Sigma Defense Acquires Aries Defense to Expand CJADC2 and Tactical ISR Capabilities
Sigma Defense has acquired Aries Defense to enhance its tactical edge ISR and CJADC2 capabilities, announced in a press release. Aries Defense, founded in 2017, specializes in integrating tactical video and sensor data from UAVs and unattended systems to support real-time situational awareness.
The acquisition integrates Aries Defense’s fielded ISR products, including OverWatch, CheckPoints, Recon V OverWatch, and NEOS, into Sigma Defense’s Olympus ecosystem. Olympus is a DevSecOps-enabled platform designed for data fusion, orchestration, and multi-domain information sharing across the joint force.
By combining Aries Defense’s edge ISR networking and interoperability tools with the Olympus platform, Sigma Defense aims to deliver scalable UAV and sensor operations and persistent situational awareness in denied or degraded environments. Aries Defense’s solutions are already deployed under U.S. Marine Corps programs of record, supporting rapid operational deployment.
Sigma Defense stated that the acquisition strengthens its ability to provide secure, real-time ISR video and sensor data sharing across CJADC2 systems, improving interoperability and decision-making at the tactical edge.
We hope you enjoyed this article.
Consider subscribing to one of our newsletters like Defense AI Brief, AI Funding Brief or Daily AI Brief.
Also, consider following us on social media:
More from: Defense
More from: Funding
Subscribe to Defense AI Brief
Your weekly intelligence briefing on the technology shaping modern warfare and national security.
Trend report
Cybersecurity Trends Report 2025
The Cybersecurity Trends Report 2025 by Netwrix Research Lab provides insights into how organizations are adapting their cybersecurity strategies amidst growing AI adoption. The report, based on a survey of 2,150 IT professionals from 121 countries, highlights key trends such as the increase in hybrid IT environments, AI-driven security challenges, and the rising costs of security incidents.
Read more