- Detect network traffic anomalies as events by passive monitoring
- Collect cybersecurity events from SMIS sensors
- Collect cybersecurity events from other devices
- Correlate groups of events into alerts
Security Monitoring Infrastructure System
The ÐÓ°ÉÊÓƵ Security Monitoring Infrastructure System (SMIS) is a cybersecurity and network situational awareness tool pre-integrated with signature, behavioral, and algorithmic network security and traffic anomaly detectors. Our 11 patents on core technologies make SMIS a uniquely powerful solution to monitor your network environment and provide a robust cyber situational awareness system and tool suite.
SMIS installs on commodity hardware and has been scaled from monitoring small single enclave networks to huge world-spanning interconnected webs of devices. SMIS has been deployed as a simple stand-alone solution and has been integrated into other network operations tools to provide a rich view of the cyber environment in other custom or commercial tools.
SMIS is a combination of:
- Network intrusion detection system (IDS or NIDS)
- Security event management system (SEM, SIM or SIEM)
- Network traffic analysis system
- Network packet recorder
- Workflow and trouble ticketing
- Reporting
![Cybersecurity Security Monitoring Infrastructure System component](/content/theboeingcompany/us/en/defense/cybersecurity-and-intelligence-messaging/smis/_jcr_content/root/container/container_copy/image.coreimg.png/1726700167265/322072-cybersecurity-smis-componentimage.png)
Cybersecurity and analytics use cases
![Conceptual image showing data fields](/content/theboeingcompany/us/en/defense/cybersecurity-and-intelligence-messaging/smis/_jcr_content/root/container/container/container/container/image.coreimg.jpeg/1726700189132/322072-cybersecurity-cybersecurity-310x175-032621a.jpeg)
Cybersecurity
![Person with glasses looking at data screens](/content/theboeingcompany/us/en/defense/cybersecurity-and-intelligence-messaging/smis/_jcr_content/root/container/container/container/container_copy/image.coreimg.jpeg/1726700215252/322072-cybersecurity-networkanalytics-310x175-032621a.jpeg)
Network analytics
- Verify or validate specific network traffic
- Assess top talkers
- Analyze bandwidth and protocol usage
- Perform network security and forensics
- Monitor network performance
![Person looking at data screens](/content/theboeingcompany/us/en/defense/cybersecurity-and-intelligence-messaging/smis/_jcr_content/root/container/container/container/container_copy_1200551097/image.coreimg.jpeg/1726700239728/322072-cybersecurity-securityoperations-310x175-032621a.jpeg)
Security operations center as a service
- Dedicated analysts who continually work with you and help respond to threats as they arise
- Highly trained group of cyber defense analysts available 24/7
Robust, proven and powerful
![Icon showing one hub node with 8 nodes leading into hub](/content/theboeingcompany/us/en/defense/cybersecurity-and-intelligence-messaging/smis/_jcr_content/root/container/container_106099486/container_copy_20995/container/image.coreimg.png/1726700270393/322072-cybersecurity-icons-310x215-032621a-11.png)
Easily integrated and rapidly deployed
- Fast setup, reduced integration time
- Initial actionable intelligence in a matter of hours
- Each component installable on current hardware
- Web service managed
![Icon demonstrating hard drives with modular nodes](/content/theboeingcompany/us/en/defense/cybersecurity-and-intelligence-messaging/smis/_jcr_content/root/container/container_106099486/container_copy_20995/container_copy/image.coreimg.png/1726700291066/322072-cybersecurity-icons-310x215-032621a-13.png)
Modular architecture
- Robust API for cross-product integration
- Datasets accessible from existing applications
- Data forwarding to common operating picture
- GUI interoperability
- Stand-alone or part of a larger solution
- Embedded options
![Icon showing stack of hard drives](/content/theboeingcompany/us/en/defense/cybersecurity-and-intelligence-messaging/smis/_jcr_content/root/container/container_106099486/container_copy_20995/container_copy_1463839114/image.coreimg.png/1726700314773/322072-cybersecurity-icons-310x215-032621a-12.png)
Scalable for any enterprise
- Echelon scaling
- Lower echelons: autonomy for tailored analysis
- Higher echelons: detection of multiregion trends and anomalies
- Built-in redundancy
- Scalability to achieve faster throughput
![Icon showing nodes going around a globe](/content/theboeingcompany/us/en/defense/cybersecurity-and-intelligence-messaging/smis/_jcr_content/root/container/container_106099486/container_copy_20995/container_copy_272050755/image.coreimg.png/1726700335630/322072-cybersecurity-icons-310x215-032621a-14.png)
Advanced situational awareness
- Deployed systems that operate with little or no maintenance support
- One-time upfront cost for a robust system, instead of recurring license fees and mandatory support
![Icon of shield with a checkmark inside](/content/theboeingcompany/us/en/defense/cybersecurity-and-intelligence-messaging/smis/_jcr_content/root/container/container_106099486/container_copy_20995/container_copy_422692394/image.coreimg.png/1726700355159/322072-cybersecurity-icons-310x215-032621a-15.png)
Customer proven
- Protects thousands of unique devices hosting billions of dollars’ worth of ÐÓ°ÉÊÓƵ, government and partner intellectual property (inside and outside the U.S.)
- Satisfies numerous risk management framework (RMF) technical security controls completely, others partially, including Federal Information Processing Standard (FIPS) 140-2