ATTACK ANALYSIS

Improving the techniques, methods, and technologies used to detect adversarial activity on US Government networks.

SECURITY AUTOMATION

Enabling standards-based collection, communication and correction of computer vulnerability and configuration status.

BIG DATA

Overcoming the current limitations associated with Relational Database Management Systems (RDBMS) or file system processing systems.

G2 Blog