Skip to content

Actelis expands federal market presence with new military base orders

June 6, 2024
Actelis expands federal market presence with new military base orders

Actelis Networks has announced that it has received new orders for cyber-hardened networking technology to be deployed on three U.S. military bases. These orders were received following Actelis’ recent cybersecurity certifications and placement on the Department of Defense Information Network approved products list.In January, Actelis announced that its solutions were placed on the Department of Defense Information Network (DoDIN) Approved Products List (APL) following certification from the Joint Interoperability Test Command (JITC). Then in February, the company announced that it achieved U.S. Department of Commerce National Institute of Standards and Technology (NIST) certification for FIPS 140-2 cryptographic standard. Both cybersecurity certifications are important for the company to expand its portfolio of products within the military’s network ecosystem.

“We have invested significant resources on achieving these critical government security certifications,” said Tuvia Barlev, the chairman and CEO of Actelis. “We are very pleased to see that those efforts are resulting in new orders and a strong pipeline for our federal market segment.”

Actelis continues its momentum in the federal IoT space where it helps the U.S. military accelerate its base modernisation initiatives. The company’s hybrid-fibre networking solution enables the military to deliver immediate fibre-grade connectivity to IoT devices and systems without the need for heavy engineering or construction, saving months of project time and can save millions for military bases and federal campuses.

The Actelis solution, as the company believes, is the only one of its kind on the DoDIN APL, giving the company a competitive advantage. The company’s solution features a high level of data protection including 256-bit MACsec encryption, data fragmentation and scrambling, all of which strengthen the security of the network, particularly at the edge where IoT devices are very vulnerable to attacks.

Comment on this article via X: @IoTNow_