Bull launches Shadow: a signal jamming system -unique in the world - designed to prevent attacks from remote-controlled improvised explosive devices
With Shadow, its intelligent reactive jammer, Bull strengthens its leadership in the security market
16, 2011 -
Bull, which specializes in open and secure IT systems, and its subsidiary Amesys, the leading designer of mission-critical systems, have launched Shadow: an 'intelligent' signal jammer, based on technology that is unique in the world, designed to intercept, jam and neutralize RCIEDs (remote-controlled improvised explosive devices).
With Shadow, Bull has developed and refined a whole new generation of jammers, able to deal with all forms of systems relating to remote-controlled explosives, including the very latest ones such as those using UMTS protocol...
This new technology further strengthens Bull's security offering, a few months after its acquisition of Amesys.
Philippe Vannier, Bull's Chairman and CEO, commented: "Bull's innovation strategy is focused on computing power and security; two areas where our added value and technical expertise are very strong. Following the launch of DLP - designed to protect enterprises' confidential data - Shadow once again clearly illustrates our know-how and our capacity for growth in these sectors."
About Shadow and intelligent signal spamming
Shadow is designed for armed forces and is equally well-suited to meeting homeland security requirements. It not only protects passengers, vehicles and critical areas against remote-controlled explosive devices, but can also be used to identify enemy communications and monitor radio signals.
The 'intelligent' jamming technology at the heart of Shadow optimizes the jammer's capacity for action. Effectively, Shadow adapts its power as a function of the interference waveforms, as well as of the threats it identifies, thanks to its ability to detect and classify them. The system only transmits in the presence of a threat, and automatically reconfigures itself depending on its location - taking account of international frequency allocations.
Compared with traditional systems, this adaptability considerably reduces operators' and vehicle passengers' exposure radiation; which makes the system especially well suited to intensive use.
Shadow technology processes signals from all the systems used with remote-controlled explosive devices, while also making the most efficient use of the radio spectrum and associated RF power. Shadow can instantaneously detect over 2,000 threats and is geared up to respond extremely effectively to GSM and DECT 'bursts' from mobile and cordless telephones.
Bull is the trusted partner for enterprise data. The Group, which is firmly established in the Cloud and in Big Data, integrates and manages high-performance systems and end-to-end security solutions. Bull's offerings enable its customers to process all the data at their disposal, creating new types of demand. Bull converts data into value for organisations in a completely secure manner.
Bull currently employs around 9,200 people across more than 50 countries, with over 700 staff totally focused on R&D. In 2013, Bull recorded revenues of 1.3 billion.
For more information:
http://www.bull.com / http://www.facebook.com/BullGroup / http://twitter.com/bull_com