Research Security · Wherever research lives.

Security through visibility,
not walls.

Altare surfaces the behavioral signals that sanctions-list screening cannot see: research network trajectory shifts, disclosure gaps, undisclosed foreign affiliations. Keep research open. Keep it compliant.

For academia
Certify on time.
NSPM-33 evidence, audit trail, and regulatory memos in the format the July 2026 certification asks for.
For private sector
Protect what you sponsor.
Vet academic partners, screen founders pre-acquisition, monitor sponsored labs for leakage.
Operationally
Six weeks to a real read-out.
One department or portfolio. A structured risk memo on actual researchers, not demo data.
Ethically
Equity by design.
Risk comes from behavior, never from nationality.

Sanctions screening answers the wrong question.

"Is this person on a list?" is a binary check. It catches the obvious and misses everything that matters: researchers whose research networks shift toward defense-linked institutions over time, whose publication record names foreign affiliations never declared on a grant form, whose shadow lab appears only in non-English journals.

That is the behavioral grey zone. It's where real incidents live, and it's the analytical territory the existing tools explicitly concede.

Other tools
Altare
Research network trajectory analysis
Disclosure vs. publication record
limited
Post-award continuous monitoring
Technology sensitivity (critical & emerging tech)
Shadow-lab cross-lingual detection
Sanctions / entity-list screening

A pipeline built around analytical tradecraft.

Six stages turn open data into a structured risk memo: confidence levels, alternative hypotheses, and intelligence gaps in the format research security officers already brief up.

01

Ingest

Open academic sources and professional open-source data, aggregated and kept current.

02

Resolve

Author disambiguation and cross-lingual identity reconciliation.

03

Network

Temporal collaboration graph with institutional risk mapped onto it.

04

Verify

Declared disclosures compared against the observed record.

05

Score

Calibrated risk probability grounded in documented cases.

06

Memo

A structured risk memo: findings, alternative hypotheses, confidence.

Four modules.
One analytical engine.

Start with Module 1 for network and disclosure intelligence; layer on lifecycle, compliance, and counter-influence as your program matures.

Module 01 Core engine · MVP

Publication Network Intelligence

Research network trajectory analysis, disclosure verification, critical-and-emerging-tech sensitivity, and shadow-lab detection across academic and open-source data.

Module 02 Lifecycle

Researcher Lifecycle Management

Pre-arrival screening, ongoing monitoring, departure documentation. The first integrated designated-school-official and research-security-officer workflow.

Module 03 Compliance

Compliance Automation

Section 117, NSF Notice 149 MFTRP, UK NSI Act, Canada NSIA. Auto-generated regulatory memos; audit trail throughout.

Module 04 Roadmap

Counter-Influence

OFAC terrorism layer, pre-approach talent recruitment detection, coordinated inauthentic behavior in academia.

Reference case · RAND, March 2026

Imperial & JARI: a collaboration no one could translate.

Imperial College London described its partnership with Jiangsu Automation Research Institute as civilian ocean modeling. A 2018 Chinese-language email from JARI's research head, surfaced only via Freedom of Information, asked for help on data-visualization tools for "smart military base(s)." The military end-use was never translated into the English record.

Altare would have flagged this upstream: ASPI-tiered defense-linked institution, dual-use AI field, end-use discrepancy. Before any FOI request was required.

RAND's three-pillar framework,
operationalized.

Pernin et al. (March 2026) describe research security risk assessment as a checklist review. Altare automates that review and adds the one thing the framework lacks: signal weighting grounded in documented ground-truth cases.

I

Protection

Research outputs, pre-publication IP, sponsored-lab leakage.

II

Transparency

Disclosure verification against the observed record.

III

Governance

Audit trail, structured memos, defensible thresholds.

For academia Research security · VP Research · designated school officials

The July 2026 certification, on time.

~131 U.S. R1 institutions receiving >$50M federal R&D must certify compliant Research Security Programs or lose eligibility. Altare gives you the detection, the audit trail, and the regulatory memos, without an eighteen-month build.

  • NSPM-33 / CHIPS Act · July 2026
  • UK NSI Act · parallel obligations
  • Canada NSIA · National Security Guidelines
  • Section 117 HEA + NSF Notice 149 MFTRP
For private sector Deep-tech · Biotech · Aerospace

IP protection without boiling the ocean.

Vet academic partners. Screen founders pre-acquisition. Monitor sponsored university labs for leakage. Altare gives CSOs, insider-threat, and M&A due-diligence teams the same analytical engine the public sector uses, without the classified-system overhead.

  • Strategic IP & sponsored-lab oversight
  • M&A founder & key-scientist screening
  • Academic partnership due diligence
  • Patent co-inventor and assignee risk
Book a pilot

The cliff is three months out.
A pilot takes six weeks.

We scope with your research security officer or chief security officer, ingest one department or portfolio, and deliver a structured risk read-out on real researchers, not demo data.

Tweaks