In an effort to keep DHS.gov current, the archive contains outdated information that may not reflect current policy or programs.
Earlier this month, the Department of Homeland Security Science and Technology Directorate (S&T) Cyber Security Division (CSD) hosted the Transition to Practice (TTP) Investors, Integrators and IT Company (I3) East Technology Demonstration Day, to showcase technologies to private industry cybersecurity investors, integrators and IT professionals. The event included presentations from Department of Energy (DOE) and Department of Defense (DOD) national laboratory researchers, as well as live in-depth demonstrations of the technologies.
“These TTP Technology Demonstration Day events allow us to connect with people in the private sector to build relationships that promote pilots and licensing for promising technologies,” said CSD TTP Program Manager Michael Pozmantier. “During these events, we have the ability to demonstrate technologies directly to the stakeholders who could potentially use the technologies once they become products.”
The TTP program, established in 2012 to support the Department’s mission of improving the nation’s cybersecurity capabilities, builds on CSD’s process of funding projects through the full research and development life cycle: research, development, test and evaluation, pilots, and transition. The TTP program showcases how cybersecurity research can be turned into useful products in order to get into the hands of businesses and communities.
The overall goals of the program are to: (1) identify mature technologies that address an existing or imminent cybersecurity gap in public or private systems that impact national security, (2) increase utilization through partnerships, product development efforts, and marketing strategies, and (3) improve the long term ability for federal government research labs to more efficiently transition technology.
“These demonstrations, held multiple times during the year, are essential to continuing and promoting the mission of DHS S&T,” said Pozmantier. “Through these demonstrations, we help to push the technologies out into real world utilization.”
The presented technologies included:
- CodeDNA: Scalable, High-Speed, High-Volume, Shareable Malware Detection
- This scalable, shareable technology facilitates community-based defense against malware attacks with automated creation of highly compressed, shareable fingerprints of malware instances.
- Quantum Security: Veolcirandor: Quantum Random Number Generator
- This small, low-cost, deployable solution helps to generate secret random numbers (keys) at high rates.
- Quantum Secured Communications: Security for the Nation’s Infrastructure
- This technology authenticates and encrypts commands and data from one networked device to another over optical fiber.
- CrytAC: Security Data for Public Clouds
- This technology provides secure storage data in public clouds through cryptographic access control and separates data security from data storage management.
- LOCKMA: Lincoln Open Cryptographic Key Management Architecture
- This software component simplifies the task of adding cryptographic protections and underlying key management to software applications and embedded devices, such as mobile devices, unmanned vehicles, sensors, and larger systems.
- Digital Ants: Dynamic & Resilient Infrastructure Protection
- This technology protects larger enterprise networks by swarming to the location of anomalies and enable operators to focus on areas and issues of concern.
- PACRAT: The Blended Physical and Cyber Risk Analysis Tool
- This vulnerability and risk analysis software package blends the methodology and assessment processes used in the physical and cybersecurity domains.
- SerialTap: Enabling Complete Situational Awareness in Control Systems
- This device transmits communication over an Ethernet network for comprehensive control system situational awareness.
- SecuritySeal: Critical Protection for Your Supply Chain
- This combined hardware and software solution provides anti-counterfeiting protection, tamper detection, and supply chain risk management for high value assets.
For more information on the TTP program or any of the technologies in this article, please contact TTP Program Manager Michael Pozmantier at ST.TTP@hq.dhs.gov