Alternatives to Axon Vision

Compare Axon Vision alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Axon Vision in 2026. Compare features, ratings, user reviews, pricing, and more from Axon Vision competitors and alternatives in order to make an informed decision for your business.

  • 1
    Lattice for Command & Control
    It enables men and women in uniform to move with machine speed, unparalleled confidence, and military-grade security by turning data into information, information into decisions, and decisions into actions across tactical and strategic operations. Lattice accelerates complex kill chains by orchestrating machine-to-machine tasks at scales and speeds beyond human capacity. Lattice cuts through the noise and creates a shared real-time understanding of the battlespace. It autonomously parses data from thousands of sensors & data sources into an intelligent common operating picture in a single pane of glass. Lattice uses technologies like sensor fusion, computer vision, edge computing, and machine learning, and artificial intelligence to detect, track, and classify every object of interest in an operator's vicinity. Lattice can scale to integrate thousands of sensors and effectors globally across multiple domains.
  • 2
    Armory Master Pro

    Armory Master Pro

    Armory Master

    Our weapons tracking system, designed for armory management, is perfect for law enforcement, the military, security firms, gun shops, shooting clubs, and sports shooters. This system ensures efficient and secure firearm tracking. Secures with military-grade technology. Field-tested weapons tracking system. Secure SSL encryption and RFID tracking. RFID technology has greatly improved how we keep track of things like equipment and assets, making it a key player in digital weapons tracking systems. Our experts can help you customize Armory Master Pro, our advanced weapons tracking system, to perfectly fit your needs and prevent weapon loss. Leveraging over 20 years of expertise in asset tracking expertise and a robust portfolio of field-tested projects, our Armory Master Pro offers military-grade precision for weapons tracking systems. Employing advanced SSL encryption and RFID technology, we guarantee high-accuracy firearm tracking.
  • 3
    Systematic IRIS Suite

    Systematic IRIS Suite

    Systematic Defence

    Powerful military messaging and interoperability capabilities, directly off-the-shelf. The IRIS suite has revolutionized military messaging and interoperability in modern defense forces with its range of commercial off-the-shelf (COTS) software solutions. In service with numerous NATO nations, the IRIS suite is combat-proven, meeting the demands of the modern battlespace. The IRIS suite covers all aspects of military messaging, from management and maintenance of standards to production and distribution of military messages. With its support of various Message Text Formats (MTF) and binary standards, the IRIS suite is a flexible and adaptable software solution for military professionals that provides strong military messaging and interoperability capabilities directly off the shelf. As the IRIS suite integrates seamlessly with standard products, such as Microsoft Office, it provides you with a user-friendly framework for drafting, editing, and sending military messages.
  • 4
    Modirum | Gespi

    Modirum | Gespi

    Modirum | Gespi

    Modirum Gespi delivers mission-critical situational awareness and advanced defense-technology solutions designed for both civil-security and government environments. Their platforms provide real-time insights, comprehensive intelligence, and decision-support tools that enhance operational effectiveness in complex, fast-moving scenarios. With a focus on deep-technology integration, the company combines hardware, software, and AI-driven systems engineered for resilience, high reliability, and deployment in demanding conditions. Their portfolio includes autonomous systems, communications infrastructure, and full-spectrum defence electronics, enabling customers to operate with enhanced visibility, coordination, and readiness. Modirum Gespi emphasises interoperability, rapid deployment, and adaptability to evolving threats and environments.
  • 5
    Shift

    Shift

    Shift

    We help unlock the full potential of the American economy by delivering cross-industry upskilling programs for active duty and a high-impact talent marketplace highlighting military talent. Our vision is to create a world where career growth and learning are visible, accessible, and affordable, and the diversity of someone’s experience and achievements are fairly assessed and celebrated. A mission to supercharge the defense-industrial partnership that underpins America’s national security and economic vitality. A proven, scaleable military assessment system that underpins training programs to more effectively communicate, collaborate, and partner with the private sector. Our talent marketplace recommends the best-fit military talent to your needs, enabling you to host active duty fellows or transitioning interns who bring defense expertise to your organization. Continue the mission through transition with access to civilian recruiters within Shift's network of defense-tech partners.
  • 6
    Nexium Defence Cloud
    Nexium Defence Cloud is a comprehensive, modular private cloud infrastructure tailored to meet the stringent security and operational demands of military forces. It enables armed forces to swiftly adapt their Communications and Information Systems (CIS) to dynamic operational scenarios, facilitating rapid deployment of services and communities of interest through mission-oriented, automated management tools. By integrating civil cloud technologies into military environments, Nexium Defence Cloud enhances operational efficiency, accelerates maneuvers, and empowers joint force commanders to prepare missions in days, deploy in hours, and adapt in minutes, all with minimal expertise. The solution offers a distributed cloud node architecture, providing local storage and computing capabilities to avoid single points of failure, with form factors ranging from rackable nodes for headquarters to rugged edge servers for hostile environments.
  • 7
    GOVRED

    GOVRED

    GOVRED

    We build the best virtual reality simulators using the best, cutting-edge, hardware. We employ the best developers, so that we can produce the best VR content. We work directly with our customers to produce the best training simulators. GOVRED provides the military with full line of firearms training and combat simulators. Military engagement training has never been more realistic than with GOVRED’s proprietary training technology. GOVRED provides law enforcement agencies with an extensive line of the best judgmental use of force, crisis intervention, de-escalation, active shooter, and firearm training simulators available. Marksmanship is skill in shooting coupled with the ability to hit the target you are aiming at with confidence and accuracy. This is especially important in hostile, split-second, situations. GOVRED skill building drills will give the trainee confidence knowing they can shoot quickly, confidently, and accurately.
  • 8
    Defense Llama
    Scale AI is proud to announce Defense Llama, the Large Language Model (LLM) built on Meta’s Llama 3 that is specifically customized and fine-tuned to support American national security missions. Defense Llama, available exclusively in controlled U.S. government environments within Scale Donovan, empowers our service members and national security professionals to apply the power of generative AI to their unique use cases, such as planning military or intelligence operations and understanding adversary vulnerabilities. Defense Llama was trained on a vast dataset, including military doctrine, international humanitarian law, and relevant policies designed to align with the Department of Defense (DoD) guidelines for armed conflict as well as the DoD’s Ethical Principles for Artificial Intelligence. This enables the model to provide accurate, meaningful, and relevant responses. Scale is proud to enable U.S. national security personnel to use generative AI safely and securely for defense.
  • 9
    Permuta

    Permuta

    Permuta

    Permuta offers advanced, secure, user-friendly COTS products for military and federal agencies, addressing various workforce challenges in HR, operations, training, security, medical, assets, and more. Our application bundles, DefenseReady and FederalReady, are available through multiple contracts and can operate on-site or in a compliant IL5 DoD cloud. ✓ Workforce & Asset Management Software. ✓ Proven To Enhance Readiness & Decision Making. ✓ COTS Software For Military & Federal Civilian Agencies. ✓ Hosted In A Fedramp Compliant Il6 Dod Cloud Or Lower.
  • 10
    Thales Commander
    Our command and intelligence suite provides powerful tools for rapid information exploitation, supporting decision-making through a common tactical picture. Commander is our Command, Control, Communications, and Intelligence (C4I) solution, built on open architecture, integrating operational information systems and tactical communications. MINDS serves as a multi-sensor image interpretation and dissemination system, critical for air operations with capabilities such as data production for reconnaissance, ground surveillance, targeting, real-time digital acquisition, and scalability. NIES is our networked image exploitation system, offering battlefield insights across multiple light wavelengths while facilitating resource sharing and situational awareness. DMPS is a comprehensive digital mapping tool that enables 3D object extractions, geometric and radiometric image processing, and efficient project data management.
  • 11
    DELOPT

    DELOPT

    DELOPT

    DELOPT focuses on the design, development and production of embedded systems and electro-optics systems for military and civilian applications. Our offerings for defense includes avionics displays, on board computers, ate's, high speed data acquisition system, thermal imagers, target trackers etc. The Automatic Video Tracker (AVT) accepts video signal from a surveillance camera as input, tracks and provides the location of the chosen object with respect to the centre of Field of View of the camera as output. The AVT can be used to track static or moving objects from a static or moving platform. The DIR-SA-900 Series Thermal Imager developed by DELOPT is based on 25 micron pitch 384 x 288 uncooled microbolometer array operating at room temperature. New product DIR-SA-910 Series Handheld Thermal Imager.
  • 12
    XFdtd

    XFdtd

    Remcom

    XFdtd is a full-wave 3D electromagnetic (EM) simulation software created by Remcom. This innovative and full-featured electromagnetic simulation solver provides high-performance computing options and simplifies the analysis of the most complex EM problems. XFdtd offers a wide range of applications that include microwave device design, antenna design and placement, radar and scattering, biomedical applications, automotive radar, waveguides, military and defense contracts, RFID, EMC/EMI, and more.
    Starting Price: $14750.00/one-time/user
  • 13
    Lattice for Mission Autonomy
    An advanced software platform enabling a single human to control and coordinate a wide range of autonomous assets across the ocean, land, and sky to deliver successful mission outcomes. Lattice for Mission Autonomy makes it possible to compose different platforms and payloads, made by different vendors, into different mission solutions for different mission requirements. Mission Autonomy integrates and orchestrates the platforms, piloting, sensors, and payloads to deliver autonomous teams capable of accomplishing complex missions. Lattice for Mission Autonomy defense and commercial applications extend across air, land, and sea by leveraging platforms such as collaborative combat aircraft, robotic combat vehicles, and autonomous underwater vehicles to conduct missions like ISR, defensive counter air, seafloor mapping, critical infrastructure surveillance, and more.
  • 14
    MilDef OneCIS
    MilDef’s software offering centers on OneCIS, a ruggedized tactical C2IS (Command & Control Information System) platform designed to rapidly deploy secure, flexible, and scalable IT services to mobile commands and tactical units in demanding environments. OneCIS automates configuration and orchestration of core IT infrastructure, including communications (IP routing, switching, firewalling), directory and messaging services, databases, collaboration tools, web services, and security tools, so that tactical IT capabilities can be deployed in hours instead of days or weeks with minimal human intervention. It serves as a tactical private cloud at the edge, bringing Infrastructure as a Service (IaaS) and automated workflows for hypervisor, OS, virtual appliances, network, and core services deployment, and supports integration of functional services such as Command & Control, battlefield management, and geographic services as needed.
  • 15
    Common Message Processor (CMP)
    CMP is a user-friendly Java® application that provides the capability to process formatted military messages. It is widely used throughout the United States DoD to provide a bridge between tactical, email, legacy, and web-enabled users. CMP provides message parsing, validating, journaling, generating, and editing capabilities essential to the proper processing of military standard (MIL-STD) messages. The software validates message structure, content, and context as per the associated MIL-STD specifications. Portable, Java-based applications. Multi-platform support (Windows x86/x64, Linux x86/x64). Extensive Java Application Programmer Interface (API). In addition, CMP has been independently validated by Conformance to Standards (CTS) testing by the Joint Interoperability Test Command (JITC). It provides for backward compatibility with fielded systems with support for many MIL-STD headers and numerous message baselines (and annual revisions).
    Starting Price: $599 one-time payment
  • 16
    FORESTER
    FORESTER is a one-of-a-kind technology that provides warfighters with real-time, all-weather, day/night target detection and tracking capabilities for actionable intelligence. The system was designed and developed by SRC under sponsorship from the Defense Advanced Research Projects Agency (DARPA), the U.S. Army, and the United States Special Operations Command (USSOCOM). It has been successfully tested for use on manned or unmanned helicopters. Stand-off, persistent, wide-area XXXXX surveillance. All-weather, day/night detection. Ultra High-Frequency (UHF) Ground Moving Target Indicator (GMTI)/Airborne Moving Target Indicator (AMTI)/Synthetic Aperture Radar (SAR) capability. Real-time, onboard processing. 360-degree surveillance coverage with electronic beam steering to search a 90-degree sector. The Foliage Penetration Reconnaissance, Surveillance, Tracking and Engagement Radar (FORESTER) is an airborne radar system that provides stand-off, persistent, wide-area surveillance.
  • 17
    Silent Archer
    SRC’s Silent Archer technology delivers end-to-end counter-UAS capabilities to defeat hostile drones, whether a lone target or a UAS swarm. Detects, tracks, classifies, identifies, and engages hostile UAS threats. Electronically disrupts groups 1-5 UAS, including UAS swarms. Complements kinetic weapon systems for layered defense. Solution of choice for VIP protection and events, and by the U.S. Army and Air Force for force protection. The open architecture and sensor-agnostic design of Silent Archer technologies allow for integration with virtually any command and control system, kinetic weapon system, or additional sensor platforms for added functionality. The Silent Archer system can leverage a variety of proven SRC systems while remaining flexible enough to integrate with almost any existing solution. The Silent Archer system is available in multiple configurations to support any mission.
  • 18
    Arcas

    Arcas

    BigBear.ai

    BigBear.ai’s integration of computer vision, predictive analytics, and event alerting technology revolutionizes data analysis at the edge. Leveraging AI and machine learning, our advanced systems sift through vast datasets to uncover insights beyond human reach, effectively eliminating blind spots and augmenting situational awareness. Arcas synthesizes millions of data points to enhance situational awareness and powers predictive forecasts with artificial intelligence and machine learning. It intelligently processes video streams and generates real-time alerts upon detecting anomalies. Through our adaptable analytics framework, Arcas not only monitors past events but also projects future trends, empowering leaders to make informed decisions with confidence. Seamlessly integrate disparate data sources such as sensors and edge devices, unifying them into a universally accessible format.
  • 19
    L.E.A. Data Technologies

    L.E.A. Data Technologies

    L.E.A. Data Technologies

    L.E.A. Data Technologies develops software for police departments, law enforcement agencies, the military and security companies. Specialized software for police and law enforcement. Best prices see why... The software programs were originally developed by a veteran detective and crime analyst with extensive input from patrol officers and detectives with years of experience and practical insight. Unlike bulky records management systems, our software programs are easy-to-use and navigate. Designed specifically for law enforcement with reports, alerts and features to effectively do your job. Because our software is stable, secure and well-designed we can pass our cost savings to our clients. Designed specifically for law enforcement with reports, alerts and features to effectively do your job.
    Starting Price: $800.00/one-time
  • 20
    Leidos VACIS
    VACIS systems scan cargo containers, trucks, railcars, buses, and passenger vehicles to help authorities search for narcotics, weapons, nuclear material, undeclared goods, and other contraband at ports of entry, border crossings, military facilities, and other checkpoints. Leidos is a world leader in non-intrusive inspection technology. Since the technology in 1999, hundreds of systems have been deployed for government and commercial clients around the world. Every VACIS system is available with our dedicated installation, training, maintenance, and technical support. The shortest wheelbase and the lightest weight in its class for better maneuverability and handling, an industrial chassis designed for firetruck duty, a global support network, and an advanced high-energy imaging system with material discrimination. These features and It's AI/ML capabilities allow inspectors to quickly and accurately search for weapons, contraband, undeclared cargo, and other items.
  • 21
    Helsing

    Helsing

    Helsing

    Helsing is a new type of defense AI company. We believe that software, in particular artificial intelligence, will be the key to protecting our democracies. Our purpose is to attain technological leadership so that democratic societies are free to make sovereign decisions and control their ethical standards. Democracies are fragile. Protecting them from external threats is one of our most important responsibilities. We founded Helsing out of a belief that safety and deterrence are only possible if we embrace software and artificial intelligence to make our forces more effective. As democracies, we have a special responsibility to develop and deploy these technologies thoughtfully and with the highest ethical standards. Our approach is software-first. We partner with industry and governments to connect existing and new hardware platforms with advanced AI. We are looking for people with their hearts in the right place, who share our conviction that democratic values are worth protecting.
  • 22
    Q-CTRL

    Q-CTRL

    Q-CTRL

    Infrastructure software to power the quantum future. Quantum technology promises to transform the economy. We expand the utility of quantum computers and deliver new quantum sensing capabilities, all through software. Quantum infrastructure software transforms bare-metal quantum processors into useful computational tools. Our technology unleashes the hidden performance inside of the most powerful computers so you can achieve more. Add automation and performance management to my QC platform. Professional-grade toolkits to design, automate, and scale quantum hardware and controls. Unleash latent hardware performance with fully integrated performance management for cloud quantum computing platforms. Automatically reduce error and boost algorithmic success on cloud-accessible quantum computers. Professional-grade toolkits to design, automate, and scale quantum hardware and controls.
  • 23
    Rebellion Defense

    Rebellion Defense

    Rebellion Defense

    We believe warfighters must be equipped with the best software capabilities to detect, deter, and outpace the modern adversary at speed and scale. We’ve brought together private sector technologists with defense veterans who deeply understand the mission. Together, we build technology for defense and national security. We develop advanced software to outpace national security threats. Gain real-time entity identification and tracking for complex threat environments. Rebellion builds software to analyze and secure mission data at speed and scale. We deliver decision-quality insights so operators and analysts can make faster, more informed decisions to keep our adversaries at bay. Gain real-time tracking, predictive analytics, and adaptive planning for complex mission environments. Understand your mission’s exposure to global cyber threats by using automated adversary emulation. Our software delivery model guarantees adaptability, flexibility, and resilience.
  • 24
    Infor CloudSuite Aerospace & Defense
    Formed through the acquisition of multiple companies, this A&D company needed to consolidate systems and support its plans for organic growth by lowering its total cost of ownership. Additionally, the company looked to gain more flexibility with its solution, centralize support, and deploy updates faster and with more agility. The company selected CloudSuite™ Aerospace & Defense to manage the supply chain across five North American sites with the roll-out of a global chart of accounts to support their finance needs. To meet the demanding timeline required for deployment, the company used an Infor Implementation Accelerator—a combination of software, services, education, and tools to speed deployment without modifications. CloudSuite Aerospace & Defense software provides advanced capabilities relied upon by 5,500+ aerospace and defense manufacturers worldwide.
  • 25
    Manufacturo

    Manufacturo

    Manufacturo

    MANUFACTURO is a dynamic, cloud-based software solution designed for the modern high-change manufacturing industry. By consolidating disparate systems into one cohesive platform, your organization is effortlessly streamlining operations, improving data accuracy, and enhancing operational efficiencies. Our key differentiators are your new competitive advantage. Traceability and nonconformance management are just two examples of industry-leading capabilities that showcase Manufacturo’s unique value. Cutting-edge traceability, powered by advanced monitoring technology, provides you with a holistic view of your manufacturing operations. From inspection of materials arriving at your facility to customer shipment, you’ll realize enhanced safety, compliance, and operational efficiency, driven by real-time situational awareness that’s available at your fingertips. Our built-in nonconformance management solution seamlessly integrates with your organization’s production, inventory
  • 26
    SitaWare Suite

    SitaWare Suite

    Systematic Defence

    Dominate the battlespace with comprehensive situational awareness on all levels of command. The SitaWare suite offers C4ISR solutions for battle management across the entire battlespace, on land, at sea, in the air, or in the joint domain. As a combat-proven commercial off-the-shelf software, the suite provides advanced command-and-control capabilities and seamless interoperability, enabling you to share information with coalition partners. Each part of the SitaWare suite is specially developed to support specific roles. From fixed and deployable headquarters operations to mounted missions and dismounted troops, the SitaWare suite encompasses the entire battlespace. With its open architecture and rapidly scalable configuration, it can easily meet the ever-changing needs of modern defense forces. Operating across all domains and levels of command, the SitaWare suite allows for an accessible, sharable, and secure common operating picture.
  • 27
    MAK ONE

    MAK ONE

    MAK Technologies

    A powerful and flexible Computer Generated Forces (CGF) platform to fill your synthetic environments with urban, battlefield, maritime, and airspace activity. VR-Engage lets users play the role of a first-person human character; a ground vehicle driver, gunner, or commander; or the pilot of a fixed-wing aircraft or helicopter. Game-like visual quality in a high-performance image generator. Designed by modeling & simulation experts for training and simulation projects. Physically accurate sensors, model the physics of light in any wavelength to represent electro-optical, night-vision, and infrared sensors. Applications that let you model, simulate, visualize, and participate in whole-earth multi-domain simulations. Multi-domain computer-generated forces. Multi-role virtual simulator. Image generator & battlefield visualization. EO, IR, and NVG imaging sensors. Synthetic aperture radar simulation.
  • 28
    MORAI

    MORAI

    MORAI

    MORAI offers a digital twin simulation platform that accelerates the development and testing of autonomous vehicles, urban air mobility, and maritime autonomous surface ships. Built with high-definition maps and a powerful physics engine, it bridges the gap between real-world and simulation test environments, providing all key elements for verifying autonomous systems, including autonomous driving, unmanned aerial vehicles, and unmanned ship systems. It provides a variety of sensor models, including cameras, LiDAR, GPS, radar, and Inertial Measurement Units (IMUs). Users can generate complex and diverse test scenarios from real-world data, including log-based scenarios and edge case scenarios. MORAI's cloud simulation allows for safe, cost-effective, and scalable testing, enabling multiple simulations to run concurrently and evaluate different scenarios in parallel.
  • 29
    L3Harris Falcon Net Ecosystem
    Powered by tightly integrated networking technologies, the L3Harris Falcon Net Ecosystem delivers robust, resilient, data-centric communications, no matter how complex the scenario. Tactical decisions need to move at the speed of light and be correct. Rich data intelligence, video ISR, high-speed MANET networks, and unwavering interoperability are critical for mission superiority. That is the foundation of Falcon Net Ecosystem technologies. This end-to-end solution is fueled by over six decades of global tactical expertise, and our commitment to warfighter safety and overmatch capabilities. Software-defined for simplified upgrades and investment protection. Over 100,000 in action worldwide from the global leader in tactical communications. LPI/LPD technologies reduce jamming, interception, and detection. Network design, deployment, and monitoring are faster and more accurate.
  • 30
    Red 6

    Red 6

    Red 6

    ATARS is a multi-node, all-domain, augmented reality (AR) system that enables a complete LVC ecosystem for multiple users, from beyond visual range (BVR) to within visual range (WVR) in dynamic environments. Utilizing an extremely low-latency protocol that is waveform and network agnostic, ATARS delivers the high-speed data passage necessary to create a seamless, multi-player, augmented reality experience viewed through a full-color, wide field of view, and high-resolution display. Our EVE headset (Enhanced Visual Environment) is a transformational leap in wearable augmented reality technology. Previously there has been no means by which virtual assets could be visually represented in the real world, outdoors, and at high speeds. Red 6’s EVE hardware is the brightest headset available, allowing for outdoor use in full daylight and, critically, in high-speed environments.
  • 31
    Scale Donovan
    Personnel constrained by time, technology, and other resources overlook petabytes of historical information and incoming data. Uncertainty around the information that exists prevents you from unlocking valuable insights and providing optimal recommendations. Classified information can’t leave secure networks and be sent directly to open-source AI models. Existing AI solutions are not geared toward defense and intelligence use cases, terminology, or context. Stakeholders frequently need written reports and briefings that require manual and time-intensive effort. Stakeholders require an adaptable solution that can conduct translation, coding assistance, and parse data for insights. Dig into all available data to rapidly identify trends, insights, and anomalies. Accelerate intelligence cycles and provide exhaustive analysis without overlooking information. Precisely translate documents with Donovan to capture semantic nuance and context.
  • 32
    Observe

    Observe

    BigBear.ai

    A unique data collection and curation capability designed to derive insights out of enormous volumes of publicly available data from multiple domains. Observe captures and distills relevant data into organized sets of information, forming a coherent and continuously updated view of the situations that matter to you anywhere on the globe. Our collections cover many subjects including facilities, location, news, events, social media, public communications, internet services, and more. For situations that require a more customized solution, Observe collections can be used to enrich your proprietary data and analytics via modern, robust APIs. Use publicly available data for sentiment analysis, communication monitoring, and detection of significant events. Eliminate the need for engineering expertise, allowing decision-makers to gather valuable data with ease. Observe delivers near real-time visibility into relevant data.
  • 33
    SmartCam3D View

    SmartCam3D View

    Rapid Imaging Software

    SmartCam3D® situational awareness software provides geospatial augmented reality overlays on live video at 30+ frames per second. This technology originally served as the primary flight display for the NASA X38 during initial unmanned testing and today is deployed with US Army Tactical Unmanned Systems as a module within the Universal Ground Control Stations used in conjunction with the Hunter, Shadow, and Gray Eagle UAV Platforms. Additional integrations of this technology include EO/IR Gimbals, sUAS Pilot Applications, a plugin for the Android Tactical Assault Kit (ATAK), and a comprehensive Mission Management Application for the manned ISR market. SmartCam3D® provides enhanced situational awareness to a variety of stakeholders and end-users throughout the ISR ecosystem – from the front-line to the Operations Center.
  • 34
    AnyLogic

    AnyLogic

    The AnyLogic Company

    AnyLogic is the standard in multimethod modeling technology, delivering increased efficiency and less risk when tackling complex business challenges. The unmatched flexibility found in AnyLogic allows users to capture the complexity of virtually any system, at any level of detail, and gain a deeper insight into the interdependent processes inside and around an organization. AnyLogic has a GSA Contract schedule #47QTCA18D007Q. Government agencies of the USA may purchase through GSA Advantage.
  • 35
    Systweak VPN

    Systweak VPN

    Systweak VPN

    Systweak VPN hides your IP address, lets you access favorite websites & entertainment content without any restrictions. To avoid ISP throttling, bypass censorship, and provide online anonymity, this VPN uses cutting edge security technology. By default, Systweak VPN uses AES-256-bit encryption, used by security agencies to conceal and guard classified information. This means it provides a reliably encrypted tunnel between your device and the VPN server. Enjoy your favorite shows, listen to music, and stream any content without any restrictions at your home and while traveling out of the country. To establish a secure tunnel, offer good speed and secure data Systweak VPN uses Internet Key Exchange Version 2.Systweak VPN is committed to offering complete privacy and security to users. To keep it that way it uses AES 256-bit military-grade encryption and ensures online obscurity.
    Starting Price: $5.95 per year
  • 36
    Palantir Gotham

    Palantir Gotham

    Palantir Technologies

    Integrate, manage, secure, and analyze all of your enterprise data. Organizations have data. Lots of it. Structured data like log files, spreadsheets, and tables. Unstructured data like emails, documents, images, and videos. This data is typically stored in disconnected systems, where it rapidly diversifies in type, increases in volume, and becomes more difficult to use every day. The people who rely on this data don't think in terms of rows, columns, or raw text. They think in terms of their organization's mission and the challenges they face. They need a way to ask questions about their data and receive answers in a language they understand. Enter the Palantir Gotham Platform. Palantir Gotham integrates and transforms data, regardless of type or volume, into a single, coherent data asset. As data flows into the platform, it is enriched and mapped into meaningfully defined objects — people, places, things, and events — and the relationships that connect them.
  • 37
    PSTrax

    PSTrax

    PSTrax

    PSTrax is a cloud-based operations management platform built for Fire & Rescue, EMS, Law Enforcement, and Department of Defense (DoD) agencies. The platform digitizes routine checks and automates inventory tracking across key operational areas including Vehicles, Stations, PPE, SCBA, Supplies, Assets, Controlled Substances, and Blood Products. Each module is tailored to meet the unique demands of the agency type it supports, ensuring relevance across diverse mission sets. The platform reduces administrative workload and supports operational readiness by replacing paper checks and spreadsheets with intuitive digital tools. Agencies can adapt each module to their needs, stay aligned with evolving standards, and maintain full visibility and accountability, freeing more time to focus on public safety and protecting the communities they serve.
  • 38
    ArduPilot

    ArduPilot

    ArduPilot

    ArduPilot is a trusted, versatile, and fully open source autopilot software platform that runs on a wide range of onboard hardware to control autonomous unmanned vehicles including multicopter drones, fixed-wing aircraft and VTOLs, helicopters, ground rovers, boats, submarines, antenna trackers and other robotic platforms; it provides flight control, stabilization, navigation, mission planning and failsafes for fully autonomous, semi-autonomous and manual operations. It is developed and maintained by a large global community and supports multiple vehicle types with dedicated firmware branches, customizable parameters, and broad sensor and hardware support to interpret GPS, IMU, barometer, magnetometer, and other telemetry inputs for precise control and mission execution. ArduPilot integrates with ground control station applications like Mission Planner, QGroundControl, APM Planner, and others to configure hardware and plan missions with waypoints.
  • 39
    Google Cloud Cybershield
    The Google Cybersecurity Action Team (GCAT) is a premier security advisory team with the singular mission of supporting the security and digital transformation of governments, critical infrastructure, enterprises, and small businesses. GCAT offers strategic advisory services, providing guidance on security strategies and digital security transformation programs, including program management and professional services support. Their trust and compliance services map global compliance certifications to industry control frameworks, simplifying the compliance journey for organizations. The team delivers proven blueprints and architectures for deploying Google Cloud products securely, in line with regulatory requirements, and offers comprehensive solutions for autonomic security operations and cyber resilience. Additionally, GCAT provides threat intelligence and incident response services, including threat briefings, threat horizons intelligence reports, preparedness drills, etc.
  • 40
    Bixin

    Bixin

    Bixin

    Bixin owns the top security team in the industry. We built a robust risk control system to monitor abnormal data in real-time and ensure the security of users' accounts and transactions. Technologies such as hot/cold wallet separation, multi-signatures, and military-grade hardware encryption mechanisms provide a bank-level security for your crypto assets. We provide powerful, flexible, and easy-to-use tools for blockchain assets, and are committed to enabling everyone to hold, use, and manage their crypto currencies with ease. Bixin products are easy to understand and deliver a smooth experience. Any users can use the app hassle free. From transfer to payment, from buy and sell of crpto currencies to Escrow Bixin meets all your needs and offers you one-stop operations.
  • 41
    Intrinsic ID

    Intrinsic ID

    Intrinsic ID

    Intrinsic ID is the world’s leading digital authentication company, providing the Internet of Things with hardware-based root-of-trust security via unclonable identities for any IoT-connected device. Based on Intrinsic ID’s patented SRAM PUF technology, the company’s security solutions can be implemented in hardware or software. Intrinsic ID security, which can be deployed at any stage of a product’s lifecycle, is used to validate payment systems, secure connectivity, authenticate sensors, and protect sensitive government and military systems. Intrinsic ID technology has been deployed in more than 150 million devices. Award recognition includes the Cyber Defense Magazine InfoSec Award, the IoT Breakthrough Award, IoT Security Excellence Award, the Frost & Sullivan Technology Leadership Award and the EU Innovation Radar Prize. Intrinsic ID security has been proven in millions of devices certified by Common Criteria, EMVCo, Visa and multiple governments.
  • 42
    Cerence

    Cerence

    Cerence

    The most powerful, most intelligent AI assistant solution for global mobility, Cerence offers a robust portfolio of products, services, toolkits, and innovations that brings tomorrow’s user experience to today’s mobility ecosystem. As the car of the future takes hold, Cerence leads the way with a new era of in-car assistants, a multi-modal, deeply integrated, proactive companion that accompanies drivers throughout their daily journeys, delivering effortless interaction that keeps drivers safe, comfortable, productive, and informed. Cerence Co-Pilot is a first-of-its-kind, multi-modal driving experience that transforms the automotive voice assistant into a proactive, intuitive, AI-powered companion that can support drivers like never before. Cerence Co-Pilot runs directly on a vehicle’s head unit, with advanced AI deeply integrated with car sensors and data to understand complex situations both inside the vehicle and around it.
  • 43
    PrivateVPN

    PrivateVPN

    PrivateVPN

    From video streaming to social networks, our VPN works anywhere. Military-grade encryption shields you from governments and hackers. No more buffering or long waits with our supercharged connections. Unleash the internet in just 60 seconds, whether you’re on a computer, smartphone, tablet or router. Our apps let you surf unrestricted with no coding or complex setup required. Simply download and connect. With our VPNs you’re protected by military-grade 2048-bit encryption, the most secure, rapid connection of its kind. This means you can stream HD video, surf the web and download content at lightning speeds, often faster than non-VPN connections. PrivateVPN isn’t just a network of VPNs, but of real people. Our industry-topping support team is always on hand to help. You won’t be talking to some VA in India either, you’ll talk directly with our in-house developers to get your problems solved quickly and easily.
    Starting Price: $2.50 per month
  • 44
    Palantir Foundry

    Palantir Foundry

    Palantir Technologies

    Foundry is a transformative data platform built to help solve the modern enterprise’s most critical problems by creating a central operating system for an organization’s data, while securely integrating siloed data sources into a common analytics and operations picture. Palantir works with commercial companies and government organizations alike to close the operational loop, feeding real-time data into your data science models and updating source systems. With a breadth of industry-leading capabilities, Palantir can help enterprises traverse and operationalize data to enable and scale decision-making, alongside best-in-class security, data protection, and governance. Foundry was named by Forrester as a leader in the The Forrester Wave™: AI/ML Platforms, Q3 2022. Scoring the highest marks possible in product vision, performance, market approach, and applications criteria. As a Dresner-Award winning platform, Foundry is the overall leader in the BI and Analytics market and rate
  • 45
    Everykey Vault
    Everykey is a B2B cybersecurity solution in the form of mobile app that streamlines the generation and management of secure passwords, in addition to access management, all using military-grade encryption to safeguard devices.
  • 46
    DropSecure

    DropSecure

    DropSecure

    With DropSecure, the keys to unlock your data are never shared with anyone you didn't intend to share with, including us. That means you get real privacy behind our military-grade encryption and file transfer technology. Discover the most secure way to share your documents. At DropSecure, it is our mission to empower you with technology that protects your digital valuables in a hassle-free manner. DropSecure protects your privacy and safeguards your data using military-grade algorithms before they leave your device. With end-to-end encryption, encrypted uploads, decrypted downloads, two-factor authentication, cryptographic keys, and zero knowledge transfers, we offer the ultimate technology to keep your data safe from the data centers. So whether you are an individual, business or enterprise, you are always aware of who has access to your sensitive documents. Most importantly, no one owns the keys to your documents apart from you, not even us.
    Starting Price: $10 per month
  • 47
    Scenechronize

    Scenechronize

    Entertainment Partners

    Your smart, automated digital production office. The #1 cloud-based, digital solution for secure, cloud-synced collaboration and document and information management. Real-time production updates. Military-grade security. Script analysis. Automated sides creation. And much more. Scenechronize is the industry leading cloud-synced solution to organize, manage, and distribute all your production documents and workflows digitally. It’s easy to use, enables seamless collaboration, and includes military-grade closed-loop security so your documents are always safe, secure, and easily accessible on any device. Scenechronize has been pressure tested on real-world productions for over a decade including keeping scripts safe and preventing spoilers for all eight seasons of Game of Thrones. Get the right script sides to the right people with the industry-best sides generation and script analysis solution. All your documents encrypted both in transit and at rest, so your files are always secure.
  • 48
    DekkoSecure

    DekkoSecure

    DekkoSecure

    Dekko Secure is a fast-growing SaaS company providing leading-edge, military-grade security. Unlike many popular file sharing and collaboration tools our security was designed from the ground up for end-to-end encrypted, zero-knowledge data defence and sovereignty, whatever the file size or type. That's why we are trusted and chosen by government and business at the highest level. They also love that our web-based platform needs no installation or training so is quick to deploy and easy to use. Our security starts where the popular solutions stop. DekkoGov™ - Ultra-secure file sharing, collaboration & eSignatures for Government workflows. DekkoGov™ is trusted by Government departments and external stakeholders globally. DekkoPro™ - Share sensitive data easily using military-grade security with no file-size limits. DekkoPro™ allows businesses of all sizes to keep their data ultra-secure, simplify workflows, compliance and increase productivity.
  • 49
    AI Verse

    AI Verse

    AI Verse

    When real-life data capture is challenging, we generate diverse, fully labeled image datasets. Our procedural technology ensures the highest quality, unbiased, labeled synthetic datasets that will improve your computer vision model’s accuracy. AI Verse empowers users with full control over scene parameters, ensuring you can fine-tune the environments for unlimited image generation, giving you an edge in the competitive landscape of computer vision development.
  • 50
    Integrate

    Integrate

    Integrate

    Integrate is a multiplayer project management and collaboration platform built to support complex, cross-organizational programs by replacing outdated spreadsheets and fragmented tools with a secure, unified workspace that lets teams manage schedules, dependencies, and tasks together with external partners and stakeholders in real-time. It provides shared scheduling, dependency tracking, permissions-based access control, and a full history log so collaborators can smash silos, align plans, and maintain institutional memory across mechanical, electrical, software, and multi-discipline teams without chaos. Integrate is designed to scale from internal teams to multi-party initiatives spanning years and thousands of interdependent drivers while keeping communication and progress transparent across organizational boundaries, with the ability to granularly control what each participant can see and edit.