TechNet Augusta 2019 Sponsorship and Branding Opportunities

AFCEA has developed an enhanced sponsorship program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Sponsorship opportunities are offered at several investment levels, ensuring your ability to participate.

Browse available options below, or jump to specific categories: Patron Packages, Individual Sponsorships, Branding Opportunities.

Solution Review: Enabling Efficient Communication Protection across Multiple Types of Communication

  • Room: Estes B
Wednesday, August 21, 2019: 9:00 AM - 9:15 AM


Speaker (confirmed)
Keith Withington
Chief Technology Officer/Co-Founder
Bear Systems


Bear Systems provides a new type of cybersecurity that protects devices and device communications. Bear’s solution was originally designed for lightweight IoT devices in order to consume minimal power while providing maximum device and data communications security.

Bear’s Systems places full security on every device. Our solution enables lightweight device protection, data encryption and decryption, device authentication and authorization. The solution employs end-to-end AI for advanced remediation capabilities and device management.

Bear’s powerful next-generation device and data communications protection and control enables ubiquitous coverage across all IoBT devices. Bear works across any type of existing network from Ethernet, WiFi and Bluetooth to RF, satellite, radio and OTA.

Bear was originally built to work over Bluetooth Low Energy (BLE) environments. A main aspect of this protection is a peer-to-peer multi-tiered approach wherein Bear continuously verifies the identity of each device, eliminating costly roundtrips to external sources for validation. Instead, Bear has a single packet solution for authorization and authentication that eliminates complex handshakes and message exchanges.

Bear works very low on a device which makes Bear both more efficient and able to provide advanced protection. The lower down a device’s operations, the faster programs work, with decreasing amounts of overhead and power consumption for lower heat production and heat signatures. The optimal location for encryption is on microprocessors and Bear can manage these chips. The next most efficient location for controlling processes – even those outside of an operating system – is in the BIOS. Bear works within this context and can move up a level into the very bottom of an operating system depending on the use case.

Bear encrypts Ethernet, the lowest level data packet found in devices, and uses a group of security keys applied randomly. Bear can exceed the security of 256-bit encryption without ever having to generate such a large key. Bear has found that generating a number of small-sized keys, from 50- to 100-bits in size, is much less costly in terms of resources and much more secure. The power and flexibility of Bear’s solution also allows the military to implement preferred encryption algorithms independently.

Bear provides the advanced ability to protect communications without relying on any one type of communication. Combined together, Bear secures new types of communications and transform one type of packet into another. For example, a standard radio can employ encrypted communications to a satellite base station where the encrypted radio information is transformed into encrypted satellite streams. Those streams, can in turn, be converted to encrypted microwave transmissions to a remote WiFi network, and decrypted at an authenticated, authorized location on the other side of the world.

These features are the true power of Bear – adaptive, low-level and highly efficient security operations, using less hardware and energy overhead.