New Software Makes Data From Multiple Sources Readable

Military analysts and combat fighters encounter new threats daily. These include Improvised Explosive Devices (IED), ambush attacks and firefights. Now BAE Systems has created the GXP Fusion software, which it delivers with the existing GXP Xplorer Platform, an application that makes it easy to locate, retrieve, and share geo-spatial data.

This new geospatial intelligence application fuses multiple data sources and shows data connections on a customisable dashboard, giving analysts immediate predictions of where a threat potential is and where it might strike. 

This new software application engages with multiple intelligence sources to develop a single clear picture. The software simplifies complex data challenges making the picture clearer for the analyst. GXP Fusion uses Artificial Intelligence and Machine Learning technology to allow analysts to make smarter decisions through tailored workflows.  The software combines a wide variety of data types, including imagery, documents, signals, maps, and video and from th different sources it creates a multi-perspective view in a single picture. This makes delivery of insightful intelligence and enhanced situational awareness to key decision-makers far easier to read and understand.

From key military, security, and incident response operations, to a variety of commercial development and research initiatives, GXP provides a comprehensive suite of solutions to inform effective decision making. 

Supporting the development of the most advanced geospatial intelligence, GXP software enables rapid discovery, exploitation, and dissemination of mission-critical geospatial data.  “GEOINT customers have big data challenges,” said Dana Poirier, general manager of Advanced GEOINT Systems at BAE Systems.... They require the ability to see hidden relationships and patterns in large volumes of data. GXP Fusion represents an important step in our vision of driving GEOINT transformation.”

BAe Systems:          ADS Group:            Defense World:         I-HLS:

You Might Also Read:

AI Satellite Image Analysis Will Be Regulated:

 

« Securing AI In Military Systems
Covid Vaccine-Maker Suffers Cyber Attacks »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

HackerOne

HackerOne

HackerOne was started by hackers and security leaders who are driven by a passion to make the internet safer.

Ripjar

Ripjar

Ripjar is a global company of talented technologists, data scientists and analysts designing products that will change the way criminal activities are detected and prevented.

Anomali

Anomali

Anomali delivers intelligence-driven cybersecurity solutions to enhance threat visibility, automate threat processing and detection, and accelerate threat investigation, response, and remediation.

Cleafy

Cleafy

Cleafy are a team of fraud hunters, cybersecurity experts, data scientists, and software engineers. Our purpose is to make people’s life easier and free from the threats in the digital ecosystem.

ComCode

ComCode

ComCode provides consulting services and solutions in the area of digitization and cyber security for mid-sized and big businesses.

AppSec Labs

AppSec Labs

AppSec Labs specialise in application security. Our mission is to raise awareness in the software development world to the importance of integrating software security across the development lifecycle.

Living Security

Living Security

Living Security specializes in metric driven and engaging security awareness solutions that reduce risk by increasing security culture and changing employee behaviour.

RapidScale

RapidScale

RapidScale’s managed cloud solutions provide reliable, innovative, and secure services, all complete with white-glove service and full management options.

CertiPath

CertiPath

CertiPath create products and services that ensure the highest levels of validation for digital identities that attempt to access customers’ networks.

HACKNER Security Intelligence

HACKNER Security Intelligence

HACKNER Security Intelligence is an independent security consultancy delivering comprehensive security assessments across IT security, physical security, and social engineering.

BaaSid

BaaSid

BaaSid is next generation security technology for data security & security authentication based on De-centralized & Blockchain.

Seigur

Seigur

Seigur is an IT consultancy business providing flexible legal and cyber security services for IT and data privacy programmes.

Ascent Solutions

Ascent Solutions

Ascent is built to help firms evolve their cybersecurity posture, modernize their Microsoft solutions, and accelerate their journey to the cloud.

Bugv

Bugv

Bugv is a crowdsourcing cybersecurity platform powered by human intelligence where we connect businesses with cyber security experts, ethical hackers, bug bounty hunters from all around the world.

Sababa Security

Sababa Security

Sababa Security is the first Italian innovation cyber security vendor, that provides security products, training, and managed services to protect diverse IT and OT environments.

Twine Security

Twine Security

Twine is pioneering the creation of AI digital cybersecurity employees to help improve efficiency for cybersecurity teams.