top of page

Incident Command System Compliant

 

The National Incident Management System (NIMS) requires most public safety agencies use the Incident Command System (ICS) when responding to major incidents.  No Incident Commander can function without a steady stream of accurate and timely information. During major incidents and events, that responsibility falls to the Intelligence Group. Prior to 2SAT, the Incident Commander relied on windshield surveys that are slow in coming and hard to track. They also hoped for timely Situational Reports (SitReps) from the field. 2SAT now makes every citizen with a social media account a potential information source. In today’s society, the average citizen is posting pictures and video with detailed descriptions of events and circumstances. For the first time, 2SAT allows the Incident Commander to leverage this powerful source of information in an organized and timely manner. Validation of information is faster and more reliable. That results in saved lives and saved dollars. 2SAT is now the most important safety and planning tool an Incident Commander can have.

 

 

 

 

 

How It Works?

 

2SAT's automation algorithms uses our computational power and speed to inspect code and data entering and traveling through a computer network.  It not only compares this network traffic to known security threats but it also examines it for data anomalies.  It immediately flags and quarantines data traffic deemed to be suspicious for human evaluation and adjudications.  2SAT uses several automation technologies from different partners to evaluate the data.  Each technology uses a different inspection and anomaly detection method.  This reduces the likelihood of successful cyberattack as it would have to make it through several different security systems.

 

 

 

 

Why Do This?

When 2SAT Does This!

bottom of page