Successfully ‘Connecting the Dots’ for

National Security & Intelligence

Our Technology

d2i-SI™ is a versatile business automation software, using next-generation concepts and designs that harness the power of data, with a scientific approach to dynamic data management, analytics, and knowledge discovery. It incorporates ‘best practices’ garnered from many demanding industries that have resulted in a multi-purpose platform which does not dictate technology on process, and offers multi-party personalization, without having to reengineer the software. It operates in true real time and has been specifically designed for high-volume environments. It is fully integrated, highly scalable, event-driven (invoked by both machines and humans), and workflow-enabled.

Click on the headings below to learn more

Salient Features & Capabilities

Some of the important features of d2i-SI™ include:

 Automation resulting in 99+% processing without human intervention;
Real-time collection, processing, and fusion of multi-source data;
>  Seamless integration of disjointed systems offering a ‘single-window’ view;
>  Real-time, intelligent identification of: threats, anomalies, trends, and patterns;
>  Optimized collaboration and synchronization across multiple parties;
Intelligence feeds for data mining, as well as for input into analytical systems;
Proactive, secure and discrete sharing (pushing) of information to relevant parties;
Real-time coordination of command, communication, response, and follow-up;
>  Active tracking of assets, people, processes and information;
>  Human Capital Management with role-based operations and training;
>  Proactive management of processes with performance measurements; and,
>  User-defined, multi-party personalization for collaborating partners.

Architecture & Design

d2i-SI™ is an automation platform with integrated Event-, Automation-, and Workflow Engines, aimed at achieving the highest degree of automation possible through real-time, event-driven processing, in order to maximize ‘exception-driven’ operations. Its database and object-oriented functions are tuned for high volumes of data, in high-performance environments. d2i-SI conducts perpetual intelligence processing throughout business process lifecycles. It seamlessly integrates with office automation tools, all modern external systems, databases, and tactical devices or hardware.

The d2i-SI software is natively web-enabled, but can be deployed in both thin and thick client environments, hosted in-house (a.k.a. 4-wall), Cloud, or a hybrid of these; and in centralized or decentralized configurations, as necessary.

High Performance Computing

d2i-SI™ has been developed with performance in mind; both in terms of speed of its business processes (or ‘transactions’), and also regarding throughput of large volumes of information. It is scalable, with an efficient database design and software functions, automation, and unique processing methods; and can process and act on massive amounts of multi-source information, over large computer networks. d2i-SI has a relatively small technical footprint, thereby increasing performance and simplifying many aspects of its use.

Real-Time Processing

Operating in real-time mode eliminates latency-related shortcomings from stale or obsolete data, ensures data integrity and reliability, and provides total transparency in operations. Real-time processing is the only way to be truly proactive in most security processes, and possibly avoid costly, or disastrous unintended consequences (such as receiving an alert too late to prevent an act of terrorism). It also results in heightened visibility in security processes, and can have tremendous financial savings in security and commerce due to significant reductions in passenger and cargo transportation cycles, and security processes. d2i-SI™ system operation and availability exceeds 99.99% uptime.

Event Engine

Unlike most software that only processes computer ‘transactions’ initiated by people, the d2i-3E™ (Extended Event Engine) processes ‘Events’ (electronic signals and data – anything with an electronic footprint) which can originate from machines / devices and people, such as: GUI, Mobile Devices, Browsers, Tactical Devices, APIs, CBRNE/Sensors, RFID, GPS, ACSD, PLC/SCADA, Alarms, Credit Card purchases, Suspicious Activity Reports (SAR), etc. d2i-3E automatically and intelligently processes such events and takes necessary actions, such as: validating, organizing, and storing the information, as well as other follow-on activities, such as Intelligence harvesting. Event-driven processing facilitates increased automation, and eliminates any unnecessary human intervention (and therefore errors).

Workflow Engine

The d2i-SI™ embedded Workflow Engine is the multi-party framework that powers the transparent and seamless communications between all parties involved in business processes. It dynamically coordinates and integrates business function interactions, supports real-time information sharing and alerting, messaging, and escalation procedures between parties, significantly reducing human errors. The Workflow Engine is hardware-agnostic and supports all electronic message receipt and delivery platforms, including: Phone, Email, IM, SMS (Texting), Fax, Visual Signals, Mass Broadcasts, Application Programming Interfaces (APIs), and Form-based Email or XML.

Automation Engine

Human and Computer / Data interaction is increasing at a tremendous rate. Agencies across National Security need to increase efficiency and eliminate errors by minimizing reliance on humans through the use of automation in order to cope with increased workloads.

d2i-SI™ event/data-driven automation is based on intelligent business processes, using predetermined expectations and constraints, with ‘Management-by-Exception’ (Man-on-The-Loop) processing that results in over 99% processing without human intervention. This eliminates human errors, increases throughput and accuracy of information, and significantly reduces manpower requirements.

Role-Based Security

It is imperative to be able to identify anyone or anything that has access to, and that initiates processes in the system, in order to control their level of access. With d2i-SI™, user and device access to security functions and information is personalized through the use of role-specific access security profiles, which also assist people with their duties and responsibilities through profile-driven operating procedures and guidelines, while enforcing privacy of information procedures and personnel integrity.

Interoperability & Compatibility

Due to its open and interoperable architecture, and strong interfacing features, d2i-SI™ can dynamically ‘connect’ distributed/standalone systems with its Knowledge Bank (creating a virtual database), without moving or restructuring systems. It operates across diverse hardware and software platforms; over wired and wireless networks; regardless of location, and uses: .NET / COM+ / XML, Silverlight / .NET / WPF / XAML, and other popular industry standards, Application Programming Interfaces (APIs), strong Data Import and Export capabilities for batch interfaces, data migration, and other bulk transfers. It easily integrates with devices and tactical infrastructure such as: scanners, tracking devices, inspection hardware, sensors, PLCs and SCADA systems.

Ease of Personalization

d2i-SI™ is very flexible and supports extensive system personalization, not through customization of the software code, but rather through changing of parameters (a.k.a. ‘configuration’). It can even be personalized in its ‘look and feel’, down to the individual user level, including for: language preference, screen field names, reports layouts, and more. Personalization also affects how various parties influence specific security processes. d2i-SI™ provides flexibility for situations where multiple organizations, divisions, departments and teams are collaborating with one another. Business tactics can be changed on the fly. Our Business Blueprint forms the foundation for a highly-personalized business solution, without any headache, large effort, or extra expense.

Document Management

The ‘data explosion’ experienced over this past decade also applies to documents associated with business processes, including: photos, videos, drawings, office documents, financial documents, forms, reports, compliance and inspection documents, itineraries, manifests, travel and security documents, tactical device output, etc. Efficient storage and expeditious access to this documentation is essential for any security process. The d2i-SI™ Document Management system electronically captures and attaches documents to related records in its Knowledge Bank, which can be instantly retrieved from anywhere, subject to proper authorization, ownership, jurisdiction, responsibility, etc. d2i-SI™ also has ultra-secure ‘vault’ capabilities, and even stores unclassified documents using its multi-layered security system.

Data Warehousing

Because of the d2i-SI™ efficient design and exceptional processing speed, customers can in many cases avoid the deployment of a data warehouse, by using either the provided, or third-party data mining tools to extract operational and management information directly from the d2i-SI™ production database. There are however cases where heavy ‘number crunching’ and data access takes place (such as EIS, or for historical report generation) which can access tens of millions of data points, that a data warehouse is recommended. The options for configuration of a d2i-SI™ Data Warehouse are flexible, including for: centralized or distributed data, hosting, data storage, and for data transfers to the warehouse using: real-time replication, data builds from logs/archives, or data migration.

Data Mining & Reporting

d2i-SI™ provides many tools for inquiring, reporting and graphing of data, including: real-time data mining with unlimited levels of ‘drill-down’; ‘Quick Query’ (public and private) reports and grid searches; standard and custom on-demand or predefined delivery reports; standard and custom business forms; an Executive Information System (EIS); as well as support for all major COTS (Commercially-Off-The-Shelf) third-party OLAP and ODBC-compliant reporting and data mining tools. Search engine-like capabilities are also provided using the d2i-SI™ Knowledge Bank and/or the ‘single-window’ view.

History & Audit Trails

d2i-SI™ offers the option of maintaining full history and audit trails for any of the activities associated with its database tables, data elements, and/or functions; that originate from machine- or human-initiated ‘transactions’ or events of any business process, in each case identifying the individuals and groups involved in such events. All alerts, related actions, and responses are also automatically tracked, providing full traceability. The system is audit-trail-enabled at every level in the extended lifecycle of every process. All access to information in the Knowledge Bank can also be tracked, immediately detecting any Insider Threat behavior, such as with the Wiki Leaks theft.

Training & Simulations

Although d2i-SI™ is highly automated and requires relatively little input from users, they still need to know how to perform their assigned tasks. Training is the vehicle to efficient use of a security solution, and competent users are a critical success factor in security operations. A comprehensive training plan is developed during our Business Blueprint phase, which includes: Formal (classroom) training, Hands-on training during the implementation, the ‘Train-the-Trainer’ approach (at the customer’s option), Self-guided online training (CBT), complemented by a comprehensive integrated Online Help System. d2i-SI™ can also be utilized for training, testing and simulation in a dedicated, standalone environment.

Ease of Deployment & Use

d2i-SI™ is easy to install, deploy, maintain and operate, with good visual cues and process flows. It can be personalized through configuration, and requires minimal customization (such as development of interfaces, and custom-built forms and reports). The Data2Intel Business Blueprint™ is the heart of the implementation, wherein all the details of the implementation are specified, including: software, hardware and network installation plans, business form and report specifications, testing, training, and data migration plans, interfaces, etc. There is no ‘culture shock’ when using the system for the first time, and it has low-intensity support requirements. System upgrades are seamless and scripted, not requiring any extended down time.

Key Advantages

The main advantages of a d2i-SI™ security solution include:

>  Time – Tried and proven software – no risk of a long or failed project;
>  Automation – Almost all the processing without human intervention;
>  Performance – Ultra-fast processing in big data environments;
Multi-Party – Integration of agencies and missions, and the security ‘layers’;
>  Flexibility – User-configurable solution with personalization flexibility;
Cost and Effort – Easy and cost-effective to implement, operate and upgrade;
Complementary – Co-exists with current security systems and infrastructure;
Rollout – Does not require additional hardware or software; and,
Training – Provides for testing, training and simulation in real-world settings.