October/November 2015 Digital Edition
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
and homeland security applications<br />
which require long range, accurate<br />
performance in various terrain and<br />
weather conditions. The system acceptance<br />
of PureTech’s solution<br />
for use at the U.S. border confirms<br />
that we are correctly addressing the<br />
needs of this market.”<br />
The RVSS Upgrade program has<br />
a potential 10-year performance<br />
period, during which the General<br />
Dynamics OneSource team, which<br />
includes PureTech Systems, will<br />
manage the operation and maintenance<br />
at all sites.<br />
PureTech Systems Inc. is a manufacturer<br />
of wide-area perimeter surveillance<br />
software solutions including<br />
internally developed outdoor video<br />
analytics, multi-sensor integration<br />
and a map-based (real object size)<br />
command and control. It is offered to<br />
fortune 1000 firms, petro-chemical,<br />
water and electric utilities, seaports,<br />
airports and federal, state and local<br />
governments. With headquarters in<br />
Phoenix Arizona, PureTech Systems<br />
serves national and international<br />
markets. To find out more about<br />
PureTech Systems Inc. visit our website<br />
at www.puretechsystems.com or<br />
contact Eric Olson at 602-424-9842<br />
or Eric.Olson@PureTechSystems.com.<br />
ThreatConnect & DGI uncover<br />
extensive South Chinese espionage<br />
Continued from page 9<br />
cal analysis, as well as data visualization<br />
to clearly connect the points<br />
between the adversary, their capabilities,<br />
the infrastructure they used<br />
and the victims being targeted.<br />
To create this report, ThreatConnect<br />
used a unique methodology<br />
built into their Threat Intelligence<br />
Platform called The Diamond Model<br />
of Intrusion Analysis. Using that<br />
repeatable process, any ThreatConnect<br />
user can derive a multidimensional<br />
picture of the underlying relationships<br />
between threat actors,<br />
their tools, techniques and processes.<br />
The full Project CAMERASHY<br />
report is available at http://www.<br />
threatconnect.com/camerashy.<br />
About ThreatConnect, Inc.<br />
ThreatConnect, Inc. provides industry-leading<br />
advanced threat<br />
intelligence software and services<br />
including ThreatConnect®, the<br />
most comprehensive Threat Intelligence<br />
Platform (TIP) on the market.<br />
ThreatConnect delivers a single<br />
platform in the cloud and on-premises<br />
to effectively aggregate, analyze,<br />
and act to counter sophisticated<br />
cyber-attacks. Leveraging advanced<br />
analytics capabilities, ThreatConnect<br />
offers a superior understanding<br />
of relevant cyber threats to business<br />
operations. To register for a free<br />
ThreatConnect account, or to learn<br />
more about our products and services,<br />
visit: www.threatconnect.com.<br />
33