We use cookies to give you the best possible experience on our website.
Accept All Cookies
Find out more
Cookie Portal
Manage and find out more about the cookies used on this website.
View Cookie Settings
Read Cookie Policy

Accept All Cookies and Close
Close Without Saving
< Back
This website has 3 types of cookies:
Your preferences will not take affect until the next page loads or this page is reloaded.
Strictly Necessary Cookies
Feature Cookies
Performance Cookies
Save and Close
< Back
< Back
Cookie Policy
< Back


Apr 2014

L-3 TRL Features CATAPAN Global Government Grade Encryption Solutions at DSA 2014

L-3 TRL Technology  will be showcasing its CATAPAN Global High Grade encryption solutions at the Defence Services Asia exhibition in Kuala Lumpur, Malaysia, 14–17 April.

Based on the award-winning UK CATAPAN family of government grade encryption devices, the new CATAPAN Global has identical security functions as its UK counterparts, which feature the highest encryption standards available. This global variant also incorporates an integrated key management solution, providing governments with an independent and sovereign encryption capability, a critical necessity in today’s world.

“Our CATAPAN range of products is the result of over a decade of research and development in the field of High Grade encryption and information security,” said Adrian Cunningham, vice president of L-3 TRL’s National Security division. “We’re proud to be able to showcase this system at DSA and to introduce our customers in the region to CATAPAN’s unique capabilities.”

These latest encryption solutions include the Mini-CATAPAN Global device, ideal for tactical deployment with 100 Mbps duplex throughput, and the Enterprise-CATAPAN Global device, designed for high-bandwidth strategic deployment with 1 and 10 Gbps throughput on one platform.

CATAPAN Global’s integrated key management technology ensures that the keys used for data protection are never transmitted outside the device. This capability to generate network authentication keys gives only trusted persons access to user networks, ensuring the highest possible level of information security.