Two Six Technologies Solutions for the Public Sector

  • SIGMA

    Sigma is an industry leader in self-contained CBRN (Chemical, Biological, Radiological, and Nuclear) detection platforms. The result of years of R&D and real-world testing, SIGMA is the most secure, cloud-hosted Software-as-a-Service offering that supports person-carried, vehicle-mounted and static placements via its platform. Built for region-scaled networks and static CBRN sensors, SIGMA can be deployed operationally to protect citizens and critical infrastructure alike.

    Product features:

    • Seamless: Interactive command and control UI
    • Self-Contained: Unobtrusive static sensor installation and small, cell phone sized handheld sensors
    • Automated: Advanced automated threat detection and accurate isotope identification of sources in seconds
    • Quick and Easy: Up and running in minutes and hours, not days or weeks
    • Fully Integrated: Integrates with third-parties, and personal, vehicle and mobile detectors
    • Vigilant: Region scale continuous monitoring and situational awareness
    • Expansive Range: Sensor variety covers any deployment area
    • Scalable: Scalable from tens to thousands of sensors
    • Ideal for Temporary Deployment: Ideal for mission-specific deployments or defending high-profile, one time events and locations
  • TrustedKeep

    TrustedKeep was purpose-built for high performance, scalability and object-level encryption that enforces the separation of duties across the enterprise. Employed by the United States Government, TrustedKeep’s comprehensive security platform provides an easy, scalable solution for implementing Zero Trust protection across the enterprise — whether it’s in the cloud, on-premise or in hybrid environments.

    Product features:

    • Scalable Object-Level Encryption: Encrypt every object with a unique key. A single TrustedKMS™ cluster scales to billions of keys under management and handles thousands of transactions per second.
    • Strong Access Control and Separation of Duties: End users and authorized systems only have access to the data they’re supposed to see.
    • API Compatible With Amazon’s Simple Storage Service (S3): TrustedKeep™ acts as a transparent proxy to S3.
    • Compatible with Amazon’s KMS: For your most sensitive workloads, encrypt your data with TrustedKeep™ and a Customer Managed Key (CMK) from Amazon’s KMS.
    • Highly Available and Geographically Distributable: TrustedGateway™ is stateless and can scale to your workload, while TrustedKMS™ can be distributed across data centers or AWS regions.
    • Strong Auditing and Monitoring: Every operation is audited, and all audits are exportable to your elastic™ stack.
  • Pulse

    Enable data collection and two-way engagement with Pulse. Pulse’s platform leverages cloud analytics and advanced data processing tools to help answer difficult questions in austere environments — providing teams with deep insights and engaging them in two-way conversations. Our technology platform provides full-spectrum support to information operations, enabling teams to understand hard-to-reach communities and address urgent human security issues faced by these vulnerable populations.

    Product capabilities:

    • Listen: Ingest publicly available information (PAI) from Social Media, Social Chat and the Surface, Deep, and Dark Web
    • Discover: Identify and monitor narratives and influencers through an AI-enabled data pipeline and custom analytics
    • Focus: Build custom audiences and understand patterns of life through global, SDK-based, privacy-compliant smart device location data
    • Connect: Deliver relevant content to global audiences through mobile apps and web browsers
    • Engage: Communicate directly with selected audiences through their own devices and on the platforms where they most often communicate
    • Amplify: Rebroadcast relevant, trending content at scale across social media and social chat
  • M3

    M3 (Media Manipulation Monitor) enables U.S. Government and business change-makers to decode media manipulation by foreign markets through data, analytics and insights. M3 uses signal-rich proprietary data, AI-powered technology and world-class expertise to decode foreign governments’ efforts to manipulate the narrative — including censorship, disinformation, and propaganda campaigns — revealing the intentions, information and priorities they would rather keep hidden.

    Product features:

    • Manipulation Dashboard: M3 offers a dashboard for monitoring manipulation so that you know if your data sources have been manipulated—when, how, and why. We can detect censorship, inauthentic content, disinformation, and propaganda in foreign governments’ media stories, official statistics, and social media statements.
    • Curated Insight: We’ve invested in technology and methods that ensure you get more signal and less noise. We curate our data, use neural network language models to understand nuance and discover narratives, automatically detect inauthentic content, and set baselines so that we can conduct anomaly detection.
    • Annotated Data: Integrate our annotated data directly into your platform—making it easy for you to generate your own insights and incorporate them into your products. You choose the data and annotations most relevant to you and pay only for what you need. Our data is always curated for signals.
    • Expert Support: Clients have transparent access to our data science methods, like the analytics, natural language processing, and machine learning tools used to solve the problems that come with monitoring manipulation. And we offer a range of support tiers to help clients adapt them. Our team of experts has years of experience in international markets and speaks foreign languages at the native level.
  • IKE

    IKE is a multi-domain command and control platform that blends users, systems and analytics throughout the command chain and across multiple domains and organizations — giving users the ability to plan, prepare, execute and comprehend complex battlefield operations. IKE empowers personnel at every level of the U.S. cyber mission, by seamlessly codifying military processes into a single pane of glass using AI and machine learning.

    Product features:

    • Automated: IKE is powered by machine learning to reduce manual effort for operators
    • Offline Collaboration: A platform purpose-built for collaboration ensures efficiency even in the toughest environments
    • Advanced Visualizations: Gives cyber commanders precise, real-time insight into networks
    • Robust Reporting: Allows teams to track their impact every step of the way