New Software Makes Data From Multiple Sources Readable

Military analysts and combat fighters encounter new threats daily. These include Improvised Explosive Devices (IED), ambush attacks and firefights. Now BAE Systems has created the GXP Fusion software, which it delivers with the existing GXP Xplorer Platform, an application that makes it easy to locate, retrieve, and share geo-spatial data.

This new geospatial intelligence application fuses multiple data sources and shows data connections on a customisable dashboard, giving analysts immediate predictions of where a threat potential is and where it might strike. 

This new software application engages with multiple intelligence sources to develop a single clear picture. The software simplifies complex data challenges making the picture clearer for the analyst. GXP Fusion uses Artificial Intelligence and Machine Learning technology to allow analysts to make smarter decisions through tailored workflows.  The software combines a wide variety of data types, including imagery, documents, signals, maps, and video and from th different sources it creates a multi-perspective view in a single picture. This makes delivery of insightful intelligence and enhanced situational awareness to key decision-makers far easier to read and understand.

From key military, security, and incident response operations, to a variety of commercial development and research initiatives, GXP provides a comprehensive suite of solutions to inform effective decision making. 

Supporting the development of the most advanced geospatial intelligence, GXP software enables rapid discovery, exploitation, and dissemination of mission-critical geospatial data.  “GEOINT customers have big data challenges,” said Dana Poirier, general manager of Advanced GEOINT Systems at BAE Systems.... They require the ability to see hidden relationships and patterns in large volumes of data. GXP Fusion represents an important step in our vision of driving GEOINT transformation.”

BAe Systems:          ADS Group:            Defense World:         I-HLS:

You Might Also Read:

AI Satellite Image Analysis Will Be Regulated:

 

« Securing AI In Military Systems
Covid Vaccine-Maker Suffers Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Teradata

Teradata

Teradata is a leading provider of enterprise big data analytics and services. Applications include Cyber Security Analytics.

TSUNAMI

TSUNAMI

The TSUNAMi center focuses on software and system security and how trustworthy software can be built from COTS software components.

Silent Breach

Silent Breach

Silent Breach specializes in network security and digital asset protection. Services include Pentesting, Security Assessments, Incident Detection & Response, Governance Risk & Compliance.

GE Digital

GE Digital

GE Digital is a leading software company for the Industrial Internet. Products include Industrial Cyber Security for Operational Technology (OT).

Onspring

Onspring

Onspring is the cloud-based platform of choice for governance, risk and compliance (GRC) teams and business operations experts across multiple industries.

Smoothwall

Smoothwall

Smoothwall develop intelligent web filtering, Monitoring and security solutions designed to protect users worldwide.

ReSec Technologies

ReSec Technologies

ReSec provides total protection against all types of known and unknown malware threats including viruses, Trojans, ransomware and phishing, regardless of their delivery method.

Halcyon Knights

Halcyon Knights

Halcyon Knights is a specialist executive search and IT recruitment agency in the APAC region. Areas of specialisation include cybersecurity.

Sergeant Laboratories

Sergeant Laboratories

Sergeant Laboratories builds advanced technologies to prove compliance in complex IT security and regulatory compliance situations.

BluBracket

BluBracket

BluBracket is the first comprehensive security solution that makes code safe—so developers can innovate and collaborate, and security teams can sleep at night.

3B Data Security

3B Data Security

3B Data Security offer a range of Penetration Testing, Digital Forensics, Incident Response and Data Breach Management Services.

Dutch Institute for Vulnerability Disclosure (DIVD)

Dutch Institute for Vulnerability Disclosure (DIVD)

DIVD's aim is to make the digital world safer by reporting vulnerabilities we find in digital systems to the people who can fix them.

Searchlight Cyber

Searchlight Cyber

Searchlight Cyber is a leading darknet intelligence company. Working with law enforcement, industry, and end users to help protect society against the threats of the darknet.

CUBE3 AI

CUBE3 AI

CUBE3.AI is a web3 security platform that provides real-time transaction protection for smart contracts, safeguarding against cyber exploits, fraud, and compliance risks.

TrustMe

TrustMe

TrustMe’s integrated platform for business trust and resilience keeps organizations safe, secure, and trustworthy.

Myrror Security

Myrror Security

Myrror Security is a software supply chain security solution that aids lean security teams in safeguarding their software against breaches.