View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. News
April 21, 2021

HawkEye 360 develop maritime security and vessel monitoring capabilities

HawkEye 360 has developed new maritime security and vessel monitoring capabilities that combine its radio frequency (RF) geolocation services with Amazon Web Services’ (AWS) machine learning (ML) model.

HawkEye 360 has developed new maritime security and vessel monitoring capabilities that combine its radio frequency (RF) geolocation services with Amazon Web Services’ (AWS) machine learning (ML) model.

Free Whitepaper
img

Never Trust, Always Verify: Is Zero Trust the Next Big Thing in Cybersecurity?

Cyberattacks continue to rise every year and no sector seems to be immune. Hackers target sensitive information such as organizational, client, and financial data, as well as intellectual property (IP) and proprietary functions. As digital transformation becomes a top priority for many organizations, traditional perimeter-based security models are no longer sufficient to address the growing cybersecurity concerns. Against the backdrop, enterprises explore zero trust as it takes a micro-level approach to authenticate and approve access at every point within a network. Reasons to read: The cybersecurity landscape is swiftly changing, and businesses need more awareness to meet the evolving change. The report highlights the current state of play and the future potential of the zero trust approach in cybersecurity to protect critical digital infrastructure of enterprises across sectors such as financial services, healthcare, telecom, and transportation, among others. Read our report and gather insights on the following topics:
  • Traditional vs zero trust protection
  • Key advantages and solution providers
  • Major industries and key players
  • Drivers and challenges
  • Top funded startups and Mergers & Acquisitions
  • Implementation challenges
by GlobalData
Enter your details here to receive your free Whitepaper.

The maritime security and vessel monitoring capabilities will be integrated into the HawkEye 360 portfolio of products.

Using underlying vessel characteristics and behaviours, it becomes possible to predict whether a given vessel is likely to engage in similar activities as sanctioned vessels.

Amazon SageMaker Autopilot, a fully managed service that helps to quickly build, train and deploy ML models, has been used by HawkEye 360 in the development of the algorithms undergirding the new capabilities.

The purpose-built, proprietary algorithms can help to derive maritime domain insights from RF and vessel information.

HawkEye 360 stated that the RF signals ability and ML analysis support a range of applications such as commercial maritime activity, national security operations, maritime domain awareness and environmental protection.

HawkEye 360 product vice-president Tim Pavlick said: “RF signals can provide valuable insight into commercial vessel activity across the globe, even when bad actors seek to hide their location.

“With these ML-backed capabilities, we will empower customers to cut through an ocean full of noise to obtain more timely and critical insights from maritime RF data to improve mission outcomes and prevent illegal and illicit activities.”

The algorithms evaluate past data, known interactions and contextual vessel characteristics to produce insights into the complex connections that are involved in illegal maritime vessel activities, such as illegal fishing, human trafficking and more.

 

Related Companies

Free Whitepaper
img

Never Trust, Always Verify: Is Zero Trust the Next Big Thing in Cybersecurity?

Cyberattacks continue to rise every year and no sector seems to be immune. Hackers target sensitive information such as organizational, client, and financial data, as well as intellectual property (IP) and proprietary functions. As digital transformation becomes a top priority for many organizations, traditional perimeter-based security models are no longer sufficient to address the growing cybersecurity concerns. Against the backdrop, enterprises explore zero trust as it takes a micro-level approach to authenticate and approve access at every point within a network. Reasons to read: The cybersecurity landscape is swiftly changing, and businesses need more awareness to meet the evolving change. The report highlights the current state of play and the future potential of the zero trust approach in cybersecurity to protect critical digital infrastructure of enterprises across sectors such as financial services, healthcare, telecom, and transportation, among others. Read our report and gather insights on the following topics:
  • Traditional vs zero trust protection
  • Key advantages and solution providers
  • Major industries and key players
  • Drivers and challenges
  • Top funded startups and Mergers & Acquisitions
  • Implementation challenges
by GlobalData
Enter your details here to receive your free Whitepaper.

NEWSLETTER Sign up Tick the boxes of the newsletters you would like to receive. The top stories of the day delivered to you every weekday. A weekly roundup of the latest news and analysis, sent every Friday. The industry's most comprehensive news and information delivered every month.
I consent to GlobalData UK Limited collecting my details provided via this form in accordance with the Privacy Policy
SUBSCRIBED

THANK YOU

Thank you for subscribing to Ship Technology