The World’s Largest, most powerful c5ISR System now incorporates zero-trust

XQ enables AGIS’ MDDL C5ISR System (Command, Control, Computers, Communications, Cyber, Intelligence, Surveillance, and Reconnaissance) to meet Zero-Trust NIST 800-171 advanced encryption, routing, and data management compliance requirements. All data, PTT, and Video are protected by double encryption.

  • All AGIS/XQ MDDL C5ISR users operate in a Zero-Trust environment while processing 10,000s of Real-Time Radar, ELINT, UAV, AIS, ADS-B, GPS Tags, Weather and Intelligence data from military and commercial satellite sensors

  • AGIS’ MDDL C5ISR system operates on Android, iPhone, PC, and Apple MacBooks.

  • XQ Zero-Trust enables the exchange of C5ISR data and PTT and Video with 1,000s of other AGIS MDDL systems, all within a Zero-Trust environment.

  • The AGIS MDDL system enables a synchronized COP between Link-16, JVMF, OTH Gold and NATO NFFI, ADEM, and NVG users.

  • AGIS’ MDDL PC operators can view and can interact with the totality of the data being received by the interfacing C5ISR systems.

  • The AGIS’ XQ integrated Zero-Trust system operates on Cloud or on-Premise Servers with soon-to-be-available automatic failover between servers.

To download a Thick Client evaluation copy of LifeRing, go to:
www.agisinc.com/download or email us at support@agisinc.com. All other inquiries, please contact Jason A’Hearn jahearn@agisinc.com or Cap Beyer at beyerm@agisinc.com or by phone at 561-744-3213

Original press release available courtesy of Common Operational Picture News here

(function () { const title = document.querySelector("h1")?.innerText || document.title; const description = document.querySelector('meta[name="description"]')?.content || ""; const canonical = document.querySelector('link[rel="canonical"]')?.href || window.location.href; const image = document.querySelector('meta[property="og:image"]')?.content || ""; const published = document.querySelector('meta[property="article:published_time"]')?.content || ""; const modified = document.querySelector('meta[property="article:modified_time"]')?.content || published; const schema = { "@context": "https://schema.org", "@type": "BlogPosting", "mainEntityOfPage": { "@type": "WebPage", "@id": canonical }, "headline": title, "description": description, "image": image, "author": { "@type": "Organization", "name": "XQ", "url": "https://xqmsg.co/" }, "publisher": { "@type": "Organization", "name": "XQ", "logo": { "@type": "ImageObject", "url": "https://xqmsg.co/wp-content/uploads/xq-logo.png" } }, "datePublished": published, "dateModified": modified, "articleSection": "Zero Trust Data Security", "keywords": [ "Zero Trust Data", "Data Security", "Data Governance", "Data Sovereignty", "Encryption", "Compliance", "CMMC", "DoD Zero Trust", "GDPR", "HIPAA" ] }; const script = document.createElement("script"); script.type = "application/ld+json"; script.text = JSON.stringify(schema); document.head.appendChild(script); })();
Previous
Previous

Cybersecurity Trends for 2022: Trends to look out for in the new year

Next
Next

Alternative methods for Cybersecurity: Zero-Trust Gateway