, and track usage
- Data migration
-
Stack Overflow
Stack Overflow enables more than 50 million programmers to collaborate and solve coding problems through its online community. Stack Overflow for Enterprise provides a private, secure home for organization’s questions and answers — giving developer teams instant access to their peers’ and contractors’ expert knowledge of proprietary systems, processes, and intellectual capital.
Use Cases:
- Large developer teams dispersed across an organization, country, or the world
-
Karmic
Karmic has developed an integrated payment and expense management solution that offers ease of enrollment, payments, and expense management along with a real-time mobile experience to prepaid and charge cards. Karmic can provide transparency, proactive or reactive management, and modern software to government programs that rely on payments and charge cards to execute their mission.
Use Cases:
- Charge, fleet, and travel card management
- Prepaid government cards
- Emergency response
- Benefits payments
-
OpenGov
OpenGov enhances government performance management by providing cloud software that leverages robust data analysis for better budgeting, improved operational intelligence, and comprehensive open data. OpenGov solutions give governments the right tools and relevant data for more informed decision-making and better outcomes for the public.
Use Cases
- Budget formulation and execution
- Performance management and reporting
- Open data and data visualization
- Agency business intelligence and analytics
-
Sipree
Sipree is a financial technology company built to improve the way citizens and government stakeholders handle government payments. The Sipree Platform includes a management console with customizable controls and permissioning, built-in identity validation and transactional scoring, and a host of features that enable fast, secure digital payments, at scale, for a wide range of governmental use cases. Sipree’s platform empowers governments with real-time payments that lower operating costs, reduce fraud, and allow for recipient choice.
Use Cases
- Tax refunds
- Disaster response
- Fraud prevention and improper payments
- Interagency payments
- Settlement services
-
Enview
Enview is a 3D geospatial analytics firm that combines expertise in remote sensing, computer vision, and geospatial big data to allow customers to see the invisible and use today’s data to predict future threats. Enview’s proprietary technology automatically generates actionable insights to detect meaningful change in areas of interest to include identifying geohazards, detecting human activity that can jeopardize energy infrastructure, and calculating clearance between vegetation and powerlines to prevent outages and fires.
Use Cases
- Critical infrastructure protection at scale
- National security/GEOINT – hazard and activity detection
- 3D terrain and urban mapping
-
Hivemapper
Hivemapper transforms existing video cameras into an intelligent system producing geospatial information to enable the mission success of civil, defense, and intelligence agencies. Hivemapper’s all-in-one mapping platform provides the ability to quickly search for any specific location, toggle between a 2D and 3D map, view change detection results, and export data into industry standard formats, such as .las files, to be imported into other GIS platforms.
Use Cases
- Automatic change detection
- Transform video to a high-precision, 3D map
- Temporal and geospatial indexing within video
-
Unearth
Unearth improves productivity in large contractor managed projects including construction, infrastructure, and physical security by providing collaboration software powered by IoT and remote sensing.
Use Cases
- Managing government installation/construction projects
-
Onfido
Onfido delivers next-generation identity verification. Powered by machine-learning technology, Onfido enables companies and governments to verify that their users are who they claim to be, without the need to meet them face-to-face, by combining identity document, facial recognition, and geo-location checks.
Use Cases
- Identity, access, and control management (ICAM)
- Background investigations and contractor and employee onboarding
- Fraudulent document identification
- Facial recognition
-
Domino Data Lab
Domino Data Lab is a data science workbench that allows data scientists, analysts, and managers to rapidly develop and deliver models and collaborate on data-driven challenges. Teams can quickly spin up data science tools, collaborate, and maintain detailed audit trails.
Use Cases
- Fraud detection – Speed and quality of research, collaboration, and shared learning for improved fraud detection using data science
- Counter-terrorism efforts – Accelerate individual efforts and team collaboration in the use of computing power and data science
- Supply chain analytics and efficiency – leveraging data to streamline supply chain operations
-
Distil Networks
Distil Networks brings human intelligence to the science of bot mitigation. The company defends websites against web scraping, competitive data mining, account takeovers, transaction fraud, unauthorized vulnerability scans, spam, man-in-the-middle attacks, digital ad fraud, and denial of service. Distil API Security protects public and partner-facing APIs against developer errors, integration bugs, automated scraping, and web and mobile hijacking.
Use Cases
- Protect public facing government portals from bad bots
- Defend against web scrapers and crawlers
-
OneLogin
OneLogin is a cloud-based identity and access management provider. OneLogin can implement identity management solutions in hours, delivering a fully featured administrative and self-service portal. OneLogin’s ability to handle on-premises and cloud/SaaS applications enables it to work on a hybrid enterprise. Its solution provides two-factor authentication, mobile identity management for one-click access on smartphones and tablets, and real-time directory synchronization with an extra layer of protection.
Use Cases
- Manage access to apps in both cloud and on-premise environments
- Automate access for new employee and contractor onboarding and offboarding
- Ensure agency-wide compliance with login security requirements
-
DataRobot
DataRobot offers a machine learning platform for data scientists of all skill levels to build and deploy accurate predictive models in a fraction of the time it used to take. DataRobot allows organizations to test and find the best models to fit specific challenges, reducing the time for model testing and deployment by months.
Use Cases
- Predicting deadly disease outbreaks and analyzing response options
- Predicting misappropriation of funds or identifying fraudulent claims in programs such as Medicare and Medicaid
-
CryptoMove
CryptoMove is a cloud-based, moving target, data defense software platform that splits data into fragments, then encrypts, re-encrypts, and applies proprietary random movement algorithms to spread the data across a diverse landscape of devices, clouds, and storage layers. CryptoMove’s approach to data protection reverses the advantage that attackers have over traditional data-at-rest encryption technologies to address a host of current and emergent threats to encrypted data that frequently are misunderstood.
Use Cases
- Next generation of encryption for high value assets
- End-to-end encryption platform for IoT and sensor data
-
Saviynt
Saviynt enables enterprises to secure applications, data, and infrastructure in a single FedRAMP-compliant platform for Cloud (AWS, Azure, Box, Dropbox, Hadoop, Office 365, Salesforce, Workday) and Enterprise (Cerner, Dynamics, Epic, Oracle EBS, SAP). Saviynt provides a single pane of glass over who has access to information across your infrastructure to address identity management and insider threat use cases. Saviynt provides real-time analytics for dynamic decision-making and proactive security.
Use Cases
- Application modernization-modernize IDAM for identity governance across on-premise and cloud environments
- Map compliance to FISMA/FedRAMP/HIPAA and other compliance frameworks with continuous compliance and automated remediation
- Secure multi-cloud environments with continuous controls
-
Crossdeck
Crossdeck enables a 21st century, mobile-first, distributed workforce to synchronize around training, operational readiness, and daily workflows. In addition to mobility products, Crossdeck also ensures the success of customers’ mobile deployment through consulting and advisory services.
Use Cases
- Improved access, analysis, and tracking of defense inventory across manuals, guidance, and physical location
- Improved workforce productivity through training and certification at the point of performance and the ability to monitor progress against real activities, making training and reporting actionable
-
HAAS Alert
HAAS Alert connects public sector agencies performing critical operations on the road with motorists, smart cities, and connected and autonomous vehicles. With a suite of products to connect cities and fleets including mobile and IoT sensors, HAAS Alert creates broadcast signals from indicators such as lights and sirens from vehicles at the source and distributes real-time data sets through the HAAS Alert Mobility Safety Cloud service.
Use Cases:
- First responders and others who need to project an awareness from responding emergency vehicles and other municipal fleets
-
Coseer
Coseer’s AI understands human language to search for actionable knowledge in documents, databases, online, and beyond. Its ACTUATEBOT interfaces can integrate Natural Language Search (NLS) with customer IT systems to make results immediately actionable. These customizable cognitive platforms allow enterprises to develop custom products that automate business by finding, sorting, classifying, and analyzing natural language text.
Use Cases
- Automated redaction of sensitive content in emails, printing, etc.
- Synthesis and analysis of large volumes of documents to deliver to chatbots or other sources for constituent interaction
-
PROXXI
PROXXI produces a smart sensor that allows users to see electricity with software. PROXXI built the first digital electric field sensor that can interpret voltage and distance. It notifies the wearer by vibration (haptic feedback) when they get too close to an electric current and helps reinforce the limits of approach. Targeted at those in industry at risk of electrocution, it provides companies peace of mind and visibility through connected monitoring and insights into employee safety.
Use Cases
- Keep field workers safe who are at risk of electrocution everywhere from electricians on submarines to people working for the Army Corp of Engineers
-
Tacit.io
Tacit.io was founded to author, deploy, and enable intelligent software on industrial mobile computing devices, wearable headsets, and other form factors to simplify industrial workers’ tasks, improve productivity, and capture institutional knowledge (‘Tacit Knowledge’) in a transferable way to enable training.
Use Cases
- Institutional knowledge retention- training
- Speed to knowledge
- Digital twin/thread- knowledge retention
-
DroneSeed
DroneSeed offers full lifecycle services for forestry management by using an efficient, cost-competitive fleet of drones to reduce reliance on manual labor. It uses drone swarms to deliver agricultural payloads such as herbicides, fertilizer, and water.
Use Cases
- Spreading seeds for reforestation by shooting seeds using compressed air from drones
- Fostering seed growth through watering and fertilizing
-
SPIDR Tech
SPIDR Tech creates a community relationship management platform for public safety agencies. It allows law enforcement agencies to use their own data to automatically engage their citizens using victim follow-ups, citizen request follow-ups, targeted surveys, and more.
Use Cases- Enable your public safety agency to give private-sector levels of customer service
- Send personalized messages and update citizens on requests
-
Fieldwire
Fieldwire makes it easy for construction project stakeholders to manage data and collaborate in the field. Fieldwire keeps all project data organized and accessible both online and offline, so any on-site contractors or supervisors can review the latest set of plans and drawings and can record, track, and share critical information (photos, punch lists, RFIs) overlaid on each plan directly from their mobile devices. Tasks can be created, assigned, and updated from the field in real-time, and Fieldwire’s notification system sends progress updates through both email and mobile alerts.
Use Cases:
- Any agency construction or other large project, that requires real-time collaboration
-
Catalytic
Catalytic automates organizations’ critical operations through AI-driven automation. They offer a SaaS platform that brings modern work bots to recurring business processes, allowing people to focus on higher value tasks while letting AI complete processes that computers can do more effectively. It supercharges customer teams by automating boring tasks to optimize processes intelligently.
Use Cases
- Automated business processes including procurement, service delivery, onboarding, and help desks
- Improved efficiency for service delivery processes requiring multiple phases of approval across disparate systems
-
AnomalousDL
AnomalousDL is a deep learning technology company focused on democratizing deep learning and AI to capture domain expertise in real time and at scale. Its two-layered, deep-learning system works to continuously detect anomalies and is designed to be leveraged by field experts, not only data science professionals.
Use Cases
- Intrusion detection
- Sensor monitoring
- Medical data analysis and diagnosis
-
Hive
Hive is a project management service that helps companies collaborate across their organizations to deliver effective projects and manage day-to-day work. The centralized platform enables companies to plan, execute, and track projects in real-time. With group messaging, file sharing, and over 1,000 app integrations, its tools are easy-to-use with powerful reporting and analytics for leadership.
Use Cases
- Cloud collaboration tool for teams of all sizes
- Enable rapid response teams, task forces, and distributed teams
-
Sitetracker
Sitetracker manages high-volume distributed capital projects and assets. It enables customers to evaluate candidate sites in context and conduct capacity planning to identify staffing needs or resource bottlenecks. Sitetracker also allows customers to manage portfolios of high-volume projects with real-time reports and dashboards and manage post-deployment activities like maintenance, upgrades, and marketing in the same platform.
Use Cases
- Modern project management for agencies
- Support collaboration tools for contractor teams with distributed projects
- Give leadership real-time insights and analytics for capital projects
-
Infinite Composites
Infinite Composites (ICT), designs, develops, and manufactures advanced composite pressure vessels and structures. ICT was founded in 2010 to revolutionize composite pressure vessel technology. This led to the creation of the Infinite Composite Pressure Vessel, which provides up to 90% lower mass while reducing cost by up to 90% compared to traditional space pressure vessels and reducing lead time by up to 80%. ICT is the only AS9100D certified manufacturer of linerless composite pressure vessels.
Use Cases
- Faster, lighter, and cheaper:
- Launch vehicle and spacecraft propulsion
- Aircraft and aviation propulsion
- Man-portable life support
- Faster, lighter, and cheaper:
-
Kepler Communications
Kepler Communications is a satellite communications company working to establish an in-space telecommunications network for space-borne assets. Kepler is building cell phone towers in space to resolve the problem of intermittent connectivity for non-geostationary satellites. Its solution will open new business opportunities that require real-time connectivity to satellites, and reduce reliance on costly and difficult to deploy ground infrastructure.
Use Cases
- Track maritime vessels where cell phone service is not available
- Enhance connectivity where cell service is limited, to include at border crossings or in remote areas around the globe
- Pole-to-pole communications
-
Metamaterial Technologies
Metamaterial Technologies Inc. (MTI) is a smart materials and photonics company specializing in metamaterial research, nanofabrication, and computational electromagnetics. MTI’s pioneering technology platform enables us to manipulate light for a variety of outcomes. MTI’s in-house capabilities make it possible to create products capable of blocking, absorbing, or enhancing light.
Use Cases
- Laser eye protection
- Low cost and low weight de-icing, de-fogging, and heating solutions
- Lightweight, passive EMI shielding
- Transparent antenna
-
RBC Signals
RBC Signals provides global satellite communication “infrastructure as a service.” It aggregates the unused capacity of existing satellite ground stations around the world, providing a clean and simple way for ground station operators to increase the revenue generating potential of their systems. The company finds satellite customers, understands their technical needs and matches them with ground stations to serve their requirements.
Use Cases
- Ground station infrastructure as a service
- Test and demonstration missions; communications support
- Optical communications
-
Slingshot Aerospace
Slingshot Aerospace provides next generation signal processing AI. Its solutions and geospatial insights allow customers worldwide to make valuable decisions utilizing Earth Observation data, the world’s largest untapped data source, and other ancillary data sources. Slingshot aims to significantly improve the value of data customers consume to gain competitive advantage, reduce risk and reduce costs.
Use Cases
- Space situational awareness
- Edge-processing embedded AI
- Multi-domain and multi-sensor processing
-
Figure Eight
Figure Eight is the essential human-in-the-loop AI platform for data science teams. Figure Eight helps customers generate high-quality customized training data for its machine learning initiatives or automate a business process with easy-to-deploy models and integrated human-in-the-loop workflows. The Figure Eight software platform supports a wide range of use cases including self-driving cars, intelligent personal assistants, medical image labeling, content categorization, customer support ticket classification, social data insight, CRM data enrichment, product categorization, and search relevance. Figure Eight serves data science teams at Fortune 500 and fast-growing data-driven organizations across a wide variety of industries.
Use Cases
- Training machine learning models for:
- Computer vision
- Fraud and regulatory analysis
- Audio/video/text/imagery analysis
- Training machine learning models for:
-
Camvi Technologies
Camvi Technologies is an Artificial Intelligence company specializing in advanced face recognition and identity solutions. Camvi is the world’s leading face recognition solution for unconstrained or “wild” face images (#1 ranking in both NIST FRVT and UMASS LFW) and provides sublinear matching speed. Camvi offers flexible enterprise, edge, mobile, and API solutions capable of supporting databases with billions of images in real-time.
Use Cases
- Real world, near- to real-time face based surveillance, collection, and intelligence
- Biometric Access Control
- Facial Recognition capabilities in the field and on the move