Now dba as FlowTraq, the firm originally spun out of the Dartmouth College Thayer School of Engineering as Process Query Systems LLC after the principals had received government research & development contract awards for internet security projects with Ball Aerospace, NSA, Northrop Grumman Corporation and others. The company subsequently developed its first commercial software, called InterMapper Flows, which sold to more than 2,000 customers worldwide through an OEM reselling partnership with Dartware (now Help Systems Inc). Now doing business as FlowTraq, the firm is distributing software and services directly to end-users and through authorized network security technology providers providing software and services for high-performance network monitoring, analytics, security and forensics. The firm's products can detects a range of network behaviors, including Distributed Denial of Service (DDoS), brute force attacks, botnets, worms, network scans and other network traffic anomalies. The firm's network security software addresses the problems of internet hacking, data breaches, stolen personal information, Denial of Service Attacks, stolen intellectual property, nation state backed intrusions; and social engineering attacks. FlowTraq for Enterprise is a server-based application used via a web browser, deployed on-premise or in hosted managed service environments that provides custom alerts, monitoring and reporting for networks. FlowTraq Cloud is hosted by FlowTraq and used via web browser. No setup required. It is the easiest way to securely monitor and manage any network via the cloud. The firm specializes in proprietary efficient parallel database design, high-speed filtering & detection algorithms, and scalable network clustering - collectively called Black Falcon Technology. 1. High-speed proprietary database that allows it to process massive volumes of real-time network traffic and tracks months or years of stored network traffic flows faster than other netflow-based network security tools. 2. Unique proprietary algorithms that can learn a range of network behaviors and will instantly alert when anomalies are detected. 3. Scalable architecture distributed over multiple servers that work together to form a FlowTraq Cluster for high performance regardless of traffic volume minimizing the time required for auditable recourse after a security breach, expanding the capacity of security analysts to monitor ever-increasing network traffic volumes, and boosting anomaly detection performance when deployed across multiple processors.