Products Blurb

A2I offers software products when solutions are applicable to multiple customers, meeting multiple mission requirements in a more cost-effective fashion than selling services. We excel in applying our cyber sector’s capabilities to product software products, and can produce products from almost any of those capabilities. A2I currently sells products to meet the requirements of the following mission requirements:

CALEA and Lawful interception
A2I offers software products performing vital functions for organizations to ensure CALEA compliance. Our software performs many compliance functions including tasking, mediation, and implementing the CALEA handover interfaces to transport intercept data to law enforcement agencies. The software is developed in an extensible fashion, enabling us to adapt quickly to expanding and changing customer requirements.

Open Source Intelligence
A2I offers a suite of software products designed to leverage the goldmine of information available on the open internet. We specialize in uses benefitting national security, and can operate across most open source domains including social media, general web searching, and non-traditional data sources. Our software is designed to meet the needs of groups ranging from a single analyst to a large organization with thousands of employees.

Network Forensics
A2I offers the network forensics community with software to quickly and efficiently investigate network traffic. With our software, end users are able to quickly and easily dive into detailed information on their network, and answer questions related to a network’s security posture, insider threat activity, and devices present on the network over the past 30 days. Our solutions are offered as software-only or preinstalled on an appliance for customer convenience.

Custom Network Protocol Processing Solutions
A2I builds custom network protocol processing solutions to meet our customer’s specific requirements. Our Growlan data processing framework is a collection of reusable modules that allows us to build custom applications with a reduced time to market and lower price point than other alternatives. Our primary focus is on network protocol processing, and we build applications for any use case including network forensics, lawful interception, cyber security, and network diagnostics.

Old Cyber Blurb

A2I’s cyber sector solves challenging problems to benefit national security. We help our customers succeed in their missions by offering cutting edge products and services. Our primary focus is on developing software to extract actionable intelligence from electronic communications, but our ambitious staff are equipped to tackle almost any software engineering problem – we excel in facing new challenges.

Our core skills include:

Developing custom software solutions to process intercepted data sets
We understand the internet, how it works, and how the billions of people connected to the internet communicate. We apply that expertise daily to mine every possible bit of intelligence from collected data for law enforcement, intelligence, and private sector customers. Our capabilities in this area are wide-ranging, and include software to process intercepted packet data, CALEA-compliant mediation solutions, and network monitoring solutions for cybersecurity.

Performing digital forensics
Identifying, extracting, and processing data at rest on devices is key to missions ranging from law enforcement analyzing seized media to private sector organizations mitigating inside threats. A2I is highly skilled in performing these functions, making sense of the data, and making it relevant to our customers’ missions.

Developing software to mine Open Source Intelligence
Social media has changed how the world communicates, and has also changed the way that investigations are performed. We recognized this early and have been offering software to aid in social media investigations for nearly 7 years. We offer a licensed software product, SocioSpyder, to performed targeted investigative functions including: download data of interest, retain a copy offline, analyze the data on the platform, and export pertinent information to external enterprise analysis platforms.