Attacks on information systems (IS) and their integrity are now a daily occurrence and are becoming increasingly rapid and aggressive. Their consequences are often very serious and irreparable.
For a company, they jeopardize its production, its relations with its customers and suppliers, and ultimately stop purely and simply their commercial activity without counting the irreversible damage in terms of e-reputation. The economic impact is major, sometimes even fatal.
In the case of governmental organizations, the objective of these attacks is quite different. The goal is to destabilize the State by jeopardizing the security of people, organizations and places, either by disrupting the information system and rendering the necessary data exchanges between services inoperative, or by espionage practices.
How can we prevent these threats and, when they occur, limit their spread and contamination?
The challenge for Ministries and actors in the Defence and Security sector is to have efficient and structuring tools capable of analyzing the vast quantity and variety of data (audio, video, text, images) available to them in order to safely carry out their regalian mission:
- Inform geo-political decision-making
- Ensure the security of goods, people and events
- Maintain the country’s competitiveness
They need tools to identify weak signals of potential threats in order to assess the risks involved in order to prevent and above all counter them.
Flandrin Technologies' solutions
Flandrin Technologies offers solutions that support Defence Security actors in all stages of the data processing and investigation process.
Argonos, the data operating system
The data operating system allows to handle use cases in the field of military, security, social, political and economic intelligence with 5 key benefits:
- Maintain operational superiority
- Accelerate the provision of strategic and differentiating indicators
- Tooling intelligence research and detection of weak signals in information oceans
- Increase informational capacity
- Increase the performance of dedicated solutions OSINT
Argonos is composed of 3 modules to extract the full value of the data:
- The Data Preparation module takes in raw (unstructured) data from different sensors (visible and invisible web, social networks) or connects to your own sensors, whatever their nature (socmint, webint, osint, geoint …).
Then it transforms them to enrich them, normalize them, make them usable with each other. For example, transforming videos into text, extracting concepts, places, names from these texts, solving the geolocation of data, doing facial recognition…
- The Data Projection module will process all the transformed data from the Data Preparation and calculate the relationships between the objects according to the analyst’s universe, his or her use cases.
- The Data Analysis module will offer tools for exploitation, research, navigation and investigation within these universes and restore the data in the format that suits you (mapping, spreadsheet, target entities…).
CrossinG is an integrated security device designed for operators of vital importance who are required to strongly partition critical information systems and control exchanges with the outside world. CrossinG enables high-speed file transfers while maintaining an absolute seal between two networks thanks to software diode technology. The transferred content is subject to on-the-fly security controls (whitelisting, antivirus, format analysis, sealing, watermarking, signature verification). The solution manages inbound and outbound access permissions, and keeps track of all transfers.
Crossing has been deployed at several large OVIs for multiple uses: administration network exchange system (ANSSI PA-022 standard), IT-OT partitioning in industry, protection of sensitive data (ANSSI PA-075 standard), control of UHD content import in media broadcasting companies, cold backup of databases in the SecNumCloud cloud.
Trezell, an evolution of CrossinG for real-time military use, enables the exchange of tactical information in operation between systems of different classification levels, in 3D or in coalition.
Contact our security experts:
Contact our security experts: