
FUNDING DUAL PURPOSE TECHNOLOGY
“In order to maintain — and ideally expand — the U.S. military’s long-standing capability advantage over our adversaries, it is critical that the Department of Defense continue and expand its ongoing efforts to leverage commercial sector innovation and provide for faster and easier acquisition of cutting-edge technology from new and non-traditional providers.”
-GEN. (RET.) KEITH ALEXANDER
OUR PORTFOLIO
Electrically powered, frequent, on demand, hypersonic space launch vehicles.
An AI assistant for pilots, enhancing safety, training, and efficiency in commercial and private aviation.
AI active cyber defense cycle platform for critical infrastructure.
A platform that prevents fraud and recovers funds for victims of cybercrime through a real-time reporting system.
An investigative platform that uncovers intricate data relationships to advance intelligence analysis.
Developer of modular sUSVs for defense and commercial markets with minimal human involvement
An RF satellite monitoring service enabling enhanced global situational awareness for customer and intelligence missions.
A veteran transition accelerator that connects talented personnel completing their U.S. military careers with positions in private sector companies.
Applied AI to reveal disruptive technologies and trends in open-source data within the science and technology landscape.
Global IoT using Bluetooth low energy to satellite comms for a low-energy, cost-effective network.
Delivers value from existing security systems through computer vision analytics to understand consumer behavior.
Continuous security testing against enterprise systems to identify weaknesses and improve cybersecurity defenses.
A proactive deepfake detection platform examining the validity of audio, photos, and videos.
A software intelligence management system that fuses multi-source data for accelerated decision-making.
Nuclear fission micro reactors that will be factory manufacturable, transportable, self-regulating and safe.
An app that detects and maps intrusive cyber threats in the wild, acting as a "Waze for cyberspace."