Our Corporate Members
Drawing from over a century of intelligence-related analytical collaboration and service to various sectors, including intelligence, law enforcement, government, and commercial industries, we've crafted our award-winning technology.
This innovation, Blue Fusion, was specifically designed to tackle a significant challenge in crime prevention and investigations: the Extract, Transform, and Load (E.T.L.) process commonly used by major intelligence-analysis tools. Discover how our cutting-edge technology seamlessly enhances your data access and analytics, all within a cost-effective and easily scalable package. Say goodbye to the wasteful drain on your precious time and resources caused by the E.T.L. process.
From an operational support perspective, ENDICTUS leverages the domain knowledge and technical experience of our ex-uniformed cyber operators and testers, as well as the decades of specialized experience from our cyber industry experts, to deliver mission-focused and operationally stable solutions to the DoD and Intelligence Communities.
Beyond operational solutions, ENDICTUS customers take advantage of our domain and technical expertise for consultative support on emerging technology efforts. Customers seek our analysis, feedback, and guidance regarding cyber tool selection, integration, management, and security implications. Our collective and cross-cutting experience provides ENDICTUS with an uncommon level of fidelity in understanding how and where DoD and IC information systems can be exploited. This perspective thereby provides ENDICTUS and our customers with a uniquely thorough approach to effective cyber strategy decision-making.


Fivecast is a world-leading provider of digital intelligence solutions that enable the world’s most important public and private organizations to explore masses of data, uncovering actionable insights which are critical to protecting global communities. Purpose-built to address the highest priority use cases in the national security, law enforcement and defense markets, Fivecast deploys advanced data collection and AI-enabled analytics to solve the most complex intelligence challenges.
Hubstream stands out with its unparalleled ability for analysts to hyper-customize data environments, creating personalized interfaces and tailored workflows. Furthermore, its advanced AI simplifies data processes and prioritizes critical data points from multiple sources without manual intervention, empowering analysts to transform complex data into strategic decisions for stakeholders in real-time.

i2 is the only intelligence analysis software that arms analysts with the advanced fusion and multi-dimensional analytics they need to create actionable intelligence to detect, disrupt, and defeat sophisticated threats. i2’s advanced analytics and intelligence analysis tools, such as the industry leading i2 Analyst’s Notebook, help analysts transform data into decisions in near-real-time, uncover hidden connections with visual displays, and turn overwhelming and disparate data—regardless of the source—into actionable intelligence.

The International Anti-Crime Academy (IACA) is a recognized (higher) vocational school in The Netherlands. IACA offers University Studies in the field of Open Source Intelligence (OSINT) and Social Media Intelligence (SOCMINT). Most IACA students are OSINT Analysts within Law-Enforcement, the Ministry of Defense, or Special Intelligence Units. IACA provides tailor-made training programs and lectures worldwide.
- Visual analytics for data from any source—without coding
- 80+ OSINT and closed-source APIs integrated into a single, unified interface
- AI-driven insights from unstructured documents
Our no-code tools are designed for non-technical users working with big and complex data. We also offer professional services delivering tailored workflows, seamless integrations, and custom solutions.
Kineviz is trusted around the globe for mission critical applications involving sensitive information.

ShadowDragon provides open source intelligence software and unique datasets to allow analysts the freedom to focus on the investigation, not the time-consuming tasks of managing data. Developed by seasoned cyber investigators, our products strengthen the capabilities of in-house teams by enabling the easy and safe collection, correlation, and verification of diverse artifacts on the open, deep, and dark web.