The NIJ Forensic Technology Center of Excellence (FTCoE) is committed to improving the practice and strengthening the impact of forensic science through rigorous technology corroboration, evaluation, and adoption; effective knowledge transfer and education; and comprehensive dissemination of best practices and guidelines to agencies dedicated to combating crime.
Lab capability: IT Security
RTI International – Cyber Security
RTI researchers devlope methods and tools for sharing large-scale data sets of varying degrees of senstivity with members of the cyber security resesarch community. In addition, RTI is capable of economic analysis and modeling for critical infrastructure and cyber security investment decisions . RTI staff also performs data mining for hostile surveillance patterns, terrorist profiling, and other homeland security studies.
High Tech Crime Consortium
The High Tech Crime Consortium is a nonprofit organization that assists law enforcement and corporate investigators to obtain the knowledge and skills needed to combat 21st Century crime where the use or abuse of digital technology is an element of an offense.
Unisys Stealth
Unisys Stealth is an innovative, software-based security solution that delivers consistent, inimitable security for global enterprises focused on protecting data in their data center, cloud, and mobile infrastructures.
Check Point Software Technologies Ltd.
Since 1993, Check Point has been dedicated to providing customers with uncompromised protection against all types of threats. Check Point offers a wide range of education programs, professional certifications and self-study resources developed in-house by Check Point security experts.
Symantec Corp.
Symantec is a global leader in providing security, information management solutions to help customers secure and manage their information against more risks at more points, more completely and efficiently than any other company. The companyÕs unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.
Trend Micro, Inc.
Trend Micro Inc. is a global security software company that provides services aimed to protect end users on any device, optimize security for the modern data center, and secure networks against breaches from targeted attacks.
Fortinet, Inc.
Fortinet provides top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperative fabric.
FireEye, Inc.
FireEye, Inc. is a network security company that provides automated threat forensics and dynamic malware protection against advanced cyber threats, such as advanced persistent threats and spear phishing. FireEye protects both large and small organizations committed to stopping advanced cyber threats, data breaches and zero-day attacks.
CyberArk Software, Ltd.
CyberArk is an information security company focused on privileged account security. The company’s technology is deployed worldwide Ð primarily in the financial services, energy, retail and healthcare markets.