top of page
Untitled design (57)_edited_edited.png
website background (2).png

Zaden Awarded AFWERX Ph 1 SBIR For Advancing ICARUS Development

Writer: Emily NwachukwuEmily Nwachukwu

Zaden Technologies has been awarded a Phase I SBIR contract by AFWERX and the U.S. Air Force, focused on tailoring its AI-powered Icarus™ platform to enhance verification and validation (V&V) for safety-critical systems within Model-Based Systems Engineering (MBSE) frameworks. This contract positions Zaden to deliver AI-driven innovation that strengthens U.S. national defense through faster and more reliable system development.

 


 
Why It’s Important

Securing a Phase I SBIR award through AFWERX represents a major validation of Zaden Technologies' innovation and AI leadership in defense technology. As the Department of the Air Force continues to prioritize rapid, reliable development of safety-critical systems, Icarus™ offers an AI-enhanced solution to automate complex verification and validation processes, significantly reducing the time, cost, and risks associated with system deployment. This award also positions Zaden for future Phase II/III opportunities, deepening collaboration with the U.S. Air Force to meet evolving mission needs and national security priorities.


WhAt's Next

With this Phase I award, Zaden Technologies will work closely with AFWERX and Air Force stakeholders to tailor and refine Icarus™ for defense-specific MBSE and V&V needs. The company aims to demonstrate how Icarus™ can accelerate system readiness and improve safety-critical processes through AI automation. Successful Phase I execution will position Zaden for potential Phase II follow-on funding to further develop and deploy Icarus™ within operational environments. Zaden also continues to expand partnerships within DoD to address broader system engineering and cybersecurity challenges.

Kommentare


Get the latest tech and product updates. 

What is DevSecOps, Infrastructure-as-Code, Software Factory, Software-as-a-Service (SaaS), Day 2 operations, Kubernetes, Continuous Integration/Continuous Delivery (CI/CD), Software Scalability, Cloud Transformation, Machine Learning, Cyber Hardened, End-to-end automation, Artificial Intelligence (AI), Compliance regulations, Agile Methodologies, AI, Amazon Cloud Security Issues, API, Application Programming Interface, Application security assessment, Application security requirements, Art of the Possible, Artificial Intelligence, Attack surface, Auditability, Automation, AWS, AWS DevSecOps, Azure, B2B, Back End, Big Data, Blockchain, Build, Business to Business, Canary Build, Chain of custody, Checkmarx Gartner, CI/CD, Cloud Native, Cloud Transformation, Code Dependencies, Collaboration, Compliance, Compliance regulations, Configuration drift, Containerization, Continuous Delivery, Continuous Integration, Continuous security testing, Cost reduction, Culture, Customer Experience, Cyber Hardened, Dashboards, Data loss prevention, Day 2 operations, Deep Learning, Defense Industry, Delivery, Development, DevOps, DevSecOps aws, DevSecOps Consultants, DevSecOps tools, DevSecOps wiki, Digital Core, Digital Journey, Digital Transformation, Docker, DoD, Domain Transformation, Embedded Security, End-to-end automation, End-to-end-flexibility, Endpoint security, enterprise application security, Enterprise Solution, Front End, Fullstack, Future Proof, Gartner DevSecOps, Google Cloud, Governance, Holistic automation, Identity and access management, Infrastructure-as-a-Platform, Infrastructure-as-Code, Innovation, Internet of Things, Instantly Depolyable, IoT, IT Infrastructure, Jenkins, Kubernetes, Lifecycle management, Linux, Machine Learning, Maturity model, Microservices, Monitoring, Monolith, Observability, On-Premise Development, Operations, Passwordless authentication, Penetration testing, Perimeter security, Product, lifecycle, Python, Resiliency, Risk management, SaaS, Scalable Solution, SDLC, SecDevOps, Security, Security conscientious, Security information and event management, Security posture, Security-as-code, serverless, Shift Left, Siloed security, Software, Software Architecture, Software Consultants, Software Development, Software Development LifeCycle, Software Factory, Software planning and design, Software Platform, Software Scalability, Software-as-a-Service, Speed, Speed of Delivery, Strategic Agility, Technology Insights, Threat modeling, Threat vectors, Time-to-Delivery, Time-to-Market, Toolchain, Traceability, Version Control, Visibility, Vulnerabilities in web application, What is DevSecOps, Zero Trust Provisioning, Agile Methodologies, AI, Amazon Cloud Security Issues, API, Application Programming Interface, Application security assessment, Application security requirements, Art of the Possible, Artificial Intelligence, Attack surface, Auditability, Automation, AWS
AWS DevSecOps, Azure, B2B, Back End, Big Data, Blockchain, Build, Business to Business, Canary Build, Chain of custody, Checkmarx Gartner, CI/CD, Cloud Native, Cloud Transformation, Code Dependencies, Collaboration, Compliance, Compliance regulations, Configuration drift, Containerization, Continuous Delivery, Continuous Integration, Continuous security testing, Cost reduction, Culture, Customer Experience, Cyber Hardened, Dashboards, Data loss prevention, Day 2 operations, Deep Learning, Defense Industry, Delivery, Development, DevOps, DevSecOps, DevSecOps aws, DevSecOps Consultants, DevSecOps tools, DevSecOps wiki, Digital Core, Digital Journey, Digital Transformation, Docker, DoD, Domain Transformation, Embedded Security, End-to-end automation, End-to-end-flexibility, Endpoint security
enterprise application security, Enterprise Solution, Front End ,Fullstack, Future Proof, Gartner DevSecOps, Google Cloud, Governance, Holistic automation, Identity and access management, Infrastructure-as-a-Platform, Infrastructure-as-Code, Innovation, Internet of Things, Instantly Depolyable, IoT, IT Infrastructure, Jenkins, Kubernetes, Lifecycle management, Linux, Machine Learning, Maturity model, Microservices, Monitoring, Monolith, Observability, On-Premise Development, Operations, Passwordless authentication, Penetration testing, Perimeter security, Product lifecycle, Python, Resiliency, Risk management, SaaS, Scalable Solution, SDLC, SecDevOps, Security, Security conscientious, Security information and event management, Security posture, Security-as-code, Serverless, Shift Left, Siloed security, Software, Software Architecture, Software Consultants, Software Development, Software Development LifeCycle, Software Factory, Software planning and design, Software Platform, Software Scalability, Software-as-a-Service, Speed, Speed of Delivery, Strategic Agility, Technology Insights, Threat modeling, Threat vectors, Time-to-Delivery, Time-to-Market, Toolchain, Traceability, Version Control, Visibility, Vulnerabilities in web application, Zero Trust Provisioning

bottom of page