This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

European Union Naval Force opts for secure communications solution

Share this article:

The European Union Naval Force has deployed a secure communications solution from AEP Networks.

Using AEP Networks' SCOPE SecComm solution, during field operations, secure communications equipment is airlifted onto participating ships, enabling officers to send highly confidential data securely over the best available network.

The SCOPE SecComm device determines automatically which network to connect to using predefined policies and once connected it can exploit 3G, broadband or satellite networks to send and receive secure IP traffic.

SCOPE SecComm is a small carry case containing an intelligent communications router, an IPsec encryptor and a rechargeable battery power pack.

A pan-European accredited encryption solution, AEP Networks' SCOPE SecComm is CAPS approved by CESG to NATO, EU and UK Confidential meaning that officers can access restricted and confidential data over widely available public mobile and wireless networks.

Mark Darvill, director at AEP Networks, said: “The challenge for any military organisation is to ensure the integrity and confidentiality of every type of communication, one hundred per cent of the time including voice, video and data. There is absolutely no room for error. When the successful transmission of data can make the difference between the success and failure of an operation, it's critical that the European Union Naval Force have the confidence and assurance that everything they transmit is secured to the highest level.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Chinese hackers steal confidential documents on Israeli missile defence system

Chinese hackers steal confidential documents on Israeli missile ...

Chinese hackers comprised the computer systems of three Israeli defence contractors between 10 October 2011 and 13 August 2012 in order to steal hundreds on confidential documents on Israel's Iron ...

Security researcher finds exploitable flaws in 14 antivirus engines

Security researcher finds exploitable flaws in 14 antivirus ...

Joxean Koret, a security researcher at Singapore-based consultancy COSEINC, has found exploitable local and remote flaws in 14 of the 17 major antivirus (AV) engines used by most major AV ...

Russian government promises £60k bounty to Tor hackers

Russian government promises £60k bounty to Tor hackers

The Russian Ministry of Internal Affairs (MVD) is offering a 3.9 million ruble (approximately £64,600) reward to anyone who can find a way of identifying and tracking users of the ...