USA flag logo/image

An Official Website of the United States Government

Company Information:

Company Name:
Siege Technologies, LLC
Address:
33 South Commercial Street
Manchester, NH
EIN:
270264695
DUNS:
364217468
Number of Employees:
12
Woman-Owned?:
No
Minority-Owned?:
No
HUBZone-Owned?:
No

Commercialization:

Has been acquired/merged with?:
N/A
Has had Spin-off?:
N/A
Has Had IPO?:
N/A
Year of IPO:
N/A
Has Patents?:
N/A
Number of Patents:
N/A
Total Sales to Date $:
$ 0.00
Total Investment to Date $
$ 0.00
POC Title:
N/A
POC Name:
N/A
POC Phone:
N/A
POC Email:
N/A
Narrative:
N/A

Award Totals:

Program/Phase Award Amount ($) Number of Awards
SBIR Phase I $249,405.00 2
SBIR Phase II $100,000.00 1

Award List:

Preventing Sensitive Information and Malicious Traffic from Leaving Computers

Award Year / Program / Phase:
2010 / SBIR / Phase I
Award Amount:
$99,521.00
Agency / Branch:
DOD / OSD
Principal Investigator:
Joseph Sharkey, Senior Principal Scientist
Abstract:
Malicious software within a network has the ability to gather information and surreptitiously send it out. This poses a significant threat to critical information residing on the network that is not sufficiently prevented by current network security appli

Anti-Exploitation Software Protection Systems

Award Year / Program / Phase:
2012 / SBIR / Phase I
Award Amount:
$149,884.00
Agency:
DOD
Principal Investigator:
Joseph Sharkey, Sr. Principal Scientist – (315) 215-1018
Abstract:
State-of-the-art software protection and anti-tamper systems move critical software and data"out-of-band"to the adversary, by using a hypervisor or on"secure"hardware. Unfortunately, the systems running this software are built using untrusted commercial-off-the-shelf (COTS)… More

Anti-Exploitation Software Protection Systems

Award Year / Program / Phase:
2013 / SBIR / Phase II
Award Amount:
$100,000.00
Agency:
DOD
Principal Investigator:
Joseph Sharkey, Director – (315) 215-1018
Abstract:
State-of-the-art software protection and anti-tamper systems move critical software and data"out-of-band"to the adversary, by using a hypervisor or on"secure"hardware. Unfortunately, the systems running this software are built using untrusted commercial-off-the-shelf (COTS)… More