Two Six Technologies Solutions for the Public Sector
Sigma is an industry leader in self-contained CBRN
(Chemical, Biological, Radiological, and Nuclear) detection platforms. The
result of years of R&D and real-world testing, SIGMA is the most secure,
cloud-hosted Software-as-a-Service offering that supports person-carried,
vehicle-mounted and static placements via its platform. Built for region-scaled
networks and static CBRN sensors, SIGMA can be deployed operationally to
protect citizens and critical infrastructure alike.
Interactive command and control UI
Unobtrusive static sensor installation and small, cell phone sized
Advanced automated threat detection and accurate isotope
identification of sources in seconds
and Easy: Up and running in minutes and hours, not days or weeks
Integrated: Integrates with third-parties, and personal, vehicle and
Region scale continuous monitoring and situational awareness
Range: Sensor variety covers any deployment area
Scalable from tens to thousands of sensors
for Temporary Deployment: Ideal for mission-specific deployments or
defending high-profile, one time events and locations
TrustedKeep was purpose-built for high performance,
scalability and object-level encryption that enforces the separation of duties
across the enterprise. Employed by the United States Government, TrustedKeep’s
comprehensive security platform provides an easy, scalable solution for
implementing Zero Trust protection across the enterprise — whether it’s in the
cloud, on-premise or in hybrid environments.
Object-Level Encryption: Encrypt every object with a unique key. A
single TrustedKMS™ cluster scales to billions of keys under management and
handles thousands of transactions per second.
Access Control and Separation of Duties: End users and authorized
systems only have access to the data they’re supposed to see.
Compatible With Amazon’s Simple Storage Service (S3): TrustedKeep™
acts as a transparent proxy to S3.
with Amazon’s KMS: For your most sensitive workloads, encrypt your
data with TrustedKeep™ and a Customer Managed Key (CMK) from Amazon’s KMS.
Available and Geographically Distributable: TrustedGateway™ is
stateless and can scale to your workload, while TrustedKMS™ can be
distributed across data centers or AWS regions.
Auditing and Monitoring: Every operation is audited, and all audits
are exportable to your elastic™ stack.
Enable data collection and two-way engagement with Pulse.
Pulse’s platform leverages cloud analytics and advanced data processing tools
to help answer difficult questions in austere environments — providing teams
with deep insights and engaging them in two-way conversations. Our technology
platform provides full-spectrum support to information operations, enabling
teams to understand hard-to-reach communities and address urgent human security
issues faced by these vulnerable populations.
Ingest publicly available information (PAI) from Social Media, Social Chat
and the Surface, Deep, and Dark Web
Identify and monitor narratives and influencers through an AI-enabled data
pipeline and custom analytics
Build custom audiences and understand patterns of life through global,
SDK-based, privacy-compliant smart device location data
Deliver relevant content to global audiences through mobile apps and web
Communicate directly with selected audiences through their own devices
and on the platforms where they most often communicate
Rebroadcast relevant, trending content at scale across social media
and social chat
M3 (Media Manipulation Monitor) enables U.S. Government and
business change-makers to decode media manipulation by foreign markets through
data, analytics and insights. M3 uses signal-rich proprietary data, AI-powered
technology and world-class expertise to decode foreign governments’ efforts to
manipulate the narrative — including censorship, disinformation, and propaganda
campaigns — revealing the intentions, information and priorities they would
rather keep hidden.
Dashboard: M3 offers a dashboard for monitoring manipulation so that
you know if your data sources have been manipulated—when, how, and why. We
can detect censorship, inauthentic content, disinformation, and propaganda
in foreign governments’ media stories, official statistics, and social
Insight: We’ve invested in technology and methods that ensure you get
more signal and less noise. We curate our data, use neural network
language models to understand nuance and discover narratives,
automatically detect inauthentic content, and set baselines so that we can
conduct anomaly detection.
Data: Integrate our annotated data directly into your platform—making
it easy for you to generate your own insights and incorporate them into
your products. You choose the data and annotations most relevant to you
and pay only for what you need. Our data is always curated for signals.
Support: Clients have transparent access to our data science methods,
like the analytics, natural language processing, and machine learning
tools used to solve the problems that come with monitoring manipulation.
And we offer a range of support tiers to help clients adapt them. Our team
of experts has years of experience in international markets and speaks
foreign languages at the native level.
IKE is a multi-domain command and control platform that
blends users, systems and analytics throughout the command chain and across
multiple domains and organizations — giving users the ability to plan, prepare,
execute and comprehend complex battlefield operations. IKE empowers personnel
at every level of the U.S. cyber mission, by seamlessly codifying military
processes into a single pane of glass using AI and machine learning.
IKE is powered by machine learning to reduce manual effort for operators
Collaboration: A platform purpose-built for collaboration ensures
efficiency even in the toughest environments
Visualizations: Gives cyber commanders precise, real-time insight into
Reporting: Allows teams to track their impact every step of the way