Enhanced Automatic Identification
The U.S. Coast Guard added five new data fields to
the Automated Identification System (AIS) in 2015
to expand information about vessel size and voyage
details. However, AIS information still is limited to
a set of unique vessel identifiers with minimal, and
sometimes inaccurate, vessel dimensions, indicate
officials with PortVision, Houston, Texas.
With PortVision’s new Vessel Intelligence module,
users now can access information about 50 additional
vessel attributes across 10,000 workboats and offshore
support vessels, making it easier to identify vessels
with specific features or to locate nearby vessels for
operational or incident-response purposes. Information
includes horsepower, deck space information, specialized capabilities and operator contact details.
PortVision users now are able to build custom fleets
based on unique attributes so they can quickly identify
the best vessel for the job and which vessel can be there
first. PortVision Vessel Intelligence integrates directly
with the existing PortVision subscriber package.
For more details, visit www.portvision.com.
Cyber Intelligence Toolkit
EclecticIQ, an Amsterdam-based startup, has developed
the Threat Intelligence Platform, a toolkit designed to allow
cyberthreat analysts to improve intelligence gathering and to
share it with trusted colleagues inside and outside the organization, helping everyone to be more proactive, company officials
announced. For the past year, EclecticIQ has been working
with financial institutions and security organizations, including
NATO’s Communications and Information Agency, to fine-tune the software. Now it is available globally.
The huge quantity of available intelligence presents a
challenge for threat analysts, but the Threat Intelligence
Platform allows users to focus on higher-level analysis.
Features include management of multiple intelligence feeds
from any source and enrichment of intelligence with external data sources and pattern recognition.
The EclecticIQ Platform is powered by Structured Threat
Information eXchange (STIX) and Trusted Automated
eXchange of Indicator Information (TAXII) open standards
and allows users to consolidate, analyze, integrate and col-
laborate on intelligence from multiple sources. STIX is a
standardized language developed by MITRE to represent
structured information about cyberthreats. TAXII is a
collection of services and message exchanges that enable
cyberthreat information sharing across product, service and
For more information, visit www.eclecticiq.com
Pentek Incorporated, Upper Saddle River, New Jersey,
recently introduced an addition to the Talon Series of recorders, the Model RTR 2750 rugged rackmount recorder. The RTR
2750 can be used for multi-channel radar, signal intelligence
and communications applications and offers the flexibility of
common or independent signal tuning and bandwidth.
The new recorder increases the performance of the Talon
Rackmount Series with twice the number of channels, more
than 50 percent more storage capacity, 25 percent faster sampling rates and nearly twice the sustained aggregate recording
rate. The RTR 2750 is a turnkey recording system in a single
rackmount chassis. It provides phase-coherent, synchronous
recording of 16 independent input channels at a sustained
aggregate data rate up to 8 gigabytes per second.
It also can capture transient signals and radar pulses.
The RTR 2750 offers a storage capacity up to 61 terabytes,
utilizing up to 32 hot-swappable solid-state drives, which
can be removed or exchanged during a mission to retrieve
For more information, visit
Sierraware, Sunnyvale, California, has introduced a new
virtual mobile infrastructure (VMI) product, VMI-in-a-Box, which allows organizations, including small businesses, to secure their mobile apps. The consolidated solution permits organizations to securely host mobile apps
in the cloud and keep sensitive data off of mobile devices,
Sierraware officials say.
VMI-in-a-Box offers all the benefits of VMI, but it also
accelerates deployment and provides verified virtual and
hardware appliances to optimize performance. It enables
enforcement of mobile app authentication, reduces risk of
data theft and satisfies regulatory requirements.
Features include an installation wizard; dual-factor authentication with passwords, PIN codes, client certificates or out-of-band authentication; and camera, microphone, audio, notification and Global Positioning System support to replicate
the native app experience while preventing storage of sensitive
information on personal phones.
For more information, visit http://sierraware.com/news_Sier-
To suggest items for inclusion in ProductQuest, contact email@example.com.