V2X

The systems and networks that drive government missions forward ensure that decision-makers and operators are connected, all the way to the tactical edge.
V2X

The systems and networks that drive government missions forward ensure that decision-makers and operators are connected, all the way to the tactical edge.
Rating
4.5 / 5.0
Pricing
Contact vendor
Deployment
SaaS / Cloud
Category
Security Operations
Product Description
The systems and networks that drive government missions forward ensure that decision-makers and operators are connected, all the way to the tactical edge. V2X delivers IT support, networking, and cybersecurity solutions that ensure optimal mission support and performance.
V2X systems engineers and technicians are deployed on U.S. Navy ships and at shore-based facilities across all theaters to deliver and optimize keyboard-to-antenna IT services. V2X also operates and maintains U.S. Air Force and U.S. Army networks throughout Europe and Southwest/Central Asia, including many austere and hazardous locations.
Capabilities include:Network Operations, Engineering, and Management CybersecurityRisk Management Framework (RMF), Software Development, and TestingIntegration Data Management, Analysis, Analytics, and VisualizationITIL/ITSM Consulting, Implementation, and Certification Training
Contact Vendor
Interested in V2X? Get in touch with the vendor.
arrow_upwardPOPULAR
ICT Misr
ICT Misr is a technology consulting and system integration firm based in Egypt. It provides IT services and solutions across hardware infrastructure, cloud and virtualization, business continuity, sec
Abilene Advisors Supplier Shield
Abilene Advisors Supplier Shield on SecurityListing: End-to-end TPRM platform with advisory, managed services, and cloud tools
Analyst1 Orchestrated Threat Intelligence Platform
Analyst1 Orchestrated Threat Intelligence Platform on SecurityListing: Orchestrated threat intelligence platform for CTI and SOC teams
IGRC Square
IGRC Square provides cybersecurity solutions for organizations, focusing on governance, risk management, and compliance to safeguard data, devices, and employees. The company emphasizes state-of-the-a