GE and Juniper Networks to Develop Family of Rugged, Secure Network Appliances for Military Vehicles
Keywords: Security-Focused, Anti-Tamper Protection, Radio-Aware Router Protocols, Intrusion Prevention And Detection.
GE Intelligent Platforms and Juniper Networks announced that the two companies will work together to develop a family of rugged, highly secure routing and network security appliances designed for military/aerospace deployment in harsh environments where security of data is paramount. The resulting solutions will be sold by GE Intelligent Platforms.
The new GE products respond to the adoption by military forces around the world of a network-centric approach to battlefield operations and systems design. Data, voice and video are carried over an IP network, and routers form the core of such a network. Cybersecurity is of great concern, as well as the coexistence of allied forces through mixed-nation battlefield engagements. This results in a requirement for purpose-built rugged routers with advanced security capabilities since commercially-available routers are not designed for the harsh environment encountered in combat situations. Juniper Networks Junos operating system offers a comprehensive list of features that provide intrusion prevention and detection, firewalls, packet inspection, authentication and access control.
The RTR8GE is the first product to be announced. A battle-ready, rugged and security-focused network router, it features the comprehensive field-tested Junos operating system from Juniper Networks. Its firewall, intrusion prevention and detection, and quality of service capabilities enable secure IPv4/IPv6 connectivity for military vehicles, aircraft and forward operating bases supporting net-centric operations. The RTR8GE has eight Gigabit Ethernet ports integrated in a SWaP-optimized enclosure that meets the demanding environmental requirements of military/aerospace applications.
The RTR8GE router supports radio-aware router protocols that monitor network efficiency, available bandwidth and regulate traffic flow, choosing the most efficient network route in mobile, ad-hoc battlefield network environments. It also includes anti-tamper protection and information-assurance technologies in recognition of the sensitive nature of the data it is designed to transport.
ARC Advisory Group