Back to news

April 14, 2020 | International, Aerospace

AeroVironment Awarded $10.7 Million Puma™ 3 AE Contract for United States Navy and Marine Corps Small Tactical Unmanned Aircraft Systems Program

Simi Valley, Calif., April 7, 2020 – AeroVironment, Inc. (NASDAQ:AVAV), a global leader in unmanned aircraft systems (UAS), today announced its receipt of a $10,677,987 firm-fixed-price contract award for Puma™ 3 AE systems and spares on Feb. 18, 2020 for the U.S. Navy and Marine Corps Small Tactical Unmanned Aircraft Systems (SUAS) Program. Delivery is anticipated by April 2020.

“Puma 3 AE is a combat-proven enabler of U.S. Navy and Marine Corps tactical operations, providing persistent situational awareness, expeditionary reconnaissance, surveillance, and target acquisition, force protection and overwatch – anywhere and at any time,” said Rick Pedigo, AeroVironment vice president of business development. “Its versatility, ruggedness and reliability in a wide range of operating environments – over land and sea – consistently provide the actionable intelligence warfighters need to proceed with certainty.”

The AeroVironment Puma 3 AE is a fully man-portable unmanned aircraft system designed for land and maritime operations. The hand-launched Puma 3 AE has a wingspan of 9.2 feet (2.8 meters), weighs 15 pounds (6.8 kilograms) and can operate for up to 2.5 hours at a range of up to 12.4 miles (20 kilometers) with a standard antenna, and up to 37.2 miles (60 kilometers) with AeroVironment's Long-Range Tracking Antenna (LRTA). Capable of landing in water or on land, the all-environment Puma, with its Mantis i45 EO/IR sensor suite, empowers the operator with extended flight time and a level of imaging capability never before available in the small UAS class.

AeroVironment's family of small UAS comprises the majority of all unmanned aircraft in the U.S. Department of Defense (DoD) inventory and its rapidly growing international customer base numbers more than 45 allied governments. To learn more visit www.avinc.com.

About AeroVironment Tactical UAS

The RQ-20A/B Puma™, Puma™ LE, RQ-11B Raven®, RQ-12A Wasp®, together with the VAPOR® Helicopter comprise AeroVironment's family of tactical unmanned aircraft systems. This family of systems provides increased capability to the warfighter that gives ground commanders the option of selecting the appropriate aircraft based on the type of mission to be performed. This increased capability has the potential to provide significant force protection and force multiplication benefits to small tactical units and security personnel. AeroVironment provides logistics services worldwide to ensure a consistently high level of operational readiness. AeroVironment has delivered thousands of new and replacement tactical unmanned air vehicles to customers within the United States and to more than 45 allied governments.

About AeroVironment, Inc. (AV)

AeroVironment (NASDAQ: AVAV) provides customers with more actionable intelligence so they can proceed with certainty. Based in California, AeroVironment is a global leader in unmanned aircraft systems and tactical missile systems, and serves defense, government and commercial customers. For more information visit www.avinc.com.

Safe Harbor Statement

Certain statements in this press release may constitute "forward-looking statements" as that term is defined in the Private Securities Litigation Reform Act of 1995. These statements are made on the basis of current expectations, forecasts and assumptions that involve risks and uncertainties, including, but not limited to, economic, competitive, governmental and technological factors outside of our control, that may cause our business, strategy or actual results to differ materially from those expressed or implied. Factors that could cause actual results to differ materially from the forward-looking statements include, but are not limited to, our ability to perform under existing contracts and obtain additional contracts; changes in the regulatory environment; the activities of competitors; failure of the markets in which we operate to grow; failure to expand into new markets; failure to develop new products or integrate new technology with current products; and general economic and business conditions in the United States and elsewhere in the world. For a further list and description of such risks and uncertainties, see the reports we file with the Securities and Exchange Commission. We do not intend, and undertake no obligation, to update any forward-looking statements, whether as a result of new information, future events or otherwise.

E-mail Facebook TwitterShare

Additional AV News: click here
AV Media Gallery: click here
Contact:
AeroVironment, Inc.
Steven Gitlin
+1 (805) 520-8350
pr@avinc.com

Mark Boyer
For AeroVironment, Inc.
+1 (310) 229-5956
mark@boyersyndicate.com

View source version on AeroVironment, Inc. : https://www.avinc.com/resources/press-releases/view/aerovironment-awarded-10.7-million-puma-3-ae-contract-for-united-states-nav

On the same subject

  • The DoD needs data-centric security, and here’s why

    September 30, 2020 | International, C4ISR, Security

    The DoD needs data-centric security, and here’s why

    Drew Schnabel The U.S. Department of Defense is set to adopt an initial zero-trust architecture by the end of the calendar year, transitioning from a network-centric to a data-centric modern security model. Zero trust means an organization does not inherently trust any user. Trust must be continually assessed and granted in a granular fashion. This allows defense agencies to create policies that provide secure access for users connecting from any device, in any location. “This paradigm shift from a network-centric to a data-centric security model will affect every arena of our cyber domain, focusing first on how to protect our data and critical resources and then secondarily on our networks,” Vice Adm. Nancy Norton, director of the Defense Information Systems Agency and commander of the Joint Force Headquarters-Department of Defense Information Network, said at a virtual conference in July. How does the Pentagon's AI center plan to give the military a battlefield advantage? The Pentagon's artificial intelligence hub is working on tools to help in joint, all-domain operations as department leaders seek to use data to gain an advantage on the battlefield. Andrew Eversden To understand how the DoD will benefit from this new zero-trust security model, it's important to understand the department's current Joint Information Environment, or JIE, architecture; the initial intent of this model; and why the JIE can't fully protect modern networks, mobile users and advanced threats. Evolving DoD information security The JIE framework was developed to address inefficiencies of siloed architectures. The goal of developing a single security architecture, or SSA, with JIE was to collapse network security boundaries, reduce the department's external attack surface and standardize management operations. This framework helped ensure that defense agencies and mission partners could share information securely while reducing required maintenance and continued infrastructure expenditures. Previously, there were more than 190 agency security stacks located at the base/post/camp/station around the globe. Now, with the JIE architecture, there are just 22 security stacks centrally managed by the Defense Information Systems Agency to provide consistent security for users, regardless of location. “This paradigm shift from a network-centric to a data-centric security model will affect every arena of our cyber domain, focusing first on how to protect our data and critical resources and then secondarily on our networks,” Vice Adm. Nancy Norton, director of the Defense Information Systems Agency and commander of the Joint Force Headquarters-Department of Defense Information Network, said at a virtual conference in July. To understand how the DoD will benefit from this new zero-trust security model, it's important to understand the department's current Joint Information Environment, or JIE, architecture; the initial intent of this model; and why the JIE can't fully protect modern networks, mobile users and advanced threats. Evolving DoD information security The JIE framework was developed to address inefficiencies of siloed architectures. The goal of developing a single security architecture, or SSA, with JIE was to collapse network security boundaries, reduce the department's external attack surface and standardize management operations. This framework helped ensure that defense agencies and mission partners could share information securely while reducing required maintenance and continued infrastructure expenditures. Previously, there were more than 190 agency security stacks located at the base/post/camp/station around the globe. Now, with the JIE architecture, there are just 22 security stacks centrally managed by the Defense Information Systems Agency to provide consistent security for users, regardless of location. Initially, the JIE was an innovative concept that took the DoD from a highly fragmented architecture, in which each agency managed its own cybersecurity strategy, to an architecture in which there is a unified SSA. However, one of the early challenges identified for the JIE was managing cloud cybersecurity as part of the SSA. The components in the JIE — the Joint Regional Security Stacks family's internet access points and cloud access points — have traditionally focused on securing the network, rather than the data or user. As more DoD employees and contractors work remotely and data volumes increase, hardware cannot scale to support them. This has created ongoing concerns with performance, reliability, latency and cost. A cloud-first approach In response, the DoD leverages authorized solutions from the Federal Risk and Authorization Management Program, and it references the Secure Cloud Computing Architecture guidance for a standard approach for boundary and application-level security for impact Level 4 and 5 data hosted in commercial cloud environments. The purpose of the SCCA is to provide a barrier of protection between the DoD Information Services Network and the commercial cloud services that the DoD uses while optimizing the cost-performance trade in cybersecurity. Defense agencies are now exploring enterprise-IT-as-a-service options to move to cloud, and reduce the need for constant updates and management of hardware. Through enterprise-IT-as-a-service models, defense agencies will be able to scale easily, reduce management costs and achieve a more competitive edge over their adversaries. Before the pandemic hit, defense agencies were already moving to support a more mobile workforce, where employees can access data from anywhere on any device. However, a cyber-centric military requires security to be more deeply ingrained into employee culture rather than physical protection of the perimeter. The next evolution to secure DISA and DoD networks is to embrace a secure access edge model with zero-trust capabilities. The SASE model moves essential security functions — such as web gateway firewalls, zero-trust capabilities, data loss prevention and secure network connectivity — all to the cloud. Then, federal employees have direct access to the cloud, while security is pushed as close to the user/data/device as possible. SP 800-27, zero-trust guidance from the National Institute of Standards and Technology, provides a road map to migrate and deploy zero trust across the enterprise environment. This guidance outlines the necessary tenants of zero trust, including securing all communication regardless of network location, and granting access on a per-session basis. This creates a least-privilege-access model to ensure the right person, device and service have access to the data they need while protecting high-value assets. As the DoD transforms the JIE architecture to an as-a-service model with zero-trust capabilities, defense agencies will experience cost savings, greater scalability, better performance for the end user and war fighter, improved visibility, and control across DoD networks — and ultimately a stronger and more holistic cybersecurity capability moving forward. https://www.c4isrnet.com/opinion/2020/09/29/the-dod-needs-data-centric-security-and-heres-why/

  • No title found

    July 9, 2021 | International, Aerospace

    No title found

    Germany's Purchase of Boeing P-8A Poseidon Casts Doubts over Franco-German MPA Program

  • Aegis Ashore Poland enters maintenance period ahead of NATO acceptance
All news