Current Partners

Connecting You

to Security Experts

Align your business with world-class training and expertise when you need it.

With over 15 years of experience, we connect the world to i2 better than anyone else. Our solutions protect your customers with a variety of security applications designed to fight a wide array of use cases. 

Our Partners

About Our Partners

IBM

IBMers believe in progress – that the application of intelligence, reason, and science can improve business, society, and the human condition.

LexisNexis

Developed in response to the specific needs of law enforcement investigators and criminal intelligence analysts, it builds on cutting-edge Accurint® investigative technology to give investigators and analysts a new way to access crucial information, visualize complex relationships, map data to show geographic connections, and rapidly identify potential investigative leads to quickly solve their cases.

Rosoka

Rosoka offers built-in load balancing, an integration-friendly SDK, and a desktop client build from Subject Matter Experts. Rosoka was designed to work where you need it to and is fully portable and scalable. Rosoka is 100% pure Java and can run on Windows, Linux, tablet, server, or in the cloud.

Esri builds ArcGIS, the world’s most powerful mapping and spatial analytics software. ArcGIS software and apps combine mapping and data analytics to deliver location intelligence and meet digital transformation needs for organizations of all sizes.

JohnsTek, Inc provides CyberSecurity and Systems Integration in support of Healthcare, Education, Transportation, Financial, Critical Infrastructure, National Security, Defense, and International Federal Law Enforcement, Industries.  They provide customer-tailored solutions that feature best-of-breed, performance-enhancing, capabilities that are serviced by the most qualified professionals.

Enrich Group is an American owned private business whose mission is to communicate and understand client needs and develop customized cybersecurity solutions that cater to their specific requirements. We build strategic partnerships and create a path forward to meet goals and thrive to become the partner of choice. We adopt incremental and continuous improvement strategies, so our customers can experience the utmost benefits while minimizing business operational impacts and service disruption. Our cybersecurity technical management team brings over 25 years of experience, serving in the U.S. Defense and Intelligence community. 

Threat Detection and Defense. Defendry layers on top of existing Security cameras and provides 24/7 Threat Detection. Defendry automatically detects visible guns, masks, & intruders 24/7 by analyzing your security camera streams. Instant threat detection, Detects visible guns, masks, and intruders, Cutting-edge, proprietary AI detection system developed by research scientist, Dr. Sean Huver. Auto-Lock Doors. If a gun is detected, doors are automatically locked to prevent further entry by the armed culprit while remaining unlocked from the inside so people can escape. Bulletproof laminate can also be installed to prevent forced entry through the glass.  Prohibits entry by people visibly holding guns False alerts quickly reversed by human reviewers Easy to integrate with access controlled doors via API.

Flock Safety’s ALPR system securely captures images of license plates at speeds up to 70 miles an hour while the proprietary machine-learning algorithm identifies a vehicle fingerprint including license plate, vehicle type, and vehicle color. Once images are captured, the camera almost immediately uploads them into our securely encrypted cloud server. This means that even if an individual device is tampered with or vandalized, there will be no footage on the actual camera. The system can run the plates against local and national law enforcement databases as well as Amber and Silver Alerts.

Hammer IT Consulting is a leading provider of IT and Security solutions serving State and Local Government, Higher Education, K-12, Healthcare, and Corporate Entities throughout the United States and world. We maintain long-standing relationships with a broad range of clients helping them to effectively manage an increasingly demanding technology infrastructure environment.

IBM

Sintelix offers industry-leading information extraction capabilities including entity and relationship extraction at high accuracy in many languages. Vast quantities of unstructured data can be combined to create accurate entity networks linked to topic analyses and community structure decompositions.

DarkOwl Vision automatically, anonymously, and continuously collects, indexes, and ranks actionable data from the darknet – unlike the conventional approach which relies heavily on manpower.

We saw a need for improved intelligence management in Title III cases and other investigations within law enforcement. Qtis fills that need making investigations more efficient, reducing errors, and increasing success rates. Qtis provides an improved, innovative way of tracking case information like no other software in the market.

For more than 30 years we’ve grown Frontier by helping clients like you build the datacenters and IT infrastructure that power their business. Our decades of experience and focus on the future means you can store, serve, analyze and maintain your data across platforms, software, networks, and the cloud in ways that set your business apart. Our cybersecurity-first approach means your data is safeguarded end-to-end and at every step-protecting and fueling your competitive edge.

Purpose built software for investigation, evidence, and brief management. COMtrac’s workflow is built specifically for investigations. We automatically create the digital brief of evidence as the investigation progresses. COMtrac’s software provides clarity in what is proven and unproven, thereby driving the quality and consistency of your investigations. Our users are enabled to fully configure forms, workflows, labels, and brief of evidence templates. As your trusted investigations partner, we improve investigative outcomes and decisions.

SpyCloud is laser-focused on preventing online fraud with our proactive solutions, which protect billions of employee and consumer accounts worldwide from account takeover and thwart follow-on attacks like business email compromise and ransomware.

Echo Analytics Group has been providing OSINT services for over ten years.  Whether you need OSINT products, training, or technology, we’ve got you covered. Our carefully screened analysts are armed with dozens of advanced analytics tools, data mining software, and our field-tested OSINT research and analysis methodology to achieve one goal – prepare you for what comes next!

Whooster leverages our OWL technology with public and private data sources to get you reliable and fresh information when you need it. Whooster’s OWL Technology Platform has a wide range of uses across multiple industries seeking to Access, Integrate, Link and Match Data Housed in Various Databases, Applications and Formats.

Want to Become a Partner?

Blue Light’s Partner Program strives to promote the advancement of our business and our partner’s business. We are always here to help.

2139 Valleygate, Suite 201, Fayetteville, NC 28304

 

© Blue Light LLC 2020