Catalyst Accelerator has nationwide recognition and attention – get to know our alumni below!
How might we apply cyber technologies to secure the next generation of space operations and increase resiliency?
While terrestrial cyber security technology development creates a foundation to extend existing solutions to celestial applications, space systems come with unique characteristics that may require adaptations from existing strategies or radically new approaches to the problem. Therefore, the US Space Force sought out bold and disruptive approaches to security for space cyber-physical systems and operations.
How might we take advantage of the latest in information analysis and data fusion to provide insight into space objects’ past, current, and predicted trajectories, capabilities, and intentions?
The Catalyst Accelerator sought out small businesses and startups with commercially viable data analytics to address the Air Force’s and Department of Defense’s needs in space situational awareness. We sought out approaches to analyze or fuse existing data containing space object positions and signal levels (in the optical, radar, RF, IR, or other) as a function of time, along with any other freely available data or metadata (e.g., weather, astronomical data, published satellite data).
Catalyst Accelerator sought out small businesses and startups with commercially viable solutions to address Air Force (AF) and Department of Defense (DoD) applications in space-based ISR.
Technologies of relevance included significantly advantageous sensing devices including detectors, transmitters, antennas, optics; signal processing and multi-source fusion algorithms, computing resources, and services; and technologies and methods for smart distribution of ISR products to DoD consumers (the right information to the attention of the right entity at the right time).
The Air Force sought out a suite of options to augment, supplement, backup, complement, and or improve current space communication capabilities. Solutions may be ground-based or space-borne and involve some combination of hardware devices, software, data products, algorithms, or services.
As of 2016, satellite communication accounted for 49% of the operational satellite market with 35% of coming from the commercial sector. Additionally, communications satellites accounted for 22% of the overall satellite revenue for the year 20161. From a military perspective, space communication ensures effective transmission of information to and from the warfighter.
Solutions needed to demonstrate commercial viability to ensure an efficient evolution through development to respond to rapidly evolving technologies.
Catalyst Accelerator sought out entrepreneurs, startups, and technologists from established companies with commercial solutions to provide PNT in a GPS-denied environment. Submitted solutions were to augment, supplement, backup, complement, and improve upon current PNT capabilities provided by GPS.
Submissions ranged from single-user solutions to network-based or satellite-based solutions that serve multiple users. Technology users may be humans on foot, in buildings, in restricted terrain or caves; or, users may be aircraft, ships, satellites or automated networks ingesting PNT data.
Catalyst Accelerator sought out commercial and industry solutions to address the ability to monitor earth’s terrestrial environments with the objective of providing improved global weather data and products to support the warfighter.
Solutions included anything from a full commercial operations floor providing services and data to the US government, to a set of niche ground and space based sensors, data, data processing, improved algorithms, and services provided directly to an Air Force operations floor or operators on the ground.
Copyright © 2021 Catalyst Campus 501 (c)(3) All rights reserved.
00:19 – LyteLoop invented, designed and demonstrated Storage in Motion technology to store vast amounts of data in space with ultra security in endlessly circulating loops of light saving physical space, power, time and greatly reducing cost. Presented by Ohad Harlev
00:29 – Astrapi: Symbol Waveform Hopping unlike alternative approaches provides secure communications in the time domain to enable advanced persistent SATCOM. Presented by David Shaw
00:38 – Corlina is a Trust Security Software System that provides a continuous measure of confidence so that an IoT system is trustworthy with a verifiable immutable record of the integrity of observations made by applications deployed on the trusted IoT System. Presented by Antonio Espinosa
00:48 – Vitro is a Zero Trust IoT platform. We create hardware and software to authenticate messages and code to and from remote operating equipment. Authentication ensures secret and secure command and control messaging to remote operating equipment, including vehicles, sensors and munitions. Presented by David Goodman
00:56 – ANOVA Intelligence develops AI/ML-powered, enterprise-scale software to find and attribute APT behavior in critical endpoints at first breach. Presented by Gentry Lane
01:05 – CyberCentric is an AI-driven data categorization company. We enable Organizations to know precisely where their most sensitive data is, who has access to it and how it’s being used. Presented by Jeremiah Steptoe
01:14 – ARMS Cyber is an application and secure container cyber security solution that utilizes moving target defense techniques for applications and DevSecOps pipelines to drastically reduce the likelihood of a successful zero day attack by constantly shuffling the code and thus making vulnerabilities almost impossible to find (radio frequency hopping for software). Presented by Michael Bryant
01:22 – DornerWorks: VM Composer is a software development tool for embedded devices to configure, build, and deploy virtual machine-based systems, eliminating the need for you to become a VM expert. It saves time, money and resources while quickly and easily providing you the benefits of using virtualization in your system. NASA and the Army are funding development of new features for this tool. Presented by Jarvis Roach
By continuing to use this website, you consent to the use of cookies in accordance with our Cookie Policy.
Accept