Federal Intelligence

  • Counter risks with an edge on actionable information.
  • Gain instant 360° views in critical situations.
  • Quicker reaction to cybercrime and terrorism.

Our Solutions


OSINT Intelligence Warehouse

The Challenge

The Internet has become a major economic, political and cultural factor in every country of the world. Information is global and instantly available. The cost of services is plummeting. New online services, including flexible self-service solutions, provide live feedback on user data and business processes involved. Institutions and individuals everywhere are free to choose products and services from a global reservoir of offerings. Internet sites and services have become indispensable as an economic factor. Mobile Internet continued to promote the ubiquity of Internet services and led to an even further increasing online presence of users and providers of such services.

Our Solution

The dependence on online services also created new risks with respect to the confidentiality of information, the integrity of systems, the availability of resources, the authenticity of services, and the reputation of such sites. OSINT (Open Source Intelligence) utilizes publically-available information on a large scale to derive actionable intelligence - for situation rooms, individual analysts on desktops, or mobile users out in the field.

Relevant Solution Areas


Cybersecurity Operations Center

The Challenge

While enterprises may operate Cybersecurity Operations Centers to safeguard their own IT environments and valuable assets, there is also an urgent need to establish such platforms on a national scale to defend the national information infrastructure against cyberthreats and cyberattacks from the outside and inside. Legal frameworks define the regulatory requirements on interfaces between national security and corporate security organizations. The trust businesses and investors are willing to place in a country today greatly depends on political stability and the robustness of the country's infrastructure. This requires a national cybersecurity strategy that is pervasively implemented.

Our Solution

In contrast to enterprise-level systems, a national Cybersecurity center will not address the lowest level of networks, devices, connections, services and applications, but focus on the interconnection properties of such networks and services, on the information flowing through interconnection points, and a national coordination of Cybersecurity efforts. Key factors for a successful coordination are information sharing, the nation-wide availability of actionable information, and the proliferation of established best practices. Our next-generation Cybersecurity Operations Center based on Big Data analytics will provide this: an intelligent platform for anomaly detection, network analysis and tailored Threat Intelligence that provides real-time views on the Cybersecurity status of an entire country. Drill-down capabilities allow security officials to zoom into specific areas to investigate unusual activities in more detail.

Relevant Solution Areas


Video Synopsis

The Challenge

Video surveillance is used in corporate security applications as well as for public security. The volume and complexity of video material requires significant human efforts to scan through recordings to spot specific scenes or individuals. Fast-forward scanning of videos is is error-prone and still personnel-intensive.

Our Solution

Our video synopsis solution lets you review a day of video footage in minutes. Moving objects in recorded video footage are identified and time-tagged. In an automatically derived, condensed video - the video synopsis - , only actual movements will be shown. In many cases, this reduces the play time by a factor of 100 and more. As motion is recognized, it is also tagged with directionality and visual elements moving. Consequently, this can be applied to filter movements by direction, colors, or other properties, leading to a further cut-down on the duration of a synopsis. Depending on the quality of video recordings, the video analytics solution may be complemented with image analytics on the moving images identified.

Relevant Solution Areas


MERCURE Communication Analytics

The Challenge

The evaluation of CDR dumps, mobile location information and other data sources is complex due to its volume, different data formats, and distribution over several source systems.

Our Solution

The Cyber Vision telecommnication analysis solution manages relevant interfaces to source systems, data format transformations, and visualizations of records or aggregations.

Relevant Solution Areas