New Software Makes Data From Multiple Sources Readable

Military analysts and combat fighters encounter new threats daily. These include Improvised Explosive Devices (IED), ambush attacks and firefights. Now BAE Systems has created the GXP Fusion software, which it delivers with the existing GXP Xplorer Platform, an application that makes it easy to locate, retrieve, and share geo-spatial data.

This new geospatial intelligence application fuses multiple data sources and shows data connections on a customisable dashboard, giving analysts immediate predictions of where a threat potential is and where it might strike. 

This new software application engages with multiple intelligence sources to develop a single clear picture. The software simplifies complex data challenges making the picture clearer for the analyst. GXP Fusion uses Artificial Intelligence and Machine Learning technology to allow analysts to make smarter decisions through tailored workflows.  The software combines a wide variety of data types, including imagery, documents, signals, maps, and video and from th different sources it creates a multi-perspective view in a single picture. This makes delivery of insightful intelligence and enhanced situational awareness to key decision-makers far easier to read and understand.

From key military, security, and incident response operations, to a variety of commercial development and research initiatives, GXP provides a comprehensive suite of solutions to inform effective decision making. 

Supporting the development of the most advanced geospatial intelligence, GXP software enables rapid discovery, exploitation, and dissemination of mission-critical geospatial data.  “GEOINT customers have big data challenges,” said Dana Poirier, general manager of Advanced GEOINT Systems at BAE Systems.... They require the ability to see hidden relationships and patterns in large volumes of data. GXP Fusion represents an important step in our vision of driving GEOINT transformation.”

BAe Systems:          ADS Group:            Defense World:         I-HLS:

You Might Also Read:

AI Satellite Image Analysis Will Be Regulated:

 

« Securing AI In Military Systems
Covid Vaccine-Maker Suffers Cyber Attacks »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Kualitatem

Kualitatem

Kualitatem Inc. is an independent software testing and information systems auditing company

NESEC

NESEC

NESEC is a specialist in information security consulting services and solutions.

DataSunrise

DataSunrise

DataSunrise Data-Centric high-performance security software protects the sensitive data in real-time in cloud or on premises, and helps organizations to stay compliant.

CARICERT

CARICERT

CARICERT is the National Cyber Emergency Response Team of Curacao in the Caribbean.

Fugue

Fugue

Fugue ensures cloud infrastructure stays in continuous compliance with enterprise security policies.

Nemko

Nemko

Nemko offers testing, inspection, and certification services worldwide, mainly concerning products and systems, but also for machinery, installations, and personnel.

SAIFE

SAIFE

SAIFE has adapted a Software Defined Perimeter approach and paired it with a Zero Trust model that defines access by the user, their device, and where they are located.

WebSec

WebSec

WebSec is a cybersecurity firm based in Amsterdam (NL) and Wyoming (US), specializing in offensive security services including penetration testing, red teaming, and tailored security assessments.

Eureka Security

Eureka Security

Eureka help organizations securely use any cloud data storage technology they need without having to compromise on security.

Cisco Systems

Cisco Systems

Cisco helps seize the opportunities of tomorrow by proving that amazing things can happen when you connect the unconnected.

Ampcus Cyber

Ampcus Cyber

Ampcus Cyber specialize in providing comprehensive security solutions and services that are tailored to safeguard our clients' networks, infrastructure, and valuable assets.

CNF Technologies

CNF Technologies

CNF Technologies is an award-winning cyber company providing technology-focused research and development to commercial, federal, and Department of Defense clients.

Fescaro

Fescaro

FESCARO is a trusted cybersecurity partner for global automakers and their partners, helping them transition to software-defined vehicles (SDVs) with tailored automotive software solutions.

Vana Solutions

Vana Solutions

Vana Solutions is an Information Technology Services company. We help commercial & federal organizations select, adapt, and integrate the right technology solution so you can move faster.

SplxAI

SplxAI

Our mission at SplxAI is to secure and safeguard GenAI-powered conversational apps by providing advanced security and pentesting solutions, so neither your organization nor your user base get harmed.

Heights Consulting Group

Heights Consulting Group

Heights Consulting Group is a cybersecurity consulting firm specializing in strategic guidance, risk governance, and regulatory readiness.