Integrated C4I Systems (ICS)

Secure Communications Controller (SCC)

This rack-mountable unit enables war fighters to simultaneously cross-connect audio and data between multiple dissimilar radio types ranging from commercial cell phones to the legacy and modern military radios, public safety radios, Voice-Over-IP, push-to-talk and full duplex radios. It offers support for MIL-STD-1275D vehicle power, remote control of select US tactical radio settings, three-channel audio cross connection, and two channel simultaneous data cross connection. 

Secure Communications Controller Lite (SCC-Lite)

A lite version of SCC, the product enables war fighters to simultaneously cross-connect audio between multiple dissimilar radio types ranging from commercial cell phones to the legacy and modern military radios, public safety radios, Voice-Over-IP, push-to-talk and full duplex radios. It offers support for MIL-STD-1275D vehicle power and three-channel audio cross connection.

Mini-Secure Communications Controller (Mini-SCC)

This man-portable SCC variant empowers war fighters to simultaneously cross-connect audio between multiple dissimilar radio types ranging from commercial cell phones to the legacy and modern military radios, public safety radios, Voice-Over-IP, push-to-talk and full duplex radios. It offers an integral rechargeable battery for dismounted operations and three-channel audio cross connection.

NodeKit WCamera 1Unattended Ground Sentry Node V2 (UGSN-V2) System  

This second-generation, scalable family of networked sentry nodes enables pinpointed surveillance, reconnaissance and intelligence -- anywhere. Trident nodes are built tough, emplaced quickly, and designed for long-term unattended operation. They connect with cameras -- as well as acoustic, seismic and other sensors -- giving field forces a critical tactical advantage. Trident’s nodes are so alert, even their wireless network acts as a sensor.

UGSN Camera Page 1UGSN EO/IR Camera System

This small Form-factor Electro-Optic/Infrared (EO/IR) Camera System works seamlessly with Trident’s UGSN-V2 system, and provides day and night visualization of incoming threats for situational awareness and rapid engagement.  With flexible triggering options, manual and automatic control from within Trident’s network Operations Tool, this system supports long term remote operation and real-time threat identification.

Rapid Deployable Display (RDD)

Trident’s latest generation 60” Rapid Deployable Display (RDD) features a 1920 x 1080, high definition, LED backlit LCD monitor housed in a fully ruggedized enclosure that meets MIL-STD-810G and MIL- STD-1472G requirements. This TAA-compliant RDD delivers the functionality of multiple devices in a single portable package. Designed to meet the rigorous demands of emergency and military mobile command centers, the RDD3-6000LEDM quickly collapses into its protective case and is ready for transport in a matter of minutes.

IP Video Distribution System (VDS)

Our powerful, IP-based video routing software distributes any network video source (e.g. workstation screen, UAV feed, DVD, GBS, video streams, etc.) to a central screen, video wall, or other displays from a single Java console in a matter of seconds. Portable, flexible, and easy to use -- VDS is the ideal choice for training facilities, conference centers, and mobile command centers.

MS3

Mobile Security Surveillance System (MS3)

A fully-integrated and rapidly deployable mobile tower system, the solution includes integrated radar(s), track correlation, EO/IR video sensor(s), communications, display and control. MS3 allows users to detect, track, and visually identify aircraft, ground vehicles and dismounts in real-time at significant standoff ranges in challenging environments.

 


Certified Wireless Access Point & Wireless Intrusion Detection System (WAP/WIDS)

This ruggedized, certified wireless access point /wireless intrusion detection system sensor provides FIPS 140-2 Level 2 validated 802.11a/b/g/n adaptive wireless functionality that delivers performance, coverage, reliability and security (including Suite B) required to enable secure wireless environments for DoD and Federal Government secure applications.

Software Change Impact Analysis Tool (SCIAT)

Software Change Impact Analysis Tool (SCIAT) automates the evaluation of changes between software builds to determine optimal testing and V&V strategies for new systems, technology insertions, baseline upgrades and reuse scenarios. SCIAT is a software application that performs static and dynamic analysis of source code changes to determine regression test selection, test completeness and requirements impact. SCIAT static analysis parses software changes to determine the impact of the changes on the code not changed. SCIAT dynamic analysis imports results from prior test execution using common profiler/code coverage tools to determine which tests need to be executed in order to verify the new version of the software. SCIAT test completeness analysis identifies impacted paths through the code that are not fully tested and generates reports that can be used to update the tests to evaluate those paths. SCIAT requirements impact analysis identifies the requirements impacted by the code changes or, conversely, identifies the code and tests impacted by a requirement change for use in upfront cost or level of effort estimation.

Print