Two computer screens with data flowing across them

Security Monitoring Infrastructure System

Security Monitoring Infrastructure System

The Boeing Security Monitoring Infrastructure System (SMIS) is a cybersecurity and network situational awareness tool pre-integrated with signature, behavioral, and algorithmic network security and traffic anomaly detectors. Our 11 patents on core technologies make SMIS a uniquely powerful solution to monitor your network environment and provide a robust cyber situational awareness system and tool suite.

SMIS installs on commodity hardware and has been scaled from monitoring small single enclave networks to huge world-spanning interconnected webs of devices. SMIS has been deployed as a simple stand-alone solution and has been integrated into other network operations tools to provide a rich view of the cyber environment in other custom or commercial tools.

SMIS is a combination of:

  • Network intrusion detection system (IDS or NIDS)
  • Security event management system (SEM, SIM or SIEM)
  • Network traffic analysis system
  • Network packet recorder
  • Workflow and trouble ticketing
  • Reporting

Download the SMIS product card

Cybersecurity Security Monitoring Infrastructure System component

Cybersecurity and analytics use cases

Conceptual image showing data fields

Cybersecurity

  • Detect network traffic anomalies as events by passive monitoring
  • Collect cybersecurity events from SMIS sensors
  • Collect cybersecurity events from other devices
  • Correlate groups of events into alerts
Person with glasses looking at data screens

Network analytics

  • Verify or validate specific network traffic
  • Assess top talkers
  • Analyze bandwidth and protocol usage
  • Perform network security and forensics
  • Monitor network performance
Person looking at data screens

Security operations center as a service

  • Dedicated analysts who continually work with you and help respond to threats as they arise
  • Highly trained group of cyber defense analysts available 24/7

Robust, proven and powerful

Icon showing one hub node with 8 nodes leading into hub

Easily integrated and rapidly deployed

  • Fast setup, reduced integration time
  • Initial actionable intelligence in a matter of hours
  • Each component installable on current hardware
  • Web service managed
Icon demonstrating hard drives with modular nodes

Modular architecture

  • Robust API for cross-product integration
  • Datasets accessible from existing applications
  • Data forwarding to common operating picture
  • GUI interoperability
  • Stand-alone or part of a larger solution
  • Embedded options
Icon showing stack of hard drives

Scalable for any enterprise

  • Echelon scaling
  • Lower echelons: autonomy for tailored analysis
  • Higher echelons: detection of multiregion trends and anomalies
  • Built-in redundancy
  • Scalability to achieve faster throughput
Icon showing nodes going around a globe

Advanced situational awareness

  • Deployed systems that operate with little or no maintenance support
  • One-time upfront cost for a robust system, instead of recurring license fees and mandatory support
Icon of shield with a checkmark inside

Customer proven

  • Protects thousands of unique devices hosting billions of dollars’ worth of Boeing, government and partner intellectual property (inside and outside the U.S.)
  • Satisfies numerous risk management framework (RMF) technical security controls completely, others partially, including Federal Information Processing Standard (FIPS) 140-2