Alternatives to L3Harris Falcon Net Ecosystem
Compare L3Harris Falcon Net Ecosystem alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to L3Harris Falcon Net Ecosystem in 2026. Compare features, ratings, user reviews, pricing, and more from L3Harris Falcon Net Ecosystem competitors and alternatives in order to make an informed decision for your business.
-
1
L3Harris hC2
L3Harris
The L3Harris hC2 software suite is a complete command and control solution that connects all echelons. As part of our integrated tactical communication systems family, hC2 streamlines network access through an easy-to-use interface. The integrated applications of the hC2 software suite support various platforms including Android, PC, and Web. They share data in a common format so information can be entered once in the network and then accessed from anywhere. The result is a common operational view with real-time intelligence for more informed decision-making. Supports operational staff in collaborative mission planning and execution. Forward battle management system for frontline commanders. Enhances force protection by providing dismount commanders with a real-time, shared operational picture. Solutions that solve our customers' toughest challenges. -
2
MilDef OneCIS
MilDef
MilDef’s software offering centers on OneCIS, a ruggedized tactical C2IS (Command & Control Information System) platform designed to rapidly deploy secure, flexible, and scalable IT services to mobile commands and tactical units in demanding environments. OneCIS automates configuration and orchestration of core IT infrastructure, including communications (IP routing, switching, firewalling), directory and messaging services, databases, collaboration tools, web services, and security tools, so that tactical IT capabilities can be deployed in hours instead of days or weeks with minimal human intervention. It serves as a tactical private cloud at the edge, bringing Infrastructure as a Service (IaaS) and automated workflows for hypervisor, OS, virtual appliances, network, and core services deployment, and supports integration of functional services such as Command & Control, battlefield management, and geographic services as needed. -
3
Thales Commander
Thales
Our command and intelligence suite provides powerful tools for rapid information exploitation, supporting decision-making through a common tactical picture. Commander is our Command, Control, Communications, and Intelligence (C4I) solution, built on open architecture, integrating operational information systems and tactical communications. MINDS serves as a multi-sensor image interpretation and dissemination system, critical for air operations with capabilities such as data production for reconnaissance, ground surveillance, targeting, real-time digital acquisition, and scalability. NIES is our networked image exploitation system, offering battlefield insights across multiple light wavelengths while facilitating resource sharing and situational awareness. DMPS is a comprehensive digital mapping tool that enables 3D object extractions, geometric and radiometric image processing, and efficient project data management. -
4
Lattice for Command & Control
Anduril Industries
It enables men and women in uniform to move with machine speed, unparalleled confidence, and military-grade security by turning data into information, information into decisions, and decisions into actions across tactical and strategic operations. Lattice accelerates complex kill chains by orchestrating machine-to-machine tasks at scales and speeds beyond human capacity. Lattice cuts through the noise and creates a shared real-time understanding of the battlespace. It autonomously parses data from thousands of sensors & data sources into an intelligent common operating picture in a single pane of glass. Lattice uses technologies like sensor fusion, computer vision, edge computing, and machine learning, and artificial intelligence to detect, track, and classify every object of interest in an operator's vicinity. Lattice can scale to integrate thousands of sensors and effectors globally across multiple domains. -
5
Red 6
Red 6
ATARS is a multi-node, all-domain, augmented reality (AR) system that enables a complete LVC ecosystem for multiple users, from beyond visual range (BVR) to within visual range (WVR) in dynamic environments. Utilizing an extremely low-latency protocol that is waveform and network agnostic, ATARS delivers the high-speed data passage necessary to create a seamless, multi-player, augmented reality experience viewed through a full-color, wide field of view, and high-resolution display. Our EVE headset (Enhanced Visual Environment) is a transformational leap in wearable augmented reality technology. Previously there has been no means by which virtual assets could be visually represented in the real world, outdoors, and at high speeds. Red 6’s EVE hardware is the brightest headset available, allowing for outdoor use in full daylight and, critically, in high-speed environments. -
6
CrowdStrike Falcon Adversary Intelligence
CrowdStrike
CrowdStrike Falcon® Adversary Intelligence provides cutting-edge threat intelligence to help organizations proactively identify and mitigate cyber threats. With access to over 250 adversary profiles, dark web monitoring, and real-time threat intelligence, businesses can strengthen their defense and accelerate response times. This platform integrates seamlessly into existing security operations, offering automated threat modeling, sandbox analysis, and the ability to automate security workflows. CrowdStrike Falcon® empowers organizations to stay ahead of emerging threats with comprehensive insights into adversary tactics, techniques, and procedures. -
7
Common Message Processor (CMP)
JB Management
CMP is a user-friendly Java® application that provides the capability to process formatted military messages. It is widely used throughout the United States DoD to provide a bridge between tactical, email, legacy, and web-enabled users. CMP provides message parsing, validating, journaling, generating, and editing capabilities essential to the proper processing of military standard (MIL-STD) messages. The software validates message structure, content, and context as per the associated MIL-STD specifications. Portable, Java-based applications. Multi-platform support (Windows x86/x64, Linux x86/x64). Extensive Java Application Programmer Interface (API). In addition, CMP has been independently validated by Conformance to Standards (CTS) testing by the Joint Interoperability Test Command (JITC). It provides for backward compatibility with fielded systems with support for many MIL-STD headers and numerous message baselines (and annual revisions).Starting Price: $599 one-time payment -
8
Modirum | Gespi
Modirum | Gespi
Modirum Gespi delivers mission-critical situational awareness and advanced defense-technology solutions designed for both civil-security and government environments. Their platforms provide real-time insights, comprehensive intelligence, and decision-support tools that enhance operational effectiveness in complex, fast-moving scenarios. With a focus on deep-technology integration, the company combines hardware, software, and AI-driven systems engineered for resilience, high reliability, and deployment in demanding conditions. Their portfolio includes autonomous systems, communications infrastructure, and full-spectrum defence electronics, enabling customers to operate with enhanced visibility, coordination, and readiness. Modirum Gespi emphasises interoperability, rapid deployment, and adaptability to evolving threats and environments. -
9
Rebellion Defense
Rebellion Defense
We believe warfighters must be equipped with the best software capabilities to detect, deter, and outpace the modern adversary at speed and scale. We’ve brought together private sector technologists with defense veterans who deeply understand the mission. Together, we build technology for defense and national security. We develop advanced software to outpace national security threats. Gain real-time entity identification and tracking for complex threat environments. Rebellion builds software to analyze and secure mission data at speed and scale. We deliver decision-quality insights so operators and analysts can make faster, more informed decisions to keep our adversaries at bay. Gain real-time tracking, predictive analytics, and adaptive planning for complex mission environments. Understand your mission’s exposure to global cyber threats by using automated adversary emulation. Our software delivery model guarantees adaptability, flexibility, and resilience. -
10
Falcon Prevent
CrowdStrike
CrowdStrike's cloud-native next-gen antivirus protects against all types of attacks from commodity malware to sophisticated attacks — even when offline. Falcon Prevent is fully operational in seconds, no need for signatures, fine-tuning, or costly infrastructure. From initial deployment through ongoing day-to-day use, Falcon Prevent operates without impacting resources or productivity. Exploit blocking stops the execution and spread of threats via unpatched vulnerabilities. Detect and quarantine on write stops and isolates malicious files when they first appear on a host. Industry-leading threat intelligence is built into the CrowdStrike Security Cloud to actively block malicious activity. Unravels an entire attack in one easy-to-grasp process tree enriched with contextual and threat intelligence data. Prevention events are reported using detailed terminology from the MITRE ATT&CK framework to pinpoint the exact tactics and techniques being used. -
11
Falcon 3
Technology Innovation Institute (TII)
Falcon 3 is an open-source large language model (LLM) developed by the Technology Innovation Institute (TII) to make advanced AI accessible to a broader audience. Designed for efficiency, it operates seamlessly on lightweight devices, including laptops, without compromising performance. The Falcon 3 ecosystem comprises four scalable models, each tailored to diverse applications, and supports multiple languages while optimizing resource usage. This latest iteration in TII's LLM series achieves state-of-the-art results in reasoning, language understanding, instruction following, code, and mathematics tasks. By combining high performance with resource efficiency, Falcon 3 aims to democratize access to AI, empowering users across various sectors to leverage advanced technology without the need for extensive computational resources.Starting Price: Free -
12
Leidos VACIS
Leidos
VACIS systems scan cargo containers, trucks, railcars, buses, and passenger vehicles to help authorities search for narcotics, weapons, nuclear material, undeclared goods, and other contraband at ports of entry, border crossings, military facilities, and other checkpoints. Leidos is a world leader in non-intrusive inspection technology. Since the technology in 1999, hundreds of systems have been deployed for government and commercial clients around the world. Every VACIS system is available with our dedicated installation, training, maintenance, and technical support. The shortest wheelbase and the lightest weight in its class for better maneuverability and handling, an industrial chassis designed for firetruck duty, a global support network, and an advanced high-energy imaging system with material discrimination. These features and It's AI/ML capabilities allow inspectors to quickly and accurately search for weapons, contraband, undeclared cargo, and other items. -
13
Falcon Mamba 7B
Technology Innovation Institute (TII)
Falcon Mamba 7B is the first open-source State Space Language Model (SSLM), introducing a groundbreaking architecture for Falcon models. Recognized as the top-performing open-source SSLM worldwide by Hugging Face, it sets a new benchmark in AI efficiency. Unlike traditional transformers, SSLMs operate with minimal memory requirements and can generate extended text sequences without additional overhead. Falcon Mamba 7B surpasses leading transformer-based models, including Meta’s Llama 3.1 8B and Mistral’s 7B, showcasing superior performance. This innovation underscores Abu Dhabi’s commitment to advancing AI research and development on a global scale.Starting Price: Free -
14
Falcon Forms
Falcon Forms
Digitize your day-to-day paperwork with Falcon Forms. Using Falcon Forms build and configure your own forms seamlessly in an instant tailored, and perfectly adapted to what your activity or business requires. Falcon Forms is perfectly adapted to what paper-based workflows require. This is an offline app where you don’t need any network connection to build templates or fill out forms. Falcon Forms is designed to cater reporting & documentation to almost all lines of work irrespective of domains. Falcon Forms also allows real-time collaboration by allowing sharing of the PDF files and Form Templates (JSON format) via email and third-party cloud storage providers like iCloud, Box, Dropbox, OneDrive, Adobe Creative Cloud, Google Drive, pCloud, Terabox and much more using the Files App (iOS).Starting Price: Free -
15
FalconStor
FalconStor Software
FalconStor is a trusted data protection innovator with over an Exabyte of data under management, enabling the world’s most demanding enterprises to modernize their data backup and archival operations across data centers and public clouds. The company delivers increased data security and provides the fast recovery from ransomware attack while driving down costs by up to 90 percent. FalconStor is trusted by 1,000 customers and a network of partners around the world. -
16
FalconMetrics
FalconMetrics
FalconMetrics is a mobile attribution and analytics software built around its FalconTrack™ technology that delivers real, first-party data matching from ad clicks through installs while staying compliant with privacy frameworks like Apple’s ATT and SKAdNetwork, letting you know exactly which ads drive conversions without inconsistent dashboards or hidden complexity. It offers lightweight SDKs for Android, iOS, and Flutter that integrate directly with ad platforms and app events, enabling real-time insights and optimization inside native ad dashboards, and supports event and conversion tracking such as sign-ups, purchases, and other user actions with privacy-aware options for IP and identifier handling. FalconMetrics is designed with a Flutter-first approach, providing fast setup, efficient performance, and cross-platform support from a single codebase. It emphasizes transparent, simple integration with major ad networks like Meta and aims to capture all meaningful conversions.Starting Price: $0.05 per conversation -
17
Google Cloud Cybershield
Google
The Google Cybersecurity Action Team (GCAT) is a premier security advisory team with the singular mission of supporting the security and digital transformation of governments, critical infrastructure, enterprises, and small businesses. GCAT offers strategic advisory services, providing guidance on security strategies and digital security transformation programs, including program management and professional services support. Their trust and compliance services map global compliance certifications to industry control frameworks, simplifying the compliance journey for organizations. The team delivers proven blueprints and architectures for deploying Google Cloud products securely, in line with regulatory requirements, and offers comprehensive solutions for autonomic security operations and cyber resilience. Additionally, GCAT provides threat intelligence and incident response services, including threat briefings, threat horizons intelligence reports, preparedness drills, etc. -
18
Systematic IRIS Suite
Systematic Defence
Powerful military messaging and interoperability capabilities, directly off-the-shelf. The IRIS suite has revolutionized military messaging and interoperability in modern defense forces with its range of commercial off-the-shelf (COTS) software solutions. In service with numerous NATO nations, the IRIS suite is combat-proven, meeting the demands of the modern battlespace. The IRIS suite covers all aspects of military messaging, from management and maintenance of standards to production and distribution of military messages. With its support of various Message Text Formats (MTF) and binary standards, the IRIS suite is a flexible and adaptable software solution for military professionals that provides strong military messaging and interoperability capabilities directly off the shelf. As the IRIS suite integrates seamlessly with standard products, such as Microsoft Office, it provides you with a user-friendly framework for drafting, editing, and sending military messages. -
19
Falcon Firewall Management
CrowdStrike
Falcon Firewall Management makes it easy to create, manage and enforce policies with a simple, centralized approach. Defend against network threats, and gain instant visibility to enhance protection and inform action.Delivered via the same lightweight Falcon agent, management console and cloud-native architecture, it deploys and is operational in minutes. Simplifies operations by using the same lightweight Falcon agent, management console and cloud-native architecture. Deploys and is operational in minutes without requiring reboots, fine-tuning or complex configuration. Streamlines workflows and increases visibility across endpoint security controls due to the single management console for both endpoint protection and host firewall management. Automatically identify and view specific activities, potential threats and network anomalies. -
20
Axon Vision
Axon Vision
The modern battlefield consists of small targets concealed in an urban area. Additionally, current sensors are flooding the human operator with information. Our technology boosts the effectiveness and survivability of manned & unmanned platforms by increasing situational awareness, speeding decision-making, and enabling autonomous capabilities. Our products are integrated into military-grade platforms, through partnerships with leading multi-national companies. We uncover the full and uncompromising potential of AI to solve today’s most critical challenges while leading tomorrow’s AI-powered defense technology. Multiple hardware options and complete software function configuration flexibility provide integrators with powerful video processing solutions. Our flexible video processing hardware and software enable camera system integrators to create a tailored solution in a wide range of civil, commercial, and military operations. -
21
Formed through the acquisition of multiple companies, this A&D company needed to consolidate systems and support its plans for organic growth by lowering its total cost of ownership. Additionally, the company looked to gain more flexibility with its solution, centralize support, and deploy updates faster and with more agility. The company selected CloudSuite™ Aerospace & Defense to manage the supply chain across five North American sites with the roll-out of a global chart of accounts to support their finance needs. To meet the demanding timeline required for deployment, the company used an Infor Implementation Accelerator—a combination of software, services, education, and tools to speed deployment without modifications. CloudSuite Aerospace & Defense software provides advanced capabilities relied upon by 5,500+ aerospace and defense manufacturers worldwide.
-
22
Falcon XDR
CrowdStrike
Supercharge detection and response across your security stack with Falcon XDR. With industry-leading endpoint protection at its core, Falcon XDR synthesizes multi-domain telemetry to provide security teams with one unified, threat-centric command console. Take EDR to the next level with consolidated, multi-platform telemetry that dramatically enhances threat correlation and speeds response times against sophisticated attacks. Accelerate threat analysis and hunting by transforming previously siloed, disconnected data into strong, cross-platform attack indicators, insights, and alerts. Turn XDR insight into orchestrated action. Empower security teams to design and automate multi-stage, multi-platform response workflows for surgical, full-stack remediation. -
23
Scale Donovan
Scale
Personnel constrained by time, technology, and other resources overlook petabytes of historical information and incoming data. Uncertainty around the information that exists prevents you from unlocking valuable insights and providing optimal recommendations. Classified information can’t leave secure networks and be sent directly to open-source AI models. Existing AI solutions are not geared toward defense and intelligence use cases, terminology, or context. Stakeholders frequently need written reports and briefings that require manual and time-intensive effort. Stakeholders require an adaptable solution that can conduct translation, coding assistance, and parse data for insights. Dig into all available data to rapidly identify trends, insights, and anomalies. Accelerate intelligence cycles and provide exhaustive analysis without overlooking information. Precisely translate documents with Donovan to capture semantic nuance and context. -
24
Falcon Cloud Workload Protection
CrowdStrike
Falcon Cloud Workload Protection provides complete visibility into workload and container events and instance metadata enabling faster and more accurate detection, response, threat hunting and investigation, to ensure that nothing goes unseen in your cloud environment. Falcon Cloud Workload Protection secures your entire cloud-native stack, on any cloud, across all workloads, containers and Kubernetes applications. Automate security and detect and stop suspicious activity, zero-day attacks, risky behavior to stay ahead of threats and reduce the attack surface. Falcon Cloud Workload Protection key integrations support continuous integration/continuous delivery (CI/CD) workflows allowing you to secure workloads at the speed of DevOps without sacrificing performance -
25
Falcon
Falcon
Falcon is a blazing fast, minimalist Python web API framework for building robust app backends and microservices. The framework works great with both asyncio (ASGI) and gevent/meinheld (WSGI). The Falcon web framework encourages the REST architectural style. Resource classes implement HTTP method handlers that resolve requests and perform state transitions. Falcon complements more general Python web frameworks by providing extra reliability, flexibility, and performance wherever you need it. A number of Falcon add-ons, templates, and complementary packages are available for use in your projects. We've listed several of these on the Falcon wiki as a starting point, but you may also wish to search PyPI for additional resources. -
26
Armory Master Pro
Armory Master
Our weapons tracking system, designed for armory management, is perfect for law enforcement, the military, security firms, gun shops, shooting clubs, and sports shooters. This system ensures efficient and secure firearm tracking. Secures with military-grade technology. Field-tested weapons tracking system. Secure SSL encryption and RFID tracking. RFID technology has greatly improved how we keep track of things like equipment and assets, making it a key player in digital weapons tracking systems. Our experts can help you customize Armory Master Pro, our advanced weapons tracking system, to perfectly fit your needs and prevent weapon loss. Leveraging over 20 years of expertise in asset tracking expertise and a robust portfolio of field-tested projects, our Armory Master Pro offers military-grade precision for weapons tracking systems. Employing advanced SSL encryption and RFID technology, we guarantee high-accuracy firearm tracking. -
27
Aviz Networks
Aviz Networks
Aviz offers a data-centric stack that is vendor agnostic supports multiple ASICs, switches, NOS, clouds, and LLMs, and integrates seamlessly with AI and security applications. It is designed for open source networking and works effectively with existing network infrastructures, ensuring a seamless transition. Aviz empowers customers to choose their solutions without vendor lock-in, offering an enterprise-grade experience across a multi-vendor ecosystem. Unlock powerful insights and enable Gen AI across your network with our conversational tool that answers questions on everything from compliance to capacity planning instantly. Experience seamless integration and a guaranteed 40% ROI with non-intrusive, predefined AI use cases tailored specifically for you. Achieve substantial savings with our software-defined packet broker on your choice of switches, leveraging open source technology. -
28
Shift
Shift
We help unlock the full potential of the American economy by delivering cross-industry upskilling programs for active duty and a high-impact talent marketplace highlighting military talent. Our vision is to create a world where career growth and learning are visible, accessible, and affordable, and the diversity of someone’s experience and achievements are fairly assessed and celebrated. A mission to supercharge the defense-industrial partnership that underpins America’s national security and economic vitality. A proven, scaleable military assessment system that underpins training programs to more effectively communicate, collaborate, and partner with the private sector. Our talent marketplace recommends the best-fit military talent to your needs, enabling you to host active duty fellows or transitioning interns who bring defense expertise to your organization. Continue the mission through transition with access to civilian recruiters within Shift's network of defense-tech partners. -
29
Nexium Defence Cloud
Thales
Nexium Defence Cloud is a comprehensive, modular private cloud infrastructure tailored to meet the stringent security and operational demands of military forces. It enables armed forces to swiftly adapt their Communications and Information Systems (CIS) to dynamic operational scenarios, facilitating rapid deployment of services and communities of interest through mission-oriented, automated management tools. By integrating civil cloud technologies into military environments, Nexium Defence Cloud enhances operational efficiency, accelerates maneuvers, and empowers joint force commanders to prepare missions in days, deploy in hours, and adapt in minutes, all with minimal expertise. The solution offers a distributed cloud node architecture, providing local storage and computing capabilities to avoid single points of failure, with form factors ranging from rackable nodes for headquarters to rugged edge servers for hostile environments. -
30
AI Verse
AI Verse
When real-life data capture is challenging, we generate diverse, fully labeled image datasets. Our procedural technology ensures the highest quality, unbiased, labeled synthetic datasets that will improve your computer vision model’s accuracy. AI Verse empowers users with full control over scene parameters, ensuring you can fine-tune the environments for unlimited image generation, giving you an edge in the competitive landscape of computer vision development. -
31
Falcon Sandbox
CrowdStrike
Falcon Sandbox performs deep analysis of evasive and unknown threats, enriches the results with threat intelligence and delivers actionable indicators of compromise (IOCs), enabling your security team to better understand sophisticated malware attacks and strengthen their defenses. Unique hybrid analysis technology detects unknown and zero-day exploits while defeating evasive malware. Uncover the full attack lifecycle with in-depth insight into all file, network, memory and process activity. Save time and make all security teams more effective with easy-to-understand reports, actionable IOCs and seamless integration. The most sophisticated analysis is required to uncover today’s evasive and advanced malware. Falcon Sandbox’s Hybrid Analysis technology exposes hidden behavior, defeats evasive malware and delivers more IOCs, to improve the effectiveness of the entire security infrastructure. -
32
Falcon Forensics
CrowdStrike
Falcon Forensics offers comprehensive data collection while performing triage analysis during an investigation. Forensic security often entails lengthy searches with numerous tools. Simplify your collection and analysis to one solution to speed triage. Incident responders can respond faster to investigations, conduct compromise assessments along with threat hunting and monitoring with Falcon Forensics. Pre-built dashboards, easy search, and view data capabilities empower analysts to search vast amounts of data, including historical artifacts, quickly. Falcon Forensics automates data collection and provides detailed information around an incident. Responders can tap into full threat context without lengthy queries or full disk image collections. Provides incident responders a single solution to analyze large quantities of data both historically and in real-time to uncover vital information to triage an incident. -
33
Falcon Horizon CSPM
CrowdStrike
Falcon Horizon delivers continuous agentless discovery and visibility of cloud-native assets from the host to the cloud, providing valuable context and insights into the overall security posture and the actions required to prevent potential security incidents. Falcon Horizon provides intelligent agentless monitoring of cloud resources to detect misconfigurations, vulnerabilities and security threats, along with guided remediation to resolve security risks and enable developers with guardrails to avoid costly mistakes. Falcon Horizon’s adversary-focused approach provides real-time threat intelligence on 150+ adversary groups, 50+ IOA detections and guided remediation that improves investigation speed by up to 88%, enabling teams to respond faster and stop breaches. Get up and running in minutes and access a single source of truth for all cloud assets and security configurations across multi- cloud environments and accounts. -
34
SitaWare Suite
Systematic Defence
Dominate the battlespace with comprehensive situational awareness on all levels of command. The SitaWare suite offers C4ISR solutions for battle management across the entire battlespace, on land, at sea, in the air, or in the joint domain. As a combat-proven commercial off-the-shelf software, the suite provides advanced command-and-control capabilities and seamless interoperability, enabling you to share information with coalition partners. Each part of the SitaWare suite is specially developed to support specific roles. From fixed and deployable headquarters operations to mounted missions and dismounted troops, the SitaWare suite encompasses the entire battlespace. With its open architecture and rapidly scalable configuration, it can easily meet the ever-changing needs of modern defense forces. Operating across all domains and levels of command, the SitaWare suite allows for an accessible, sharable, and secure common operating picture. -
35
CrowdStrike Falcon Exposure Management
CrowdStrike
CrowdStrike Falcon Exposure Management is an attack surface management platform delivering autonomous, 24/7 discovery of exposed assets across all environments and the supply chain. Leading enterprises worldwide use CrowdStrike Falcon Exposure Management to gain unparalleled visibility of their internet-facing assets and actionable security insights for eliminating shadow IT risks. CrowdStrike Falcon Exposure Management's proprietary technology maps the world's internet exposed assets in real-time. Cutting edge ML classification and association engines analyze all the assets and automatically create your complete inventory. CrowdStrike EASM stands out with its deep adversary intelligence, allowing for precise risk prioritization. Understand threats from an attacker’s perspective and act quickly to secure your assets. -
36
Falcon Spotlight
CrowdStrike
Falcon Spotlight provides real-time visibility across your enterprise — giving you the relevant and timely information you need to reduce your exposure to attacks with zero impact on your endpoints. As part of an integrated platform that prevents exploits and post-exploit activity, Falcon Spotlight™ allows you to research common vulnerabilities and exposures (CVEs) to examine threat actor profiles and targets. Spotlight utilizes scanless technology, delivering an always-on, automated vulnerability management solution with prioritized data in real-time. It eliminates bulky, dated reports with its fast, intuitive dashboard. The cloud-native CrowdStrike Falcon® platform and single lightweight agent collect data once and reuse it many times. As a result, Spotlight requires no additional agents, hardware, scanners or credentials — simply turn on and go. -
37
Falcon Identity Threat Detection
CrowdStrike
Falcon Identity Threat Detection lets you see all Service and Privileged accounts on your network and cloud with full credential profiles and weak authentication discovery across every domain. Analyze every domain in your organization for potential vulnerability from stale credentials, and weak or stale passwords, see all service connections and weak authentication protocols in use. Falcon Identity Threat Detection monitors the domain controllers on-premises or in the cloud (via API) to see all authentication traffic. It creates a baseline for all entities and compares behavior against unusual lateral movement, Golden Ticket attacks, Mimikatz traffic patterns and other related threats. It can help you see Escalation of Privilege and anomalous Service Account activity. Falcon Identity Threat Detection reduces the time to detect by viewing live authentication traffic, which expedites finding and resolving incidents. -
38
SmartCam3D View
Rapid Imaging Software
SmartCam3D® situational awareness software provides geospatial augmented reality overlays on live video at 30+ frames per second. This technology originally served as the primary flight display for the NASA X38 during initial unmanned testing and today is deployed with US Army Tactical Unmanned Systems as a module within the Universal Ground Control Stations used in conjunction with the Hunter, Shadow, and Gray Eagle UAV Platforms. Additional integrations of this technology include EO/IR Gimbals, sUAS Pilot Applications, a plugin for the Android Tactical Assault Kit (ATAK), and a comprehensive Mission Management Application for the manned ISR market. SmartCam3D® provides enhanced situational awareness to a variety of stakeholders and end-users throughout the ISR ecosystem – from the front-line to the Operations Center. -
39
TMS FALCON
Optidata
Transport planning, monitoring, settlement and analysis of transport processes have never been more effective. TMS FALCON ® is an IT system of the TMS class , which is an expert in reducing costs in the field of transport management. The extended price lists function allows you to choose the cheapest carrier and negotiate prices, which is why you will estimate transport costs at the planning stage. Thanks to the notification of transport in TMS FALCON ® you will increase the level of service for transport companies, you will be able to monitor the delivery of goods and you will reduce unnecessary downtime. The TMS FALCON ® system as an advanced transport management program contains a lot of functionalities that help in effective control over drivers, vehicle fleets and transport service providers. -
40
Palantir AIP
Palantir
Deploy LLMs and other AI — commercial, homegrown or open-source — on your private network, based on an AI-optimized data foundation. AI Core is a real-time, full-fidelity representation of your business that includes all actions, decisions, and processes. Utilize the Action Graph, atop the AI Core, to set specific scopes of activity for LLMs and other models – including hand-off procedures for auditable calculations and human-in-the-loop operations. Monitor and control LLM activity and reach in real-time to help users promote compliance with legal, data sensitivity, and regulatory audit requirements. -
41
Precise BioLive
Precise Biometrics
BioLive is Precise Biometrics' AI-powered anti-tampering and liveness detection software designed to drastically reduce fraud and tampering risks. Easily integrated with any fingerprint sensor in mobile or desktop environments, BioLive requires no additional hardware, minimizing costs and operational impact. Leveraging machine learning technology, it can be tailored to specific sensor technologies, maximizing accuracy in distinguishing real fingerprints from fake ones, regardless of spoofing material, process, or tactic. It is upgradeable, and countermeasures are continually being developed to keep pace with emerging spoof threats. BioLive can operate independently of fingerprint-matching algorithms and integrates seamlessly with user authentication applications. It is also tightly integrated with Precise BioMatch Mobile (BMM), enabling mobile device OEMs to meet emerging security standards in many ecosystems. -
42
Tactic
Waterloo Manufacturing Software
Works with and does not replace your MRP / ERP! TACTIC is highly customizable, advanced planning and manufacturing production scheduling software developed by Waterloo Manufacturing Software. Suitable for discrete and batch industry manufacturers, TACTIC reduces supply and inventory costs while improving customer service. Manufacturers use TACTIC to promise delivery, plan and schedule production, plan material and capacity, and deal with changes and problems. TACTIC s sophisticated scheduling algorithms and what-if features let management teams continuously balance what’s good for business with what’s good for customers. Waterloo Manufacturing Software’s technical consultants provide a number of pre-sale and post-sale services for TACTIC. These services help you both asses the technology and get ever-increasing value from its use in your operations. -
43
Falcon Chat
TII
Falcon LLM is a state-of-the-art open source large language model family developed by the Technology Innovation Institute (TII) that delivers advanced generative AI capabilities for natural language understanding, reasoning, and content generation across diverse applications. Built with hybrid Transformer and Mamba architectures, Falcon models span a range of sizes from compact 7B models with strong reasoning performance to large models like Falcon 180B that rival leading AI systems, making them efficient, scalable, and suitable for real-world tasks including text generation, translation, summarization, sentiment analysis, and chat-style conversational agents. It supports multilingual and multimodal use, handling multiple languages and data types, and integrates capabilities for long context processing, coding, logic, and math reasoning while remaining efficient even on resource-limited environments. -
44
FalconTune
IMB Controls
FalconTune© is a PID loop-tuning software for distributed control systems (DCS) and programmable logic controllers (PLC). Detailed description of the software is available upon request. FalconTune© is currently optimized for Yokogawa DCS© but will work with any DCS or PLC through the OPC communication protocol. A range of available licenses provides flexibility to the end-users. Yearly and perpetual, as well as workplace-based and site-wide licenses are available. IMB Controls Inc. performs research and development in process control. IMB has developed FalconTune, which is an automated PID loop tuning software. IMB Controls was founded by Dr. Igor Boiko, who is a leading researcher in the field of control systems. Dr. Igor Boiko is currently a Professor of Electrical Engineering at the Petroleum Institute (PI) in Abu Dhabi. -
45
UVI Falcon
UVI
UVI Falcon is a comprehensive hybrid instrument that combines advanced sampling and synthesis capabilities within a semi-modular environment. It features 20 oscillator types, including virtual analog, wavetable, FM, additive, and granular synthesis, allowing for extensive sound design possibilities. With over 100 high-quality effects, users can apply various processing techniques such as reverb, delay, modulation, and filtering to enhance their sounds. Falcon's modulation system includes envelopes, LFOs, and step sequencers, enabling dynamic and evolving textures. The software also supports MIDI processing and scripting, providing tools for creating complex performances and custom instruments. Falcon's interface is adaptable, featuring a new browser for efficient preset management and an intuitive workflow for sound creation. It comes with a factory library of over 1,500 presets and offers expansion options through additional sound libraries.Starting Price: $299 one-time payment -
46
Siemens TACTICS
Siemens
TACTICS™ is fully compatible with Siemens SEPAC software, allowing users to benefit from all of the latest traffic control features. This includes system banks, NTCIP compliance, and a new import/export mechanism for configuration data that facilitates future support and changes. TACTICS™ employs the latest ECOM-to-NTCIP conversion facilities in SEPAC , which make it possible for the NTCIP protocol to be used. NTCIP helps to futureproof the software and to enable interoperability and interagency coordination. With a simplified user interface, installing the system is an easy process facilitated by a small number of clicks. The design also simplifies deployment of future TACTICS™ updates. Siemens is the first to market YAML, which can be edited using any simple text editor. This gives the traffic engineer easy and full control of the configuration data. -
47
Q-CTRL
Q-CTRL
Infrastructure software to power the quantum future. Quantum technology promises to transform the economy. We expand the utility of quantum computers and deliver new quantum sensing capabilities, all through software. Quantum infrastructure software transforms bare-metal quantum processors into useful computational tools. Our technology unleashes the hidden performance inside of the most powerful computers so you can achieve more. Add automation and performance management to my QC platform. Professional-grade toolkits to design, automate, and scale quantum hardware and controls. Unleash latent hardware performance with fully integrated performance management for cloud quantum computing platforms. Automatically reduce error and boost algorithmic success on cloud-accessible quantum computers. Professional-grade toolkits to design, automate, and scale quantum hardware and controls. -
48
Falcon X Recon
CrowdStrike
Falcon X Recon exposes digital risk by monitoring the hidden recesses of the internet where criminal actors congregate and underground economies thrive. Falcon X Recon provides real-time visibility to potential threats, reducing investigation time and improving efficiency and response. Take immediate action against digital risk on Day One — Falcon X Recon is built on the cloud-native CrowdStrike Falcon® Platform so there’s nothing to install, administer or deploy. Identify business, reputational and third-party risks emanating from leaked credentials, PII and financial data. View current and historical posts and chatter to track adversary activities and behavior that could pose a cyber or physical risk to your organization and personnel. Customize dashboards to enable users to see, at a glance, current notifications and quickly drill into critical alerts and activity for further research. -
49
Helsing
Helsing
Helsing is a new type of defense AI company. We believe that software, in particular artificial intelligence, will be the key to protecting our democracies. Our purpose is to attain technological leadership so that democratic societies are free to make sovereign decisions and control their ethical standards. Democracies are fragile. Protecting them from external threats is one of our most important responsibilities. We founded Helsing out of a belief that safety and deterrence are only possible if we embrace software and artificial intelligence to make our forces more effective. As democracies, we have a special responsibility to develop and deploy these technologies thoughtfully and with the highest ethical standards. Our approach is software-first. We partner with industry and governments to connect existing and new hardware platforms with advanced AI. We are looking for people with their hearts in the right place, who share our conviction that democratic values are worth protecting. -
50
DELOPT
DELOPT
DELOPT focuses on the design, development and production of embedded systems and electro-optics systems for military and civilian applications. Our offerings for defense includes avionics displays, on board computers, ate's, high speed data acquisition system, thermal imagers, target trackers etc. The Automatic Video Tracker (AVT) accepts video signal from a surveillance camera as input, tracks and provides the location of the chosen object with respect to the centre of Field of View of the camera as output. The AVT can be used to track static or moving objects from a static or moving platform. The DIR-SA-900 Series Thermal Imager developed by DELOPT is based on 25 micron pitch 384 x 288 uncooled microbolometer array operating at room temperature. New product DIR-SA-910 Series Handheld Thermal Imager.