
Arion (iGMTT)
Arion (iGMTT)
A multi-band 20W repeater extending the range of your 5W handheld tactical radios.

Arion (Mission Module)
Arion (Mission Module)
A discrete module connecting directly onto your military multiband tactical radio, extending it’s range to Beyond Line of Sight (BLOS).

BRIT-AMP (50W)

G-BEC (Mobile Platform UPS)
G-BEC (Mobile Platform UPS)
A compact power solution providing an un-interruptable power supply to equipment installed in a mobile platform.

Scytale Armour Comms
Scytale Armour Comms
Scytale Armour Comms is a CPA certified encryption app for secure, voice, video, messaging, group chat and data, available on iOS and Android devices. Offering an easy to use, cost-effective service providing advanced security, allowing sensitive data to be passed.

Scytale Lite
Scytale Lite
A lightweight portable rapid deployable private data, VoIP, Satellite and GSM hub, that can be deployed to any location where reliable communication is critical.

Scytale Maritime
Scytale Maritime
In response to the growing trend for Naval Forces to utilise civil vessels, the Scytale Maritime is housed in a single Peli Case, offering a stand-alone, carry-on solution that can be rapidly deployed without the need for permanent installation. Designed for use in areas of extreme weather, it is equally suited to setup on a ships deck, or in adverse conditions on land.

Scytale Medium
Scytale Medium
A rapid deployable system for a remote operations facility providing private data, VoIP, Satellite and GSM coverage.

Scytale Mini
Scytale Mini
The Scytale Mini is a small form factor device which is easily configurable, transportable and able to provide a high level of anonymity to deployed users passing secure data back to office locations. The device will also provide an IP capability over trusted 3rd party networks with the option for VoIP services.
The Scytale Mini uses two trusted 3rd party vendors to reroute traffic prior to hitting the final destination firewall and the use of Next Generation Encryption (NGE) algorithms and techniques to thwart the efforts of cyber criminals.
Pages
- 1
- 2