Recently, 3eTI announced that its AirGuard wireless mesh devices were approved for the DoD’s UC APL (Unified Capabilities Approved Products List).
3eTI’s secure wireless mesh networks are currently installed in corporate campuses, in industrial environments and in military installations. These military installations consist of U.S. Navy vessels and bases around the world.
They offer wireless hotspots and backhaul connectivity in fixed, mobile and portable applications.
3eTI’s AirGuard secure wireless mesh devices have already received FIPS 140-2 validation and Common Criteria certification. According to the company, this offers wireless access and backhaul connectivity in fixed, mobile and portable applications.
The AirGuard products are dependable products and are currently installed across the military. It has been deployed in places like U.S. Navy vessels and bases around the world.
The military is using this product extensively as it believes it offers safe wireless mesh connectivity created to ensure always-on availability. It can also withstand harsh environments required by important applications.
“We are extremely proud to have achieved this status after extensive testing in accordance with the Unified Capabilities criteria,” stated Benga Erinle, president of 3eTI. “Achieving this certification is yet another example of 3eTI’s mission to provide our customers with best-in-class information assurance and interoperability. As we move into the future with the UC APL approval, we will continue to be a significant contributor of secure wireless mesh devices and systems for the DoD.”
Recently, the company introduced its new AirGuard iMesh suite of products. iMesh is a product that is validated independently, has low-power, is ISA100-compliant and is ideal for industrial sensor networking whose security has been approved and deployed by the U.S. military. Facilitating encryption and authentication technology to ensure confidentiality, integrity and availability of sensor and network data, the iMesh solution extends beyond the basic security capabilities of ISASecure.
Edited by Braden Becker