IG Labs

Innovation at the Speed of Technology

Artificial Intelligence and Cybersecurity
Research and Development

IntelliGenesis’ IG Labs Division, an AI/ML Center of Excellence, powered by NVIDIA, creates advanced cyber and data science solutions while driving research and development into entirely new capabilities that demonstrate “The Art of the Possible.” IG Labs primarily focuses on two pillars—Artificial Intelligence and Cyber. We further break down our expertise into four cross-collaborative areas that influence and advance each other: AI/Deep Learning, Advanced Analytics Development, Augmented and Virtual Reality (AR/VR), and Defensive Cyber Solutions.  

  • AI/Deep Learning

    Leveraging the full spectrum of cutting-edge tools and methods, we provide solutions tailored specifically to the problems they are trying to solve. IG Labs solutions are also bolstered by our NVIDIA Deep Learning Pod to produce real mission outcomes.

  • Advanced Analytics

    We continuously create innovative analytics and data science capabilities that enable our customers to discover big data’s previously unrealized value.

  • Defensive Cyber Solutions

    IG Labs is founded on gaining and maintaining the high ground. We defend against cyber threats that could threaten the daily lives of millions, even as they innovate and adopt more sophisticated tools and techniques in near-real-time.

  • Augmented and Virtual Reality (AR/VR)

    Thinking outside the box is a common idea but, here in IG Labs, we EXPAND the box. From Digital Twins to Immersive Data Analytics Environments (IDEA), we increase our customer’s capabilities and drive mission success.

Our experts deliver forward-thinking, holistic products that advance our customers’ capabilities and enable defenders to stay ahead of adversaries’ technological advancements. IG Labs provides extensive resources and expertise in a hands-on environment to transform our customers and partners into next-generation influencers of change. We also build and maintain partnerships with industry leaders in the Artificial Intelligence (AI), Deep Learning (DL), and Machine Learning (ML) arenas to provide users and customers with the latest commercial tools and tradecraft. 

Developers working in our state-of-the-art IG Labs facility have the tools and freedom to create inspired applications and hardware solutions that solve complex problems and advance the mission in new ways. Our cutting-edge Artificial Intelligence Infrastructure, Fabrication Lab, and Cyber-Physical technologies enable new approaches to old problems. After an initial solution is developed, we always follow up with the question, “What if we couldn’t do it that way?” which forces developers to change their thinking and come up with new ideas they wouldn’t normally consider. Often, parts of the secondary discussion are integrated with the initial solution to develop an even better final design. 

Innovative Products

IG Labs offers a range of cybersecurity, training, AI/ML services and products to improve your cyber capabilities. We also offer customized solutions to meet your unique mission needs. Our products encapsulate our more than 15 years of Cyber and AI expertise in self-contained, repeatable ways so we can readily provide these bleeding-edge technologies and methodologies to enhance missions worldwide.


AI-Enhanced Cyber Anomaly Detection
Provides Defense Industrial Base (DIB) Small Businesses with a capability to constantly analyze their network’s behavior to identify potential threats and anomalies.

Universal Features
  • Agentless Network Monitoring 
  • Analyzes Network Traffic  
  • API Access to all data 
  • Maintenance and upkeep free 
  • Maintains privacy of users 
  • Maintains privacy of user activity 
  • Monthly Updates
Detection Capabilities
  • Data Exfiltration 
  • Man-in-the-Middle Attacks 
  • Denial-of-Service Attacks 
  • Unusual network activity 
  • Application Layer Attacks 
  • Anomaly detection on IT and IoT network devices 
  • ATT&CK Mitigations for Detected TTPs 
  • Data Volume Metrics 
  • Protocol Type Distribution 
  • Anomalous and Malicious Activity 
Learning Models
  • Packet: Analyzes all network traffic to detect and identify anomalous activity across the entire network
  • Device: Detects anomalous activity in the context of a single device by clustering only the traffic through that device
  • Time: Identifies time periods which contained anomalous activity on the network by grouping all traffic into one-minute blocks and clustering the metadata of those groups
  • Using the features such as IPs, ports, protocols, and durations, the model estimates an expected number of bytes transferred. This is compared to the actual quantity to identify unusually sized data transfers 
  • Using Natural Language Processing (NLP) and decision tree classification models to examine the user agent string for each HyperText Transfer Protocol (HTTP) 
Documentation and Support
  • Installation Guide 
  • Monday – Friday 9am-5pm EST Support Available 
  • On-site Installation and Troubleshooting Support 
Customizations Available

*Available for Additional Cost

  • On-site Installation and Troubleshooting Support 
  • Other Data Processing 
  • Other Analytics  
  • Other Data Models 
  • Micro Business
    (15-50 users)
  • $ 385.00 / month
    $ 4,375.00 / year
    25% Discount
  • Monthly  Yearly 
  • Small Business
    (51-100 users)​
  • $ 615.00 / month
    $ 7,000.00 / year
    40% Discount
  • Monthly  Yearly 
  • Mid-Large Size Businesses
    Call for Pricing
  • Request Info

M.A.C.E. System

Advanced OT and IT Mobile Training and Testing System
Modular Advanced Cyber Enablement (M.A.C.E) System
Provides practical OT and IT cyber security training in a mobile converged environment with real-world hardware and protocols
Universal Features
  • Plug-and-Play Components
  • Real-World Protocols
  • Modular Design 
  • Vendor-Agnostic
  • Converged OT and IT Environments
  • Cyber Range Integrations
  • Easy Transportation/Set-up
Defensive Cyber Operator Training
  • Hands on Critical Infrastructure Cybersecurity  
  • Build skills and knowledge to include Logic Controllers, Control Systems, Communication Technologies, Sensors, OSINT, Vulnerability Assessments, Penetration Testing, and Integrated Defense Controls 
  • Obtain experience in operational technology 
  • Gain an edge against adversaries and cyber threats 
Cyber Awareness
  • No previous cyber experience needed 
  • Gain insight and real-world experience in critical infrastructure and OT life-cycle 
  • Laptop with minimum specs below:
    • Intel Core i5 (64-bit)
    • Intel HD Graphics 4600 Graphics Card
    • 8 GB RAM (DDR3L)
    • 10/100/1000 Mb/s Ethernet (RJ-45) Wired Network Connection
    • 1 HDMI
    • 1 Mini DisplayPort
    • USB 3.0 (x2)
    • Maximum Resolution: 1366 x 768
  • Raspberry Pi3
  • Touch Display Screen
  • Sensor Modules
  • Hardware Module
  • Ruggedized Case
Documentation and Support
  • Course Material 
  • New Course Modules included for one year after initial purchase 
  • Support available 10am-6pm EST Monday – Friday  
Customizations Available

*Available for Additional Cost 

  • Additional Training Modules 
  • Annual Subscription to Module Updates 

NeuralNexus – Machine Learning as a Service (MLaaS)

Harnessing the Power of AI
Machine Learning as a Service (MLaaS)
Unleashing the power of interconnected intelligence
  • Simple and Intuitive Dashboards
  • Customizable Use Cases
  • Smart Sensor Integration
  • Designed for AI/ML Utilization
  • Data Agnostic
  • Generative Capabilities
Use Cases

Multi-User Platform

  • Active Prediction Pipelines
  • Dynamic Static Analysis
  • Real Time Data Management
  • Financial Services
  • Healthcare
  • Public Sector
  • Transportation

Domain Agnostic

  • Cyber
  • Financial Services
  • Healthcare
  • Public Sector
  • Transportation

Minimum Requirements

Jetson Nano specifications*:

  • CPU: Quad-core ARM Cortex-A57 MPCore processor
  • GPU: NVIDIA Maxwell architecture with 128 NVIDIA CUDA cores
  • Memory: 4 GB 64-bit LPDDR4

*The Jetson Nano’s specifications meet the minimum requirements for running these tools but may struggle when handling network traffic for a small to medium-sized business. To ensure smoother performance, consider using the Jetson Xavier NX or AGX Xavier, which offer more powerful CPUs, GPUs, and additional RAM.

Recommended Requirements:

For a small to medium-sized business*

  • CPU: At least 4 cores (preferably 6 or more)
  • Financial Services
  • GPU: A more powerful NVIDIA GPU, such as the one in Jetson Xavier NX or
    AGX Xavier
  • RAM: At least 16 GB, ideally 32 GB or more

*These upgraded specifications will allow for better performance and handling of network traffic in a business environment. Keep in mind that additional factors, such as the complexity of your models and the volume of data being processed, may also affect the performance of your system.

Past Performance

  • XXXXXX-XX-C-0350 (Prime)

    Key Tasks: Analytic Platform Development; Predictive Analytics; Big Data Analysis

    On this contract, IntelliGenesis performed platform and analytics development for big data analysis to produce forensic models and predictive capabilities for threat actors’ cyberspace behaviors. Our developers applied data science techniques like clustering and collaborative filtering to identify Advanced Persistent Threats (APTs) and attribute their specific tactics, techniques, and procedures (TTPs), then make predictions as to what TTPs an APT may use next. IntelliGenesis designed and developed the full analytic platform including backbone analytics, user interface, and a custom Attacker Search database feature to help users like cyber operators immediately identify known attackers.

  • XXXXXX-XX-C-0006 (Prime)

    Key Tasks: Analytic Platform Development; Predictive Analytics; Threat Attribution

    IntelliGenesis performed full-lifecycle development of an advanced analytic tool that conducts real-time network traffic analysis across the cyber infrastructure and provides alerts for anomalous or malicious activity. This tool incorporated a set of anomaly detection models that identify unusual network traffic without prior knowledge or training on a network’s normal activity. This tool eliminated the maintenance and upkeep associated with endpoint monitoring, detected anomalies in non-traditional network device traffic that cannot be monitored by endpoint software, and maintained user privacy by only analyzing their metadata.

*Sales of all products will be subject to applicable taxes


Maryland Headquarters
6950 Columbia Gateway Drive,
Suite 450 
Columbia, MD 21046 USA

Georgia Office
100 Grace Hopper Lane,
Suite 3700
Augusta, GA 30901 USA

Contact Info:



DUNS Number