Whether it is resilient back up communication for Government embassy’s or local authorities requiring contingency solutions in the event of natural disasters, we are able to supply range extension and private communication networks that provide continuous and seamless connectivity regardless of what existing network infrastructure exists.
We also develop and supply tracking situational awareness solutions, allowing the tracking of assets around the globe via GPS. Knowing where employees are enables organisations help keep them safe, secure in the knowledge that they can be found and helped should any problems occur.
Secure, fast, resilient, IP connectivity that’s deployed in seconds.
Mediaport-R provides secure, fast, reliable IP connectivity between tactical teams and control rooms, in mobile scenarios and harsh environments.
Mediaport-R bonds up to four 3G/4G mobile broadband connections (along with cabled broadband or satellite where available).
By employing RAID-type distributed forward error correction, diverse routing and 256 bit SSL/AES encryption, Mediaport-R creates a highly secure and resilient private network using just consumer access media.
Scytale Maritime is a rapidly deployable, carry-on solution, providing a secure data and voice hub, that can be deployed to any vessel where reliable communication is vital.
In response to the growing trend for Naval Forces to utilise civil vessels, the Scytale Maritime offers a stand-alone, carry-on solution, which can be rapidly deployed without the need for permanent installation.
The Scytale Mini is a small form factor device which is easily configurable, transportable and able to provide a high level of anonymity to deployed users passing secure data back to office locations. The device will also provide an IP capability over trusted 3rd party networks with the option for VoIP services.
The Scytale Mini uses two trusted 3rd party vendors to reroute traffic prior to hitting the final destination firewall and the use of Next Generation Encryption (NGE) algorithms and techniques to thwart the efforts of cyber criminals.