{"id":21,"date":"2019-10-08T16:14:55","date_gmt":"2019-10-08T16:14:55","guid":{"rendered":"https:\/\/stage.in.nau.edu\/cybersecurity\/?page_id=21"},"modified":"2023-01-31T19:11:59","modified_gmt":"2023-01-31T19:11:59","slug":"technology-transfer","status":"publish","type":"page","link":"https:\/\/in.nau.edu\/cybersecurity\/technology-transfer\/","title":{"rendered":"Technology partners"},"content":{"rendered":"<h1>Technology Transfer<\/h1>\n<p>The work, already protected by 43 granted patents and 56 invention disclosures, is attracting several industrial partners, whom are currently licensing, or considering licensing the technology.<\/p>\n<p>In the last several years, hackers and malicious parties were able to break the cyberspace of institutions, which were supposed to be immune from such threats, for example NSA, IRS, Target, Yahoo, and many others.\u00a0As a result, institutions are looking at disruptive, \u201cout of the box\u201d solutions that can change the status quo of Information Assurance. In 2016, NAU was funded to validate important research work conducted in the laboratory, because of its disruptive nature. The validation, which was highly successful, has increased the credibility of the patent portfolio, and the following commercial entities are currently working with NAU:<\/p>\n<ul>\n<li>Lockheed Martin, and Northrop Grumman signed a non-disclosure agreement (NDA) with NAU.<\/li>\n<li>Crossbar, a leading company in ReRAM technology is providing samples for NAU to research with.<\/li>\n<li>GSI Technology is working with NAU to explore the possibility of integrating with GSI&#8217;s APUs.<\/li>\n<li>Sawblade is working with NAU to do more FPGA research.<\/li>\n<li>Intel working with NAU on Industrial IOT security applications.<\/li>\n<li>Work with Thor labs for custom multi channel Quantum Cryptography Emulation Kit.<\/li>\n<li>Castle Shield working with NAU on secure token applications.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><a href=\"https:\/\/in.nau.edu\/cybersecurity\/technology-in-the-lab\/\">Examples of technology in the lab<\/a><\/h2>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/in.nau.edu\/cybersecurity\/graduate-courses\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-26 size-landscape-image\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2019\/11\/8065_Engineering_20190729-464x348.jpeg\" alt=\"\" width=\"464\" height=\"348\" \/><\/a><\/p>\n<h4>Graduate Courses<\/h4>\n<p>[\/image-callout]<\/p>\n<p>[\/column]<div class='shortcode-column-container'><!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    <\/p>\n<!-- shortcode-image-callout -->\n<span class=\"shortcode-image-callout shortcode-image-callout--center\">\n    <a href=\"https:\/\/in.nau.edu\/cybersecurity\/our_team\/\">    <span class=\"shortcode-image-callout__outer-container\">\n        <span class=\"shortcode-image-callout__container\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-27 size-landscape-image\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2019\/11\/58A3038_Chris_Coffey_20171208-464x348.jpeg\" alt=\"\" width=\"464\" height=\"348\">\n                        <span class=\"shortcode-image-callout__header-container\">\n                <span>Meet our researchers<\/span>\n            <\/span>\n                    <\/span>\n            <\/span>\n    <\/a><\/span>\n\n<p>\n<\/div>\n<\/p>\n<!-- shortcode-right-column -->\n<div class=\"shortcode-right-column\" >\n    <div class=\"shortcode-right-column__container\"><br \/>\n<!-- shortcode-contact -->\n<div class=\"shortcode-contact\">\n    <div class=\"contact-header\">\n        <h3>Contact Cybersecurity<\/h3>\n    <\/div>\n    <div class=\"contact-body\">\n                <a href=\"mailto:siccs@nau.edu\" aria-label=\"Contact Cybersecurity: Email Address\" title=\"Email Address\">\n            <div class=\"contact-icon-container\">\n                <i class=\"fas fa-envelope\" aria-hidden=\"true\"><\/i>\n                <span class=\"sr-only\">Email:<\/span>\n            <\/div>\n            <div class=\"contact-email\">siccs&#8203;@nau.edu<\/div>\n        <\/a>\n                        <a href=\"tel:928-523-0101\" aria-label=\"Contact Cybersecurity: Telephone Number\" title=\"Telephone Number\">\n            <div class=\"contact-icon-container\">\n                <i class=\"fas fa-phone\" aria-hidden=\"true\"><\/i>\n                <span class=\"sr-only\">Call:<\/span>\n            <\/div>\n            <div class=\"contact-phone\">928-523-0101<\/div>\n        <\/a>\n            <\/div>\n<\/div>\n\n<br \/>\n<\/div>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Technology Transfer The work, already protected by 43 granted patents and 56 invention disclosures, is attracting several industrial partners, whom are currently licensing, or considering licensing the technology. In the last several years, hackers and malicious parties were able to break the cyberspace of institutions, which were supposed to be immune from such threats, for [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","ring_central_script_selection":"","footnotes":""},"class_list":["post-21","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/pages\/21","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/comments?post=21"}],"version-history":[{"count":18,"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/pages\/21\/revisions"}],"predecessor-version":[{"id":517,"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/pages\/21\/revisions\/517"}],"wp:attachment":[{"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/media?parent=21"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}