Vision

Securboration was founded in 2001 on the belief that Security and Collaboration will have a significant impact on the evolution of software architecture across a variety of domains. As such, we are focused on developing technologies to meet the current and future needs for Secure and Collaborative Environments that span areas such as intelligence operations, mission planning, effects-based assessment, adversarial modeling, and cyber operations, among others. Our approach is based on a ‘user-centric’ perspective that leverages a variety of advanced computational algorithms to get ‘the right information, to the right people, in the right format, at the right time’. We have developed a variety of foundation technologies to support this evolution and enable industry and the Government move towards a net-centric environment, where collaborative solutions draw on a variety of algorithms and heterogeneous data sources across a distributed environment.

Securboration, Inc. has evolved from a small, research oriented company to a company that excels in transitioning research into operational solutions for both the public and private sectors. Since inception, Securboration has been awarded 80+ DoD and IC related contracts, most notably Small Business Innovative Research (SBIR) contracts. Securboration has participated in all three phases of the SBIR program: initial research and proof-of-concept (Phase I), full-scale development (Phase II) and commercialization (Phase III). Successes in this program have paved the way to growth and continual opportunities to provide robust, full-scale solutions that leverage all corporate capabilities. Securboration has also transitioned significant elements of our research efforts to customers such as USTRANSCOM, USAF Reserve Command and USCENTCOM.

Our systems integrate into net-centric and service-oriented environments, used in industry and Government, where collaborative solutions across distributed environments draw on a variety of technologies, algorithms and heterogeneous data sources. The technologies employed include, but are not limited to, Semantic Modeling, Natural Language Processing, Information Extraction, Cyber Defense, Adaptive Technologies supporting multi-core computing, Document Clustering, Social Media link analysis and behavior detection, and Bayesian inference and probabilistic reasoning systems. Past collaborations include researching key areas in Socio-cultural modeling, Cyber warfare, Counter Insurgency (COIN) and stability operations, multi-core computing and Effects-based assessment.