Thales launches Nexium
Thales's Nexium offer aims to design and deploy complex communications systems architectures that are available at any time, in any circumstances and especially in crisis situations. The solution guarantees network resilience, which mean they are able to resist impacts. These are networks for high-level, end-to-end transmissions: they are efficient, long-lasting, secure and interoperable.
The Nexium offer is further proof of Thales's expertise as an architect of top-flight communication systems.
The shift towards automated, paperless communications has given networks an increasingly prominent role to play in how States, armies, businesses and citizens work and operate. Organisations' ever growing reliance on networks has made them our societies' core systems. Moreover, the many interconnections necessary for exchanging information can be new risks in the face of either intentional threats (cyber-threats, for example) or accidental threats (such as severe storms).
Thales's Nexium offer is at once an economical solution - using standard products to optimise costs - and a customisable one, letting users choose the line-of-business applications best suited to their operational requirements.
This offer is based on three main approaches:
* Resistance to threats: the network is perfectly resilient and capable of resisting even very high-level physical threats. Thales's expertise has provided guaranteed device redundancy, energy self-sufficiency, effective control over physical access and specific transmission media.
* Flow management and security: Nexium offers an intelligent network that not only delivers powerful protection for information, but is also capable of allocating the resources actually available to the most vital flows first.
* Network availability and efficiency: Nexium includes an innovative network supervision approach, capable of managing network availability and efficiency on a continuous basis and in step with the developments of threats, while at the same time guaranteeing network security.
"One of Thales's strong points is its integration platforms, which can be used to simulate the most complex environments and test network resilience. That way, Thales can deliver the best solutions to meet the armies' needs," explained Pascale Sourisse, Thales Senior Vice President, C4I Defence and Security Systems. "With Nexium, Thales has made full use of its experience and thorough knowledge of networks in order to work as closely as possible with armed and security forces on the ground."
Source: Thales
More from Digital Battlespace
-
AUSA 2024: General Micro Systems adds four new products to the X9 Spider family
The airborne three-domain, the two ground-based and the ¼ ATR OpenVPX-based cross-domain systems were engineered to provide real-time security across multi-domain operations.
-
BAE Systems gets go-ahead for second phase of mission communications programme
DARPA’s Mission-Integrated Network Control (MINC) programme was set up to develop an autonomous tactical network and enable critical data flow in contested environments.
-
Just Released: Space Technology Report
Why space is an essential part of modern military capabilities
-
Work-from-home warfare: the power of mixed reality
Defence-secure mixed reality headsets can save hours, or even weeks, of travel time to fix defunct equipment or get subject experts effectively “on-site” where they are needed.
-
Northrop Grumman receives follow-on contract for CUAS and C-IED systems
The Joint Counter Radio-Controlled Improvised Explosive Device Electronic Warfare (JCREW) counter-improvised explosive device (C-IED) and Drone Restricted Access Using Known Electromagnetic Warfare (DRAKE) counter-UAS (CUAS) systems are mounted and dismounted RF jammers.
-
Adarga’s Vantage AI software selected for UK Strategic Command’s Defence Support
Adarga’s Vantage information analysis tool is in service with the UK MoD and individual UK forces. It builds on the company’s Knowledge Platform which processes, organises and analyses open source material, as well as information held by the user’s military, security and intelligence services.