8 Security Technologies Ready for Market

Wednesday, May 17, 2017 @ 09:05 AM gHale


Eight cybersecurity technologies developed by researchers at federally funded laboratories and academic research centers are ready for the commercial market.

Each fiscal year, the Department of Homeland Security’s Transition to Practice (TTP) program selects promising cybersecurity technologies developed with federal funding to incorporate into its transition-to-market program.

RELATED STORIES
DHS Awards $9.7M for 13 Small Business Projects
DHS Opens Explosives Detection Lab
Malware Detection Technology Goes Commercial
Eighth Member of DHS’ TPP

The TTP program selects the technologies from Department of Energy National Labs, Department of Defense-affiliated labs, Federally Funded Research and Development Centers, University Affiliated Research Centers, and universities.

The eight new TTP technologies are:
Cyber Human Language Technology Analysis, Reasoning and Inference for Online Threats (CHARIOT) addresses the data overload problem cyber-analysts encounter by filtering open-source social media to eliminate irrelevant topics. It was developed at the Massachusetts Institute of Technology’s Lincoln Laboratory (MIT LL).
Quantitative Attack Space Analysis and Reasoning (QUASAR) provides visualization and quantitative analytics for determining the security impact of deploying cyber-defenses in an enterprise environment. QUASAR also was developed at MIT LL.
A Novel Intrusion Prevention System for Android (APE) is an application for Android devices that performs deep-packet inspection and filtering of traffic entering and leaving the device, thus blocking malicious traffic and lowering its attack profile. APE was developed by the Mitre Corporation.
Akatosh: Automated Cyber Incident Verification and Impact Analysis enables automated, real-time forensic analysis of endpoints after malware-attacks and other cybersecurity incidents by automatically maintaining detailed snapshots of host-level activity on endpoints over time. The technology was developed at Oak Ridge National Laboratory (ORNL).
Real-Time Cyber-Physical Attack Detection (CPAD) protects power transmission and distribution and other highly sensitive control systems by performing analytics and automatically inferring underlying physical relationships to detect sensor failures, replay attacks and other data-integrity issues in real time. CPAD also was developed at ORNL.
StreamWorks: Continuous Pattern Detection on Streaming Data supports continuous detection of emerging patterns in a system of graph-structured data, which are used to detect emerging events in massive netflow or event log data streams. It was developed at the Pacific Northwest National Laboratory.
Keylime: Enabling Trusted Platform Module-Based Trust in the Cloud enables users to securely bootstrap secrets (e.g., cryptographic keys, passwords, etc.) and continuously verify trust in their cloud computing resources without needing to trust their cloud provider. Keylime also was developed at MIT LL.
Policy Enforcement and Access Control for Endpoints (PEACE) protects endpoint devices in an enterprise network by intercepting all new network connections and vetting them at a centralized network controller, allowing administrators to enforce network policy and control access to proactively defend their networks. PEACE was developed at the Worchester Polytechnic Institute.

The 2017 cohort will be introduced to cybersecurity professionals — investors, developers and integrators — through a series of “Demonstration Day” events around the country that also will showcase the technologies to companies, including those from the energy, financial and government sectors.

The goal of these events is to help spur pilot opportunities and kick start commercialization by connecting the technologies with those who can advance the technologies and turn them into commercially viable products.



Leave a Reply

You must be logged in to post a comment.