SIGN4L, an electronic warfare & intelligence solutions provider, has recently unveiled two state-of-the-art solutions, V-Protect and NavControl-G, to offer tactical advantages in future missions.

V-Protect is an RF (radio frequency) communication jamming system, while NavControl-G has a specialized counter-drone capability. These two solutions are well-positioned to ensure favorable outcomes in highly digitalized defense settings. They were unveiled at the ongoing IDEX 2021 (International Defense Exhibition & Conference) at the EDGE pavilion that runs till 25th February at the ADNEC (Abu Dhabi National Exhibition Centre).

V-Protect is an innovative mobile active & reactive, high-power jammer system designed to assist blocking of common terrestrial radio frequency signal technologies and portable satcom equipment such as walkie-talkie, radio, mobile, and Wi-Fi frequencies. Users need to install this user-friendly model, which is a C-IED (counter-improvised explosive device) with counter-drone measures, in a standard SUV. It will offer automatic operability by using 16 channels as well as high-emitting power amplifiers to enhance protection range and combat threats across the frequency domain.

NavControl-G, on the other hand, is a sophisticated transmitter unit that has been designed to prevent UAVs (unmanned aerial vehicles) from trespassing specific locations. In order to safeguard sensitive areas, the system will ensure GPS signal emulation to generate timing and position inaccuracies. Furthermore, it can also be integrated across various configurations, either in fixed locations or be deployed on the field.

According to EDGE’s VP of Program Management for the Electronic Warfare and Intelligence cluster, Waleid Al Mesmari, electronic warfare and intelligence act as the backbone of the modern defense and security systems. The company appreciates SIGN4L for developing breakthrough technologies to help clients expand in a rapidly changing world. Its latest solutions are among its agile offerings to assist clients while managing complex security & performance requirements.

Source credit: