Tactical Cross-Domain Solution for High Assurance Connectivity
Supporting Joint All Domain Command and Control (JADC2) and facilitating data management at the tactical edge, INFODAS has developed the COMP-LAND series based on its NATO, EU and German SECRET-approved Secure Domain Transition (SDoT) cross-domain solution portfolio. Extreme environments no longer limit connectivity of battlefield assets to networks and classification levels that would otherwise have to be kept separate.
Fast, controlled data exchange from Unclassified to SECRET between sensors, effectors, C2, cloud computing environments or military coalitions from any platform is a future force multiplier. It allows improvement in response times, the saving of bandwidth or scarce space in vehicles – by connecting even legacy platforms to distributed computing and storage capabilities, or directly to users on the same mission at different classification levels. The bi-directional SDoT Security Gateway Express and unidirectional SDoT Diode are available in the ruggedised COMP-LAND format in two sizes, optimised to withstand extreme environments in vehicles or weapon systems.
SDoT COMP-LAND supports TCP, UDP, HTTP/S and SMTP/S protocols, and filters multiple data types such as JREAP, JSON, XML, ASCA, ASTERIX, NMEA, DIS, HLA or ADatP3. All elements of the SDoT product family meet high-assurance information security requirements for hardware and software security at the SECRET and below interoperability level (SABI). They are developed and manufactured in Germany, with full supply chain transparency and export controlled but ITAR free.
“Data is the core of JADC2 or NATO’s Federated Mission Networking (FMN) and SDoT COMP-LAND enables our defence, intelligence and military hardware manufacturers to focus on connecting the dots at the edge, instead of following outdated network separation principles,” explained Dr Alexander Schellong, VP Global Business. “The technology might also be of interest to critical infrastructure providers that face IT/OT connectivity cybersecurity challenges in austere locations”.