Alternatives to Silent Archer
Compare Silent Archer alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Silent Archer in 2026. Compare features, ratings, user reviews, pricing, and more from Silent Archer competitors and alternatives in order to make an informed decision for your business.
-
1
Silent Auction Pro
Silent Auction Pro
Silent Auction Pro provides complete event management software for charitable fundraising events. Virtual, In-Person or Hybrid events - we do it all. Manage donors and donations, sell tickets, manage seating assignments, create an awesome online auction catalog or print paper bid sheets. Live auctions, Fund-a-Need / Raise the Paddle, Text-2-Donate, Giving Campaigns. We have you covered! Not to mention World Class Support. We are the #1 rated and reviewed fundraising solution with over 600 reviews and a 4.8 star rating. Silent Auction Pro has been helping charitable organization raise money for their causes for over 20 years.Starting Price: $449/yr unlimited events -
2
ZeroEyes
ZeroEyes
ZeroEyes is an AI weapons detection platform that identifies threats at first sight. Founded by a team of Navy SEALs our mission is to detect weapons before shots are fired, enable faster response times for first responders and ultimately end mass shootings. AI weapon identification can help locate threats before they become violent. This provides first responders with the best information possible. Integration with local 911 and police forces can help prevent a dangerous situation from escalating. Using ZeroEyes, first responders have the right details in real time, so they can immediately respond to the threat. With custom solutions for your specific needs, ZeroEyes connects to your existing security cameras and building infrastructure for an added layer of protection. Senseless violence has caused the loss of too many lives. At ZeroEyes we are working to support security professionals and law enforcement. The quicker you know there may be a threat, the quicker you can respond. -
3
Nexium Defence Cloud
Thales
Nexium Defence Cloud is a comprehensive, modular private cloud infrastructure tailored to meet the stringent security and operational demands of military forces. It enables armed forces to swiftly adapt their Communications and Information Systems (CIS) to dynamic operational scenarios, facilitating rapid deployment of services and communities of interest through mission-oriented, automated management tools. By integrating civil cloud technologies into military environments, Nexium Defence Cloud enhances operational efficiency, accelerates maneuvers, and empowers joint force commanders to prepare missions in days, deploy in hours, and adapt in minutes, all with minimal expertise. The solution offers a distributed cloud node architecture, providing local storage and computing capabilities to avoid single points of failure, with form factors ranging from rackable nodes for headquarters to rugged edge servers for hostile environments. -
4
Armory Master Pro
Armory Master
Our weapons tracking system, designed for armory management, is perfect for law enforcement, the military, security firms, gun shops, shooting clubs, and sports shooters. This system ensures efficient and secure firearm tracking. Secures with military-grade technology. Field-tested weapons tracking system. Secure SSL encryption and RFID tracking. RFID technology has greatly improved how we keep track of things like equipment and assets, making it a key player in digital weapons tracking systems. Our experts can help you customize Armory Master Pro, our advanced weapons tracking system, to perfectly fit your needs and prevent weapon loss. Leveraging over 20 years of expertise in asset tracking expertise and a robust portfolio of field-tested projects, our Armory Master Pro offers military-grade precision for weapons tracking systems. Employing advanced SSL encryption and RFID technology, we guarantee high-accuracy firearm tracking. -
5
GOVRED
GOVRED
We build the best virtual reality simulators using the best, cutting-edge, hardware. We employ the best developers, so that we can produce the best VR content. We work directly with our customers to produce the best training simulators. GOVRED provides the military with full line of firearms training and combat simulators. Military engagement training has never been more realistic than with GOVRED’s proprietary training technology. GOVRED provides law enforcement agencies with an extensive line of the best judgmental use of force, crisis intervention, de-escalation, active shooter, and firearm training simulators available. Marksmanship is skill in shooting coupled with the ability to hit the target you are aiming at with confidence and accuracy. This is especially important in hostile, split-second, situations. GOVRED skill building drills will give the trainee confidence knowing they can shoot quickly, confidently, and accurately. -
6
Leidos VACIS
Leidos
VACIS systems scan cargo containers, trucks, railcars, buses, and passenger vehicles to help authorities search for narcotics, weapons, nuclear material, undeclared goods, and other contraband at ports of entry, border crossings, military facilities, and other checkpoints. Leidos is a world leader in non-intrusive inspection technology. Since the technology in 1999, hundreds of systems have been deployed for government and commercial clients around the world. Every VACIS system is available with our dedicated installation, training, maintenance, and technical support. The shortest wheelbase and the lightest weight in its class for better maneuverability and handling, an industrial chassis designed for firetruck duty, a global support network, and an advanced high-energy imaging system with material discrimination. These features and It's AI/ML capabilities allow inspectors to quickly and accurately search for weapons, contraband, undeclared cargo, and other items. -
7
Lattice for Mission Autonomy
Anduril Industries
An advanced software platform enabling a single human to control and coordinate a wide range of autonomous assets across the ocean, land, and sky to deliver successful mission outcomes. Lattice for Mission Autonomy makes it possible to compose different platforms and payloads, made by different vendors, into different mission solutions for different mission requirements. Mission Autonomy integrates and orchestrates the platforms, piloting, sensors, and payloads to deliver autonomous teams capable of accomplishing complex missions. Lattice for Mission Autonomy defense and commercial applications extend across air, land, and sea by leveraging platforms such as collaborative combat aircraft, robotic combat vehicles, and autonomous underwater vehicles to conduct missions like ISR, defensive counter air, seafloor mapping, critical infrastructure surveillance, and more. -
8
Silent Push
Silent Push
Silent Push reveals adversary infrastructure, campaigns, and security problems by searching across the most timely, accurate and complete Threat Intelligence dataset available. Defenders can focus on stopping threats before they cause a problem and significantly improve their security operations across the entire attack chain whilst simultaneously reducing operational complexity. The Silent Push platform exposes Indicators of Future Attack (IOFA) by applying unique behavioral fingerprints to attacker activity and searching our dataset. Security teams can identify new impending attacks, rather than relying upon out-of-date IOCs delivered by legacy threat intelligence. Our solutions include: Proactive Threat Hunting - Identify and track malicious infrastructure before it’s weaponized. Brand & Impersonation - Protect your brand from phishing, malvertisement, and spoofing attacks. IOFA Early Detection Feeds - Monitor global threat activity with proactive intelligence.Starting Price: $100/month -
9
Lattice for Command & Control
Anduril Industries
It enables men and women in uniform to move with machine speed, unparalleled confidence, and military-grade security by turning data into information, information into decisions, and decisions into actions across tactical and strategic operations. Lattice accelerates complex kill chains by orchestrating machine-to-machine tasks at scales and speeds beyond human capacity. Lattice cuts through the noise and creates a shared real-time understanding of the battlespace. It autonomously parses data from thousands of sensors & data sources into an intelligent common operating picture in a single pane of glass. Lattice uses technologies like sensor fusion, computer vision, edge computing, and machine learning, and artificial intelligence to detect, track, and classify every object of interest in an operator's vicinity. Lattice can scale to integrate thousands of sensors and effectors globally across multiple domains. -
10
FORESTER
SRC
FORESTER is a one-of-a-kind technology that provides warfighters with real-time, all-weather, day/night target detection and tracking capabilities for actionable intelligence. The system was designed and developed by SRC under sponsorship from the Defense Advanced Research Projects Agency (DARPA), the U.S. Army, and the United States Special Operations Command (USSOCOM). It has been successfully tested for use on manned or unmanned helicopters. Stand-off, persistent, wide-area XXXXX surveillance. All-weather, day/night detection. Ultra High-Frequency (UHF) Ground Moving Target Indicator (GMTI)/Airborne Moving Target Indicator (AMTI)/Synthetic Aperture Radar (SAR) capability. Real-time, onboard processing. 360-degree surveillance coverage with electronic beam steering to search a 90-degree sector. The Foliage Penetration Reconnaissance, Surveillance, Tracking and Engagement Radar (FORESTER) is an airborne radar system that provides stand-off, persistent, wide-area surveillance. -
11
L3Harris hC2
L3Harris
The L3Harris hC2 software suite is a complete command and control solution that connects all echelons. As part of our integrated tactical communication systems family, hC2 streamlines network access through an easy-to-use interface. The integrated applications of the hC2 software suite support various platforms including Android, PC, and Web. They share data in a common format so information can be entered once in the network and then accessed from anywhere. The result is a common operational view with real-time intelligence for more informed decision-making. Supports operational staff in collaborative mission planning and execution. Forward battle management system for frontline commanders. Enhances force protection by providing dismount commanders with a real-time, shared operational picture. Solutions that solve our customers' toughest challenges. -
12
BE.WEAPON
STid
BE.WEAPON is a hardware and software solution specially developed to secure and simplify the management of armories for the various army corps and all police forces. BE.WEAPON simplifies and secures your armory management. BE.WEAPON consists of a monitoring application that is combined with an RFID system (passive RFID readers and tags). BE.WEAPON tells you at any time where your equipment is and who is carrying it. If your equipment is not in the armory, you know why and for how long. Optimized management of material handling processes within the armory. Secure and reliable traceability of equipment, weapons, and ammunition. Real-time visualization of the status of weapons, equipment, and ammunition stock (movement history, etc.) Simplified management of hardware maintenance. Simple and fast management of collection/return operations for weapons and equipment. Shortens the time it takes agents to become operational in the field. -
13
Helsing
Helsing
Helsing is a new type of defense AI company. We believe that software, in particular artificial intelligence, will be the key to protecting our democracies. Our purpose is to attain technological leadership so that democratic societies are free to make sovereign decisions and control their ethical standards. Democracies are fragile. Protecting them from external threats is one of our most important responsibilities. We founded Helsing out of a belief that safety and deterrence are only possible if we embrace software and artificial intelligence to make our forces more effective. As democracies, we have a special responsibility to develop and deploy these technologies thoughtfully and with the highest ethical standards. Our approach is software-first. We partner with industry and governments to connect existing and new hardware platforms with advanced AI. We are looking for people with their hearts in the right place, who share our conviction that democratic values are worth protecting. -
14
Axon Vision
Axon Vision
The modern battlefield consists of small targets concealed in an urban area. Additionally, current sensors are flooding the human operator with information. Our technology boosts the effectiveness and survivability of manned & unmanned platforms by increasing situational awareness, speeding decision-making, and enabling autonomous capabilities. Our products are integrated into military-grade platforms, through partnerships with leading multi-national companies. We uncover the full and uncompromising potential of AI to solve today’s most critical challenges while leading tomorrow’s AI-powered defense technology. Multiple hardware options and complete software function configuration flexibility provide integrators with powerful video processing solutions. Our flexible video processing hardware and software enable camera system integrators to create a tailored solution in a wide range of civil, commercial, and military operations. -
15
Thales Commander
Thales
Our command and intelligence suite provides powerful tools for rapid information exploitation, supporting decision-making through a common tactical picture. Commander is our Command, Control, Communications, and Intelligence (C4I) solution, built on open architecture, integrating operational information systems and tactical communications. MINDS serves as a multi-sensor image interpretation and dissemination system, critical for air operations with capabilities such as data production for reconnaissance, ground surveillance, targeting, real-time digital acquisition, and scalability. NIES is our networked image exploitation system, offering battlefield insights across multiple light wavelengths while facilitating resource sharing and situational awareness. DMPS is a comprehensive digital mapping tool that enables 3D object extractions, geometric and radiometric image processing, and efficient project data management. -
16
SitaWare Suite
Systematic Defence
Dominate the battlespace with comprehensive situational awareness on all levels of command. The SitaWare suite offers C4ISR solutions for battle management across the entire battlespace, on land, at sea, in the air, or in the joint domain. As a combat-proven commercial off-the-shelf software, the suite provides advanced command-and-control capabilities and seamless interoperability, enabling you to share information with coalition partners. Each part of the SitaWare suite is specially developed to support specific roles. From fixed and deployable headquarters operations to mounted missions and dismounted troops, the SitaWare suite encompasses the entire battlespace. With its open architecture and rapidly scalable configuration, it can easily meet the ever-changing needs of modern defense forces. Operating across all domains and levels of command, the SitaWare suite allows for an accessible, sharable, and secure common operating picture. -
17
Operator XR
Operator XR
Operator XR delivers portable, secure and highly immersive virtual reality training and mission rehearsal software that integrates advanced simulation with real-world weapons, tools and sensors to enhance human performance in high-risk situations for military and law enforcement professionals. Its core system, OP-2, combines cutting-edge tactical training software with custom integrated IoT sensors, enabling front-line personnel to conduct immersive scenarios using service-specific weapons, inert recoil training devices and force options across de-escalation, active-shooter and crisis intervention environments. Operator XR’s tool supports fully customizable scenarios, mission rehearsal and analytics with secure offline use and simple setup without internet or fixed infrastructure, letting teams train anywhere from forward operating bases to academies. The software streamlines realistic training by allowing agencies to design tailored environments, rehearse tactics and procedures. -
18
Pearl Bids Silent Auction Manager
Oakgrounds
Managing your silent auction can be difficult without the right software app. Pearl Bids will help you set up your auction and manage your donations, attendees, donors, and billing - quickly and easily. The only software that can be used for an unlimited number of auctions and donation items all for a low flat fee. Finally, a hassle-free, silent auction software app that allows you to easily create bidding sheets, party tickets, receipts, and reports and includes fundraising ideas. This is how to run a silent auction. Scroll through the feature slides or watch some of the how-to videos to see for yourself why our customers continue to use Pearl Bids year after year for all of their silent auction events. Organize your donations by tables (eq spa-table, travel-table, etc) and print beautiful bid sheets, with your auction logo and donation item image. Create unlimited silent auctions, with unlimited donation items.Starting Price: $19.99 one-time payment -
19
32auctions
32auctions
We specialize in helping raise money through online silent auctions. The auctions are private and allow you to build a trusted network of auction participants. We have made this the easiest online silent auction website. You can have an auction running in a matter of minutes. Our goal is to help you raise money for your cause. We're committed to providing an effective online silent auction experience for auction administrators and bidders alike.Starting Price: $30 one-time payment -
20
Silent Armor
Silent Breach
Silent Armor is an AI-powered perimeter defense platform designed to predict and prevent cyber breaches before they occur. It continuously analyzes hundreds of security metrics across an organization’s attack surface to deliver real-time, intelligent protection. The platform combines predictive analytics, dark web monitoring, and threat correlation to uncover emerging risks. Agentless attack surface monitoring allows organizations to discover exposed assets without deploying endpoint software. Automated mitigation playbooks help neutralize threats directly from a unified dashboard. AI-generated daily security briefs provide executive-level insights and prioritized remediation steps. Built for CISOs, SOC teams, and MSSPs, Silent Armor transforms fragmented security data into proactive, actionable defense.Starting Price: $49/asset/month -
21
Peace Silent Camera
Peace App
Introducing the best silent camera! No shutter sound, photos can be taken in absolute silence! It's also #1 for image quality among many silent cameras! Have you experienced a situation where you want to take a picture of a baby while he's sleeping, but the shutter sound always wakes him up? Or, have you ever wanted to take a photo of your pet with a natural expression, but the shutter sound always scares him? Try this high-quality silent camera! You won't disturb anyone around you because the shutter is silent. You can take high-quality photos in any situation, such as your baby's cute face while sleeping, your pet's natural behaviors, or what is written on the blackboard! You can get the best memories by taking high-quality photos with a silent camera! High quality, high-speed continuous shutter, trigger timer, zoom, autofocus/manual focus, scene selection, white balance, color effect, composition guide, and user friendly.Starting Price: Free -
22
DIgSILENT StationWare
DIgSILENT
DIgSILENT StationWare is a reliable central protection settings database and asset management system, based on the latest .NET technology. StationWare stores and records all settings in a central database, allows modelling of relevant workflow sequences, provides quick access to relay manuals, interfaces with manufacturer-specific relay settings and integrates with PowerFactory software, allowing powerful and easy-to-use settings coordination studies. DIgSILENT StationWare is a centralised asset management system for primary and secondary equipment. The large number of individual settings for numerical relays nowadays requires careful management in order to function reliably. Handling data from networks containing devices from various manufacturers can be problematic from an IT perspective, with each manufacturer requiring installation of its own software. -
23
Arcas
BigBear.ai
BigBear.ai’s integration of computer vision, predictive analytics, and event alerting technology revolutionizes data analysis at the edge. Leveraging AI and machine learning, our advanced systems sift through vast datasets to uncover insights beyond human reach, effectively eliminating blind spots and augmenting situational awareness. Arcas synthesizes millions of data points to enhance situational awareness and powers predictive forecasts with artificial intelligence and machine learning. It intelligently processes video streams and generates real-time alerts upon detecting anomalies. Through our adaptable analytics framework, Arcas not only monitors past events but also projects future trends, empowering leaders to make informed decisions with confidence. Seamlessly integrate disparate data sources such as sensors and edge devices, unifying them into a universally accessible format. -
24
Silent Circle
Silent Circle
Joining Silent Circle puts your organization in an exclusive network – the SCircle. You’ll be joining the many other like-minded businesses, NGOs, and governments who have committed to preserving their secrets, their reputation, their intellectual property, and the privacy of their users. Using Silent Phone, your team’s users can contact others in the SCircle with complete peace of mind that your communications are secure. Once your team has joined Silent Circle, other organizations in the SCircle can contact your team’s users if they know your usernames. To make it possible for others to find your users by searching by name, you can make your users public in the SCircle Directory. When your team’s users are managed by Silent Manager, they are never searchable by name in the SCircle Directory. However, these users can contact and be contacted by users in other organizations by knowing each other’s username. -
25
Systematic IRIS Suite
Systematic Defence
Powerful military messaging and interoperability capabilities, directly off-the-shelf. The IRIS suite has revolutionized military messaging and interoperability in modern defense forces with its range of commercial off-the-shelf (COTS) software solutions. In service with numerous NATO nations, the IRIS suite is combat-proven, meeting the demands of the modern battlespace. The IRIS suite covers all aspects of military messaging, from management and maintenance of standards to production and distribution of military messages. With its support of various Message Text Formats (MTF) and binary standards, the IRIS suite is a flexible and adaptable software solution for military professionals that provides strong military messaging and interoperability capabilities directly off the shelf. As the IRIS suite integrates seamlessly with standard products, such as Microsoft Office, it provides you with a user-friendly framework for drafting, editing, and sending military messages. -
26
SilentDispatch
Silent Dispatch
The SilentDispatch software suite utilizes the power of the cloud and its own robust feature set to allow your dispatchers, drivers and customers to easily complete the customer's wish of moving from one place to another. Featuring best-in-class customization capabilities and the ability to scale from five to five hundred vehicles, SilentDispatch allows you to easily manage the chaos of mobile operations. SilentDispatch increases dispatcher and driver more efficiency while minimizing your operating costs. At the same time, the software insures an enhanced customer experience by incorporating readily available technology (i.e. cell phones, Web) to bring you closer to your customer. Once you see this product in action, you will understand how the power of proven, cutting-edge technology can help your business grow and prosper. -
27
coUrbanize
coUrbanize
coUrbanize is the only online community engagement solution purpose-built for real estate developers and planners to connect with neighbors. Connect to silent supporters with targeted outreach tools like physical signs and interactive text messaging. Features like traffic visualizations make complex topics more interactive and accessible. Synthesized, automated reporting that folds into the project record. -
28
Modirum | Gespi
Modirum | Gespi
Modirum Gespi delivers mission-critical situational awareness and advanced defense-technology solutions designed for both civil-security and government environments. Their platforms provide real-time insights, comprehensive intelligence, and decision-support tools that enhance operational effectiveness in complex, fast-moving scenarios. With a focus on deep-technology integration, the company combines hardware, software, and AI-driven systems engineered for resilience, high reliability, and deployment in demanding conditions. Their portfolio includes autonomous systems, communications infrastructure, and full-spectrum defence electronics, enabling customers to operate with enhanced visibility, coordination, and readiness. Modirum Gespi emphasises interoperability, rapid deployment, and adaptability to evolving threats and environments. -
29
Automate patch management with PDQ Deploy & Inventory. Use PDQ Inventory to scan, collect, and organize your devices, then use PDQ Deploy to set a preferred schedule for deployment. Once the deployment has been scheduled, PDQ will automatically and silently apply updates without inconveniencing end users. - Integrate with Active Directory to easily collect device data 📊 - Schedule multi-step and multi-application custom deployments 💻 - Access the Package Library, which includes 100+ ready-to-deploy third party applications 📦 - Remotely execute commands, run scripts, and force reboots 🥾 - Apply updates silently 🤫 - Create custom device groupings 🖥️ - Use our PowerShell scanner, CLI, and other prebuilt tools 🧰 - Save and export reports, including custom data like asset information 📈 - Share servers and databases with other consoles 🤝 tl;dr — PDQ Deploy and Inventory makes device management simple, secure, and pretty damn quick.Starting Price: $1,575/year/user
-
30
Scale Donovan
Scale
Personnel constrained by time, technology, and other resources overlook petabytes of historical information and incoming data. Uncertainty around the information that exists prevents you from unlocking valuable insights and providing optimal recommendations. Classified information can’t leave secure networks and be sent directly to open-source AI models. Existing AI solutions are not geared toward defense and intelligence use cases, terminology, or context. Stakeholders frequently need written reports and briefings that require manual and time-intensive effort. Stakeholders require an adaptable solution that can conduct translation, coding assistance, and parse data for insights. Dig into all available data to rapidly identify trends, insights, and anomalies. Accelerate intelligence cycles and provide exhaustive analysis without overlooking information. Precisely translate documents with Donovan to capture semantic nuance and context. -
31
Npackd
Npackd
Npackd (pronounced "unpacked") is a GPLv3 licensed installer/application store/package manager/marketplace for applications for Windows. It helps you to find and install software, keep your system up-to-date and uninstall it if no longer necessary. The process of installing and uninstalling applications is completely automated (silent or unattended installation and un-installation). It helps you to find and install software, keep your system up-to-date and uninstall it if no longer necessary. You can watch this short video to better understand how it works. The process of installing and uninstalling applications is completely automated (silent or unattended installation and un-installation).Starting Price: Free -
32
Formed through the acquisition of multiple companies, this A&D company needed to consolidate systems and support its plans for organic growth by lowering its total cost of ownership. Additionally, the company looked to gain more flexibility with its solution, centralize support, and deploy updates faster and with more agility. The company selected CloudSuite™ Aerospace & Defense to manage the supply chain across five North American sites with the roll-out of a global chart of accounts to support their finance needs. To meet the demanding timeline required for deployment, the company used an Infor Implementation Accelerator—a combination of software, services, education, and tools to speed deployment without modifications. CloudSuite Aerospace & Defense software provides advanced capabilities relied upon by 5,500+ aerospace and defense manufacturers worldwide.
-
33
Red 6
Red 6
ATARS is a multi-node, all-domain, augmented reality (AR) system that enables a complete LVC ecosystem for multiple users, from beyond visual range (BVR) to within visual range (WVR) in dynamic environments. Utilizing an extremely low-latency protocol that is waveform and network agnostic, ATARS delivers the high-speed data passage necessary to create a seamless, multi-player, augmented reality experience viewed through a full-color, wide field of view, and high-resolution display. Our EVE headset (Enhanced Visual Environment) is a transformational leap in wearable augmented reality technology. Previously there has been no means by which virtual assets could be visually represented in the real world, outdoors, and at high speeds. Red 6’s EVE hardware is the brightest headset available, allowing for outdoor use in full daylight and, critically, in high-speed environments. -
34
Silent Install Builder
Apreltech
Silent Install Builder is designed with the purpose to help users create silent setup packages that allow them to install several applications on multiple computers. Packages generated using Silent Install Builder can contain multiple installers of different types, which are automatically recognized by the application. InstallShield, Inno Setup, Wise, and NSIS (Nullsoft Installer) are the supported categories. Getting accustomed to the application is not difficult at all, thanks to its intuitive, well-organized, two-sided interface. The left pane displays the components of your project in a structured manner, while the right side enables you to edit the properties of each item. Users can specify detailed information regarding their package, such as the product name, version, the manufacturing company, and assign it a small file description, as well as a welcoming message that is included in the final output. The location of the actual installer file must also be specified.Starting Price: $299 / user -
35
Shift
Shift
We help unlock the full potential of the American economy by delivering cross-industry upskilling programs for active duty and a high-impact talent marketplace highlighting military talent. Our vision is to create a world where career growth and learning are visible, accessible, and affordable, and the diversity of someone’s experience and achievements are fairly assessed and celebrated. A mission to supercharge the defense-industrial partnership that underpins America’s national security and economic vitality. A proven, scaleable military assessment system that underpins training programs to more effectively communicate, collaborate, and partner with the private sector. Our talent marketplace recommends the best-fit military talent to your needs, enabling you to host active duty fellows or transitioning interns who bring defense expertise to your organization. Continue the mission through transition with access to civilian recruiters within Shift's network of defense-tech partners. -
36
Valcour SaaS CAD/RMS
CrossWind Technologies
Valcour SaaS CAD/RMS™ provides fully functional CAD interface as part of its core product at no additional cost. Valcour™ supports flexible dispatch, self-dispatch, silent dispatch and shared dispatch. To support different Dispatcher data entry preferences, Valcour™ provides both a text-based Command Line Interface as well as a menu-driven interface. Each call is automatically given a sequential incident number based on agency settings. Calls can be canceled by checking a box on the initial call screen. Even when canceled, the call is tracked with number and can be counted statistically, or altered, dispatched, etc., at any time in the future.Starting Price: $399.99 per user per year -
37
DELOPT
DELOPT
DELOPT focuses on the design, development and production of embedded systems and electro-optics systems for military and civilian applications. Our offerings for defense includes avionics displays, on board computers, ate's, high speed data acquisition system, thermal imagers, target trackers etc. The Automatic Video Tracker (AVT) accepts video signal from a surveillance camera as input, tracks and provides the location of the chosen object with respect to the centre of Field of View of the camera as output. The AVT can be used to track static or moving objects from a static or moving platform. The DIR-SA-900 Series Thermal Imager developed by DELOPT is based on 25 micron pitch 384 x 288 uncooled microbolometer array operating at room temperature. New product DIR-SA-910 Series Handheld Thermal Imager. -
38
SquirrelBak
SquirrelBak
SquirrelBak is a simple, secure, and silent one-way backup tool for Windows environments. It enables real-time folder synchronization from a source machine ("Sender") to an idle PC in another location ("Receiver")—with no cloud, no login, and no restore complexity. Ideal for backing up continuously growing folders like logs, documents, and OA data. ✨ Features - One-way sync (Sender → Receiver) - Real-time folder monitoring with low CPU/disk usage - One-click sync between PCs - Auto-reconnect and resume transfers after network recovery or restart - No cloud, no account, no subscription required - Silent background operation with system tray control - Backup history logs - Check and CompleteStarting Price: $0 -
39
Wallace IT Visual Voicemail
Wallace IT
Older Vodafone customers that have previously activated visual voicemail should be able to use their voicemail pin to login. Newer customers receive an automatically generated VVM password via a silent SMS, which can only be intercepted using the Xposed framework method below. This is a limitation of the Android framework which does not allow a non-system app to receive type 0 SMS messages. If you get a "username or password incorrect" error, advanced users can use the Xposed framework method to setup their accounts. Visual Voicemail includes an Xposed framwork module in order to receive VVM SMS messages from the provider. These messages are silent, type 0 SMS that cannot normally be received by Android applications.Starting Price: Free -
40
MilDef OneCIS
MilDef
MilDef’s software offering centers on OneCIS, a ruggedized tactical C2IS (Command & Control Information System) platform designed to rapidly deploy secure, flexible, and scalable IT services to mobile commands and tactical units in demanding environments. OneCIS automates configuration and orchestration of core IT infrastructure, including communications (IP routing, switching, firewalling), directory and messaging services, databases, collaboration tools, web services, and security tools, so that tactical IT capabilities can be deployed in hours instead of days or weeks with minimal human intervention. It serves as a tactical private cloud at the edge, bringing Infrastructure as a Service (IaaS) and automated workflows for hypervisor, OS, virtual appliances, network, and core services deployment, and supports integration of functional services such as Command & Control, battlefield management, and geographic services as needed. -
41
PSTrax
PSTrax
PSTrax is a cloud-based operations management platform built for Fire & Rescue, EMS, Law Enforcement, and Department of Defense (DoD) agencies. The platform digitizes routine checks and automates inventory tracking across key operational areas including Vehicles, Stations, PPE, SCBA, Supplies, Assets, Controlled Substances, and Blood Products. Each module is tailored to meet the unique demands of the agency type it supports, ensuring relevance across diverse mission sets. The platform reduces administrative workload and supports operational readiness by replacing paper checks and spreadsheets with intuitive digital tools. Agencies can adapt each module to their needs, stay aligned with evolving standards, and maintain full visibility and accountability, freeing more time to focus on public safety and protecting the communities they serve. -
42
SHIELD
Plectrum
SHIELD is a weapons and armory management system that is designed and customized to fit the specific needs of organizations handling weapons. It is a secure, quick, and efficient system for authenticating users and their assigned weapons, it is a system that keeps track of all weapons and their handlers using RFID and GPS technology to guarantee accountability and responsibility at all times, a single interface connected to all armory locations for quick reliable retrieval of weapon inventory and location information. SHIELD is also used as a critical asset management solution, not just a weapons management solution, that allows for accurate inventories and authenticated transfer of weapon ownership. As an enterprise software system for the management of arms and ammunition. SHIELD consists of various modules that will make the armorer’s administrative operations easier and less tedious. SHIELD comes with a bundle of benefits to the armorer and the services at large. -
43
Defense Llama
Scale AI
Scale AI is proud to announce Defense Llama, the Large Language Model (LLM) built on Meta’s Llama 3 that is specifically customized and fine-tuned to support American national security missions. Defense Llama, available exclusively in controlled U.S. government environments within Scale Donovan, empowers our service members and national security professionals to apply the power of generative AI to their unique use cases, such as planning military or intelligence operations and understanding adversary vulnerabilities. Defense Llama was trained on a vast dataset, including military doctrine, international humanitarian law, and relevant policies designed to align with the Department of Defense (DoD) guidelines for armed conflict as well as the DoD’s Ethical Principles for Artificial Intelligence. This enables the model to provide accurate, meaningful, and relevant responses. Scale is proud to enable U.S. national security personnel to use generative AI safely and securely for defense. -
44
Rebellion Defense
Rebellion Defense
We believe warfighters must be equipped with the best software capabilities to detect, deter, and outpace the modern adversary at speed and scale. We’ve brought together private sector technologists with defense veterans who deeply understand the mission. Together, we build technology for defense and national security. We develop advanced software to outpace national security threats. Gain real-time entity identification and tracking for complex threat environments. Rebellion builds software to analyze and secure mission data at speed and scale. We deliver decision-quality insights so operators and analysts can make faster, more informed decisions to keep our adversaries at bay. Gain real-time tracking, predictive analytics, and adaptive planning for complex mission environments. Understand your mission’s exposure to global cyber threats by using automated adversary emulation. Our software delivery model guarantees adaptability, flexibility, and resilience. -
45
1TEN
1TEN, Inc
1TEN is a CMMC Level 2 compliance platform purpose-built for small and mid-size Defense Industrial Base contractors. Unlike cloud-based competitors, 1TEN runs entirely on-premises, air-gapped, with zero cloud dependencies, ensuring Controlled Unclassified Information never leaves your facility. The platform covers all 110 NIST SP 800-171 requirements across 14 domains through 23 integrated modules, including an Assessment Wizard, Evidence Manager, POA&M Tracker, SSP Builder, Policy Generator, Asset Inventory, and Incident Response tools. It calculates your live SPRS score as you document controls, generates C3PAO-ready System Security Plans automatically from your actual configuration data, and produces all 14 required domain policies from your answers, eliminating weeks of manual documentation work.Starting Price: $12,500 -
46
Improbable
Improbable
Improbable Multiplayer Services (IMS) is an ever-evolving ecosystem of tools and services dedicated to optimizing how games as a service are built and operated. The first title from our in-house studios, Scavengers is a new kind of shooter where players fight for survival in a world ravaged by ice storms and swarming with hostile AI. Find out how Midwinter Entertainment worked with Improbable Multiplayer Services to make it all possible. Need help with distributed physics or open world generation? How about the infrastructure and tooling for operating a GaaS? The Multiplayer Guys are the only co-development studio focussed exclusively on multiplayer game solutions. Together with our ecosystem of partners, Improbable’s defence business is helping governments and defence organisations meet the fluid, fast-moving and endlessly complex security challenges they face. -
47
Palantir Foundry
Palantir Technologies
Foundry is a transformative data platform built to help solve the modern enterprise’s most critical problems by creating a central operating system for an organization’s data, while securely integrating siloed data sources into a common analytics and operations picture. Palantir works with commercial companies and government organizations alike to close the operational loop, feeding real-time data into your data science models and updating source systems. With a breadth of industry-leading capabilities, Palantir can help enterprises traverse and operationalize data to enable and scale decision-making, alongside best-in-class security, data protection, and governance. Foundry was named by Forrester as a leader in the The Forrester Wave™: AI/ML Platforms, Q3 2022. Scoring the highest marks possible in product vision, performance, market approach, and applications criteria. As a Dresner-Award winning platform, Foundry is the overall leader in the BI and Analytics market and rate -
48
Common Message Processor (CMP)
JB Management
CMP is a user-friendly Java® application that provides the capability to process formatted military messages. It is widely used throughout the United States DoD to provide a bridge between tactical, email, legacy, and web-enabled users. CMP provides message parsing, validating, journaling, generating, and editing capabilities essential to the proper processing of military standard (MIL-STD) messages. The software validates message structure, content, and context as per the associated MIL-STD specifications. Portable, Java-based applications. Multi-platform support (Windows x86/x64, Linux x86/x64). Extensive Java Application Programmer Interface (API). In addition, CMP has been independently validated by Conformance to Standards (CTS) testing by the Joint Interoperability Test Command (JITC). It provides for backward compatibility with fielded systems with support for many MIL-STD headers and numerous message baselines (and annual revisions).Starting Price: $599 one-time payment -
49
L3Harris Falcon Net Ecosystem
L3Harris
Powered by tightly integrated networking technologies, the L3Harris Falcon Net Ecosystem delivers robust, resilient, data-centric communications, no matter how complex the scenario. Tactical decisions need to move at the speed of light and be correct. Rich data intelligence, video ISR, high-speed MANET networks, and unwavering interoperability are critical for mission superiority. That is the foundation of Falcon Net Ecosystem technologies. This end-to-end solution is fueled by over six decades of global tactical expertise, and our commitment to warfighter safety and overmatch capabilities. Software-defined for simplified upgrades and investment protection. Over 100,000 in action worldwide from the global leader in tactical communications. LPI/LPD technologies reduce jamming, interception, and detection. Network design, deployment, and monitoring are faster and more accurate. -
50
XFdtd
Remcom
XFdtd is a full-wave 3D electromagnetic (EM) simulation software created by Remcom. This innovative and full-featured electromagnetic simulation solver provides high-performance computing options and simplifies the analysis of the most complex EM problems. XFdtd offers a wide range of applications that include microwave device design, antenna design and placement, radar and scattering, biomedical applications, automotive radar, waveguides, military and defense contracts, RFID, EMC/EMI, and more.Starting Price: $14750.00/one-time/user