S2 leverages technology disruptors to create the decision advantage for our customers through automation, artificial intelligence, machine learning, data analytics, and enhanced security solutions.
APP Hardening & AUTO-REMEDIATION
In today’s digital age, Cyber Security has become a top priority to protect the United States economy, infrastructure, and defense. No longer limited to just hackers and criminals, cyber-attacks are now utilized as weapons by nation states. As threats continue to evolve, it is no longer enough to secure networks, operating systems, and devices. Applications have become the new target for bad actors. At an RSA conference, Jenn Easterly the director of CISA stated that secure software is the only way to make ransomware a shocking anomaly. With finite budgets, Federal agencies must choose between achieving their modernization goals and addressing the building technical debt in the security of their legacy applications. This software security remediation can be a costly endeavor due to manual security processes and the creation of new code to remediate security gaps.
S2’s cutting-edge approach to cybersecurity includes automated powerful code-level testing capabilities that leverage industry-standard protocols like NIAP, OWASP, and Mitre CVEs. Test findings are evaluated by S2’s Artificial Intelligence Large Language Model and then are paired with recommended code to fix each security vulnerability. Automated testing and code generation (“auto-remediation”) offers the government an affordable approach to buying-down the security related technical debt on legacy and new apps. Our advanced technology generates executable applications for mobile, server or cloud-based applications and creates a security body of evidence to support attestation, all while ensuring the application version remains unmodified after testing through our secure supply chain.
If you would like to read S2’s white paper on this emerging solution, please click here.
- Meets
-
- Executive Order 14028 and OMB memorandum M-22-14 guidance
- Mobile Application Security Requirements
- National Information Assurance Partnership (NIAP), Application Software Protection Profile
- Supports
- Mobile, server, or cloud-based applications
- Open-source data/code dependencies
Mobile App Development and edge computing powering facial recognition
Currently the state of the art in biometric identification requires willing participants or requires network connectivity to perform matching, short ranges or relies on expensive drone technology. S2 developed an affordable suite of solutions that allows for remote biometric identification that is 4 to 6 times further than current DoD capabilities.
To achieve this new capability, S2 developed custom software for API integration (S2’s Identify Integration Hub), memory management and the user interface on an off the shelf Android mobile device. Our solution not only allows integration between our application and biometric matchers on the mobile device, it also enables edge processing on the mobile device. Our innovation enables high confidence identification via facial recognition from a safe distance without the need for network or satellite communication. Our solutions resulted in reliable facial recognition of a human over 1 mile.
- Benefits
-
- Increases agent/solider safety by its ability to operate at longer ranges (i.e. >1 mile)
- Avoids alerting targets that they are under surveillance
- Expands the amount of territory that can be placed under biometric surveillance when in autonomous mode
- More cost effective than drone-based platforms