1
0

avirtek_inc_profile.json 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160
  1. {
  2. "company_name": "AVIRTEK, Inc.",
  3. "website": "https://www.avirtek.com/",
  4. "description": {
  5. "brief": "A cybersecurity company developing pioneering self-protecting cybersecurity products and services based on Autonomic Cyber Security (ACS) technology.",
  6. "detailed": "AVIRTEK, Inc. provides advanced cybersecurity solutions for government and enterprise sectors. Their core technology, Autonomic Cyber Security (ACS), is inspired by the human immune system to self-manage and self-protect networks, users, and data from diverse cyber threats with minimal administrator intervention. They offer products like the Autonomic Security Operations Center (ASoC) and services including managed cybersecurity and insider threat detection."
  7. },
  8. "location": {
  9. "headquarters": {
  10. "city": "Tucson",
  11. "state": "AZ",
  12. "country": "USA"
  13. },
  14. "operations": []
  15. },
  16. "offerings": {
  17. "products": [
  18. "Autonomic Security Operations Center (ASoC)",
  19. "Autonomic Cyber Security (ACS)",
  20. "Tactical Cyber Immune System (TCIS)",
  21. "Integrated Hardware/Software Appliances"
  22. ],
  23. "services": [
  24. "Managed Cybersecurity Services (MCS)",
  25. "Protection as a Service (PaaS)",
  26. "Host IDS as a Service (HaaS) for insider threat detection",
  27. "Managed Critical Infrastructure Security Services (MCISS)"
  28. ],
  29. "solutions": []
  30. },
  31. "technology_stack": {
  32. "software": [
  33. "Autonomic Cyber Security (ACS)",
  34. "Anomaly Behavior Analysis (ABA)",
  35. "User Cyber Footprint (UCF)"
  36. ],
  37. "hardware": [
  38. "Custom Hardware Appliances"
  39. ],
  40. "sensors": [],
  41. "materials": [],
  42. "algorithms": [
  43. "Self-Recognition Flows (SRFs)",
  44. "Self-Recognition Agents (SRAs)",
  45. "Self-Protection Agents (SPAs)"
  46. ],
  47. "platforms": []
  48. },
  49. "target_markets": {
  50. "sectors": [
  51. "Government",
  52. "Defense",
  53. "Enterprise",
  54. "Critical Infrastructure"
  55. ],
  56. "end_users": [
  57. "U.S. Air Force",
  58. "U.S. Army",
  59. "Smart Building Operators",
  60. "Smart Grid Operators"
  61. ],
  62. "business_model": "B2G/B2B"
  63. },
  64. "certifications_compliance": {
  65. "certifications": [],
  66. "security_clearances": [],
  67. "compliance_standards": [
  68. "CMMC (mentioned)"
  69. ],
  70. "registrations": []
  71. },
  72. "maturity_indicators": {
  73. "trl_levels": {},
  74. "company_stage": "Private",
  75. "years_in_operation": null
  76. },
  77. "awards_contracts": {
  78. "sbir_sttr": [],
  79. "government_contracts": [
  80. "$1.5 million award from U.S. Air Force and Army for ASoC development",
  81. "Over $7 million in non-dilutive funding from the DoD",
  82. "Contract with Air Force Information Warfare Battlelab (2005)",
  83. "$1 million product development award from the U.S. Army for TCIS"
  84. ],
  85. "gsa_schedules": [],
  86. "other_awards": []
  87. },
  88. "resources": {
  89. "press_releases": [],
  90. "case_studies": [],
  91. "whitepapers": [],
  92. "patents": []
  93. },
  94. "team": {
  95. "key_personnel": [],
  96. "expertise_areas": [],
  97. "total_employees": null
  98. },
  99. "capability_map": {
  100. "core_technical_keywords": [
  101. "cybersecurity",
  102. "autonomic computing",
  103. "insider threat detection",
  104. "anomaly detection",
  105. "network security",
  106. "critical infrastructure protection",
  107. "data trustworthiness",
  108. "biometric security"
  109. ],
  110. "application_domains": [
  111. "Network Defense",
  112. "Security Operations (SecOps)",
  113. "Critical Infrastructure Security",
  114. "Insider Threat Programs"
  115. ],
  116. "naics_codes": [
  117. "511210",
  118. "541511",
  119. "541512"
  120. ],
  121. "synonyms_related_terms": {
  122. "ACS": "Autonomic Cyber Security",
  123. "ASoC": "Autonomic Security Operations Center",
  124. "IDS": "Intrusion Detection System"
  125. },
  126. "deployment_environments": [
  127. "On-Premises Appliance"
  128. ],
  129. "standards_protocols": []
  130. },
  131. "transferable_capabilities": {
  132. "current_to_adjacent": {
  133. "Autonomic cybersecurity for defense": [
  134. "Financial services (fraud detection)",
  135. "Healthcare (protecting patient data)",
  136. "Industrial IoT (protecting control systems)"
  137. ]
  138. },
  139. "potential_applications": [
  140. "Autonomous vehicle security",
  141. "Supply chain security"
  142. ],
  143. "crossover_domains": [
  144. "Finance",
  145. "Healthcare",
  146. "Industrial IoT"
  147. ]
  148. },
  149. "metadata": {
  150. "profile_completeness": 0.8,
  151. "confidence_score": 0.9,
  152. "last_updated": "2025-10-15",
  153. "data_sources": [
  154. "https://www.avirtek.com/",
  155. "Google Search",
  156. "accessnewswire.com"
  157. ],
  158. "verification_status": "Verified from public sources. Note: Website had rendering issues for some pages."
  159. }
  160. }