Capabilities

Software Development

Virtual & Hardware Prototyping

Modeling & Simulation

Advanced Algorithm Development

Solutions

Cyber Security

Health Care Optimization

Social Media Analysis

Acquisition Support

Multi-Sensor Data Mining

Business Process Optimization

Supply Chain Anayltics

Risk Management

System of Systems

Workforce Analytics

Products

EDAptive® EDASTAR™

EDAptive® EDAASSURE™

EDAptive® EDASHIELD™

Contact Us

Edaptive Computing, Inc.

1245-G Lyons Road

Dayton, OH 45458

  Applications

   Contact

  Careers

    About Us

    Contracts

Home / Capabilities / Products

ECI Products

ECI provides cost-effective solutions to its customers by leveraging its innovative product tool suites.

EDAptive® EDASTAR™

EDAptive® EDAASSURE™

EDAptive® EDASHIELD™

The increasing complexity of military and commercial electronics systems, coupled with the frequent performance or operational requirements to upgrade or replace obsolete technology, has created a need for tools and techniques for cost effective and rapid replacement of components and systems. This need exists in both legacy systems as well as new systems in large measure because the pace of technology advancement is increasing faster than new systems and upgrades can be fielded.  This condition also applies to complex processes, which must be frequently evaluated and optimized to meet the changing environments in which they operate.  EDASTAR offers a suite of tools and methodologies that help close these gaps by facilitating rapid trade-off analysis, performance and risk assessment, and other automated analysis and visualization.  This results in significant advantages to both the end users of these systems and processes, and those responsible for their maintenance.

EDASTAR is composed of a core modeling and analysis framework combined with a collection of plug-ins for meeting specific analysis needs relating to complex processes and systems.  These modules provide the following technical core capabilities that can be evolved, combined and integrated to create specific solutions.

  •  
  • Risk Data and Analysis
  • Process and Workflow Data and Analysis
  • Maturity Data and Analysis
  • Supply Chain Data and Analysis
  • Document and Content Requirements Data and Relationships Trace
  • Asset and Cost Data and Analysis
  • Architecture Data and Analysis
  • Schedule Data and Analysis
  • Workforce Data and Analysis
  • Document Content Development and Management
  • Document Content Collaboration and Consensus Management
  • Sensor Data and Analysis
  • Master Data and Data Relationships Management
  • Visualization of Data, Relationships, and Analysis Results
  •  

>

>

>

>

>

>

>

>

>

>

>

>

>

>

EDAptive® EDAASSURE™ is composed of formal methods based tools for design and system assurance.  This includes an integrated tool suite for modeling, verification, and analysis of systems at both the architecture level and the software binary level.  Using standard formats, EDAAssure can automatically import system representations and apply powerful, automated verification tools to check specific reliability and safety requirements.  These tools are leveraged to provide:

 

  • Verification of safety and security properties during system design
  • Independent assessment of system architectures
  • Identification of software vulnerabilities from binary code

>

>

>

EDAptive® EDASHIELD™ is an integrated, comprehensive suite of cyber security applications and tools that are designed to protect hardware and software assets throughout the five levels of technology abstraction in embedded and commercial applications.  The five levels of technology abstraction are enterprise, system, board, chip, and code intellectual property (IP).  Addressing each of these levels individually and all levels concurrently forms a broad, yet seamless, methodology to address vulnerabilities and enhance the overall security of all mission critical assets.  EDASHIELD approaches each of the levels of technological abstraction individually, collectively, and also explores the arbitrary boundaries between the levels.  The purpose of having a comprehensive, integrated approach to cyber security is to address the unique vulnerabilities or attack vectors at each individual level while addressing the gaps within and between levels, all the while being fully aware of the comprehensive cyber security architecture.  Additionally, certain vulnerabilities cannot be addressed at the level where they are most malicious, but addressing those vulnerabilities at a level above or below can isolate the attack, thus minimizing the risk or optimizing the effectiveness of the security response.  This comprehensive approach also points to the need to be completely aware of all security issues throughout a complex system’s life cycle.

 

EDASHIELD combines multiple technologies into one comprehensive, easy-to-use GUI-based tool suite.  Its primary goal is to give design and development teams a clear path from start to finish towards the development of secure digital assets and systems.  EDASHIELD also guides the implementation of security features into existing systems where possible instead of ad hoc patches.   The ultimate benefit from the EDASHIELD suite is to provide the design team the guidance and ability to design, develop, and implement cyber security solutions for resilient architectures in a manner that cohesively addresses potential vulnerabilities at all levels of digital assets, regardless of the level of implementation.

NEXT:

SOFTWARE DEVELOPMENT

<

PREVIOUS:

ADVANCED ALGORITHM DEVELOPMENT

<

to find out how we can help your business contact us

 

Capabilities

Solutions

Careers

Contracts

About Us

Contact

1245-G Lyons Road, Dayton, OH 45458

Tel (937) 433-0477

Contact Us

CONNECT WITH US

Copyright © 2008- Edaptive Computing, Inc.