• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Defence Engage
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2023

CYBER WARFARE UPDATE

April 27, 2011 by

25 Apr 11. Building on the success of its CATAPAN High Assurance range of cryptos, L-3 TRL announced the launch of two new additions to its product portfolio, CATAPAN SCC-M (Secure Communications Centre – Mobile) and Enterprise-CATAPAN, both to be showcased at Infosecurity Europe 2011. As the latest generation of CATAPAN solutions, CATAPAN SCC-M and Enterprise-CATAPAN are able to provide up to Top Secret encryption for government, intelligence and security applications to meet the diverse requirements of secure network users. The CATAPAN SCC-M is L-3 TRL’s latest mobile solution, which provides the highest levels of security for users in remote areas where fixed-line Internet access may not be available. Featuring the industry-leading Mini-CATAPAN crypto, integrated with a ruggedised laptop and docking station, the SCC-M is a compact solution that offers embedded 3G and wireless connectivity, enabling users to encrypt their sensitive data using public mobile infrastructure. For strategic, high-bandwidth requirements, L-3 TRL offers Enterprise-CATAPAN. As a high-speed 10 Gbps solution, Enterprise-CATAPAN is designed for secure Data Centre connectivity or similar applications that call for a reprogrammable solution that operates at the fastest speed available. Infosecurity delegates will get the exclusive opportunity to see first-hand how these innovative new additions to the CATAPAN product line can offer security and functionality for a wide range of users.

21 Apr 11. Northrop Grumman and the University of Maryland Baltimore County (UMBC) Research Park Corporation officially opened the Cync Program today, an incubator dedicated to cultivating companies developing solutions to counter cybersecurity threats. The ceremony was held in the Advantage Incubator at the bwtech@UMBC Research and Technology Park in Baltimore, and it featured the first two companies accepted into the program, Five Directions and Rogue Networks. Highlighting the event were remarks by Maryland Gov. Martin O’Malley, UMBC President Freeman Hrabowski, and Northrop Grumman Vice President for Cyber Initiatives Dr. Mike Papay.
“The Cync Program is an important seed within the cyber ecosystem as Northrop Grumman and the state of Maryland work to meet the growing cybersecurity challenges our nation faces,” said Dr. Papay. “Our reliance on computer network systems is growing and the cybersecurity solutions that companies in this incubator program develop can be vital to our global security.”
The Cync Program is a partnership between Northrop Grumman and UMBC to create a new incubator tailored to the specific challenge of developing innovative technology to protect the nation from cyber attacks. The program builds on bwtech’s successful business-incubation framework by offering a “scholarship program” for companies with the most promising cybersecurity ideas. Participants in the program draw on UMBC’s research expertise and Northrop Grumman resources to develop tools that secure and protect the computer hardware, software and virtual networks vital to national defense.
“Northrop Grumman is excited to partner with these promising new companies,” said Chris Valentino, Northrop Grumman cybersecurity director and technical fellow. “We are eager to begin work now that the initial team has been formed and look forward to the new ideas and fresh approach to technology that the program will produce.”
Five Directions is an early-stage company working to develop technology that would enable high-assurance file sharing via public or private clouds. Using a data-centric approach, Five Directions secures access through credentialing, encryption and a robust audit trail. The company’s founder, William Arbaugh, also started Komoku, a provider of advanced rootkit security detection solutions, which was acquired by Microsoft in 2008. Rogue Networks is working to develop BreachBox, a product that enables traffic monitoring, alerting and the enforcement of flow policies on large

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • Atkins
  • IEE
  • EXFOR logo
  • DSEi
  • sibylline logo
  • Team Thunder logo
  • Commando Spirit - Blended Scoth Whisy
  • Comtech logo
  • GoExporting logo
  • Supercat logo
  • Galvion logo
Hilux Military Raceday Novemeber 2023 Chepstow SOF Week 2023

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • On D-Day Anniversary, Austin, Milley Call on All to Defend Democracy

    June 6, 2023
    Read more
  • BATTLESPACE Counter Unmanned Air System (C-UAS) Supplement

    June 6, 2023
    Read more
  • PARLIAMENTARY QUESTIONS

    June 2, 2023
    Read more

Copyright BATTLESPACE Publications © 2002–2023.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT