Products

BSS Unit is a company devoted to resilience, automation, strategic thinking, tactical execution, and sustainability. For people, for businesses, for supply chains, for governments.

Crisis prevention and management is the environment in which our philosophy was born, and in which our software development culture thrives.

Threat Intelligence Platform

The essence of the Cyber Intel Matrix (CIM) system, and the basis of its success, is its focus on Threat Hunting: attack prevention, risk-threat identification with automated information collection and classification even before an attack.

Static defense capability simply is not effective anymore, so within the platform, we operate solutions such as Blackpots, Malwarelab, STIX Graph visualized correlations and Cyber Threat Intelligence (CTI). 

The system collects information about attacking devices, threatening locations, methods, and information needed to identify an attacker. From this data we deduce motivations and specific attack vectors.

The system specializes in Industrial Control Systems (ICS) focused deception technology, including worldwide coverage based on our proprietary Blackpot Honeynet system, with hundreds of custom-developed and installed industrial controllers in a simulated Operational Technology (OT) environment.

Blackpot Honeynet is our proprietary honeynet system focused to emulate Industrial Control System (ICS) environments.

Software Development

You’re only as sustainable as your data is accessible.

Your supply chain system, and therefore your business, is only as good as the data you feed it.

Welcome to your business universe, DATAVERSIO. Your universe of accurate data, of secure processes, of authenticated transactions, and most of all, of people who are eager to use the system instead of obviate it.

Teams and third parties are scattered across the country, across the globe, but must be able to trust and interact like they are all in the same building. That’s where we start and that’s where we finish.

Authentication Technology

Encryption and authentication technology for validated transactions. A patent-pending solution for centralized authentication and secure encryption of personal identifiable information (PII), photos, latent biometric images, entire documents, tickets, payment cards and medical data. Enables offline use and validation by a central authority to form the basis of digital entity identification in supply chain tracking, workflow, and customer journey software platforms.