RTI researchers devlope methods and tools for sharing large-scale data sets of varying degrees of senstivity with members of the cyber security resesarch community. In addition, RTI is capable of economic analysis and modeling for critical infrastructure and cyber security investment decisions . RTI staff also performs data mining for hostile surveillance patterns, terrorist profiling, and other homeland security studies.
Lab capability: IT Security
High Tech Crime Consortium
The High Tech Crime Consortium is a nonprofit organization that assists law enforcement and corporate investigators to obtain the knowledge and skills needed to combat 21st Century crime where the use or abuse of digital technology is an element of an offense.
Unisys Stealth
Unisys Stealth is an innovative, software-based security solution that delivers consistent, inimitable security for global enterprises focused on protecting data in their data center, cloud, and mobile infrastructures.
Check Point Software Technologies Ltd.
Since 1993, Check Point has been dedicated to providing customers with uncompromised protection against all types of threats. Check Point offers a wide range of education programs, professional certifications and self-study resources developed in-house by Check Point security experts.
Symantec Corp.
Symantec is a global leader in providing security, information management solutions to help customers secure and manage their information against more risks at more points, more completely and efficiently than any other company. The companyÕs unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.
Trend Micro, Inc.
Trend Micro Inc. is a global security software company that provides services aimed to protect end users on any device, optimize security for the modern data center, and secure networks against breaches from targeted attacks.
FireEye, Inc.
FireEye, Inc. is a network security company that provides automated threat forensics and dynamic malware protection against advanced cyber threats, such as advanced persistent threats and spear phishing. FireEye protects both large and small organizations committed to stopping advanced cyber threats, data breaches and zero-day attacks.
CyberArk Software, Ltd.
CyberArk is an information security company focused on privileged account security. The company’s technology is deployed worldwide Ð primarily in the financial services, energy, retail and healthcare markets.
Proofpoint
Proofpoint is based in Sunnyvale, California and provides SaaS and on-premises solutions for inbound email security, outbound data loss prevention, privacy protection, email encryption, electronic discovery and email archiving.
Qualys
The Qualys Cloud Platform and integrated suite of solutions helps organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications.