• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Defence Engage
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2023

C2, TACTICAL COMMUNICATIONS, AI, CYBER, EW, CLOUD COMPUTING AND HOMELAND SECURITY UPDATE

September 16, 2022 by

Sponsored by Spectra Group

 

https://spectra-group.co.uk/

————————————————————————

19 Sep 22.  Spectra Group Celebrates 7000th SlingShot Satellite Communications System Milestone.

Spectra Group, a specialist provider of secure voice, data and satellite communications systems, is celebrating having delivered over 7000 of the award-winning SlingShot satellite communications systems to regular and specialist forces globally which coincides with their 20th Anniversary and DVD.  DVD is taking place 21-22 September 2022 at Millbrook, England and Spectra Group’s SlingShot will be on display on the Mercedes-Benz stand (in the off-road area) fitted to a Jankel LTTV to demonstrate this fully integrated satellite communications capability.

Since its launch at the Military Satellite Conference in London in November 2014, there are now over 7000 SlingShot systems either sold or leased, in operation with specialist or regular forces in over 24 countries globally.  SlingShot has provided hundreds of thousands of hours of secure satellite communications and data for modern armies and security forces using their own in-service radios thereby minimising the cost and training burden.   Winner of the Queen’s Award for Innovation, the SlingShot system is not only low in size, weight and power but revolutionary because it can be integrated with current in-service UHF and VHF tactical communications systems to extend their range from 30km to 1000(+) km thus providing true Beyond Line of Sight (BLOS) and Communications on the Move (COTM), in all conditions from one system.

Designed by, and for use with specialist forces, Slingshot is perfect for missions where troops are deployed with minimal logistical support, in remote locations and have limited transport capacity.   By integrating the SlingShot system with Inmarsat’s L-TAC satellite service, and attached to an in-service radio, deployed troops instantly gain strategic communications that would otherwise not be available without a significant communications infrastructure. In addition to the robust BLOS voice capability, SlingShot also has sufficient bandwidth to carry critical data to support essential applications such as: situational awareness tools; GPS tracking; reporting and other data messaging without the requirement for ground-based line-of-sight re-broadcasting architecture.  Finally, the Slingshot omni-directional antennas provide manpack, land, sea and air platforms with real-time Comms on the Move (COTM) rather than having to be static, as experienced with traditional TACSAT systems.

 

Simon Davies, CEO of Spectra Group said: “We are very proud of the Slingshot system and how successful it has been in solving the communications challenges faced by both specialist and regular forces when deployed all over the world in austere locations.  7000 units is a significant milestone and particularly pleasing in this our 20th anniversary year. It also demonstrates that SlingShot is proving to be a battle-winning capability and part of its success is the fact it is genuinely “plug and play” converting any in-service tactical radio system into a BLOS and COTM satellite communications system with minimal training.”

15 Sep 22.  Quantum-Systems and Teleplan Globe Team to Aid Special Forces. Teleplan Globe, software and system solutions company from Oslo and Munich-based drone manufacturer Quantum-Systems have signed a Memorandum of Understanding to integrate the FACNAV battle space management system into the Quantum-Systems Vector & Scorpion 2-in-1 platform.

The cooperation is designed to add value in future operations by increasing precision in conducting Close Air Support missions and increasing capacity for information sharing.

Both companies have developed unique systems that, when combined, become a superior asset for the professional user. For Quantum-Systems it was of enormous importance to work with a partner at eye level who is sharing similar values and attitudes.

“With Teleplan, we have found exactly this opportunity: two medium-sized companies and global market leaders in their field are more agile, faster and significantly more cost-effective than the established major players in this fields,”

states Quantum-Systems CEO Florian Seibel.

The task of the new joint venture is to develop, produce and sell new and innovative products as well as services to solve the challenges of close air support missions and related information sharing to all parties.

“As a leading provider of software and solutions for decision makers that protect people, assets and institutions, we see a huge opportunity in this cooperation,” explains Teleplan Globe Vice President of Sales & Marketing Magne Killingstad. “In addition to its expertise in electronics and UAV development, manufacturing and repair, Quantum-Systems offers its global sales network.”

Generating a practicable superior asset

Teleplan Globe developed the FACNAV system to meet the high demands of an elite unit within the Norwegian Special Forces. The daily operations require flawless and advanced information sharing. To enhance these capabilities, Teleplan Globe teamed up with Quantum-Systems Vector UAS to create a platform for increased precision in special operation missions.

The cooperation between Quantum-Systems and Teleplan Globe started in April 2022, when the German Material Procurement Agency, BAAINBw awarded Teleplan Globe the contract to provide the German Armed Forces with the FACNAV system for Joint Terminal Attack Controllers (JTAC).

Quantum-Systems then got in touch with Teleplan Globe and within a few days we had a complete integration of our Vector into the FACNAV software.

“We were able to complete a so-called “zero-day” integration within one day. The Quantum-Systems and Teleplan Globe teams were able to get the video and meta-data into the FACNAV system in real time right off the bat. This could provide immediate added value, at no additional cost, to the German Army in case the special forces decide to procure our Vector reconnaissance drones as part of their Falke procurement programme,”

said Florian Seibel, CEO and CO-Founder of Quantum-Systems.

“The ease-of-use of both our products enable the end-users to swiftly set up and operate in the situations they train for and are actively involved in. Innovative technology combined with the ambition of two forward-leaning agile companies sets the stage for new capabilities for the warfighters. Through live testing with Quantum Systems, we have seen the unprecedented effect of their sensors combined with Teleplan Globes software and we are eager to see where this can progress further in Germany and abroad,” stated Magne Killingstad, Vice President Marketing & Sales at Teleplan Globe. (Source: UAS VISION)

 

15 Sep 22. Anduril unveils ‘Menace’ command-and-control center for austere bases. Anduril Industries on Thursday announced a new command-and-control center that military forces could deploy to austere bases in rough environments and set up in about 10 minutes.

The system, dubbed Menace, is an expeditionary command, control, communications and computing platform that would allow commanders to plan and execute missions at locations around the world.

Anduril, a defense and security technology firm based in California, said the product could support the U.S. Air Force’s Agile Combat Employment effort. If a war erupts, that initiative would see the Air Force’s deployed forces spread out from centralized air bases and instead use a dispersed network of bases throughout a region.

The Air Force believes this concept would be particularly useful in the Indo-Pacific during a war against China, which has advanced capabilities to strike American allies’ bases, because the battlefield would take up a wide area.

Dispersing forces is intended to make it harder for an advanced adversary, such as China, to knock out a large portion of the Air Force’s airmen and aircraft with a single attack, the service has said. Agile Combat Employment could include partner nation’s military airfields, local civilian airports and austere bases set up by the U.S. in the field.

Anduril said users of Menace, in its 20-foot container configuration, can load the platform almost entirely intact into a single C-130 transport aircraft, fly it to a base and then quickly set it up. Once it is unloaded from the plane and put into place, two people can construct it and make it fully operational within 10 minutes, Anduril said.’=

Menace could serve as an expeditionary operations center, with a handful of computer stations inside allowing battlefield commanders to track where friendly and enemy forces are at any time, and then issue orders to their troops, Zachary Mears, head of strategy for Anduril, said in a Wednesday interview. Commanders could also manage base defense and security, counter-drone efforts, and maintenance and logistics using Menace, according to the company.

Mears said Menace was designed to be “software agnostic” to allow for the integration of a variety of mission planning tools and communications protocols. He added that Anduril envisions Menace as working with the military’s Joint All-Domain Command and Control concept for battlefield communications.

Anduril also said Menace would use commercial proliferated low-Earth orbit and military medium-Earth orbit satellite communications, as well as high-frequency communications pathways. It is secure and capable of handling classified mission planning, and can act as a secure compartmented information facility, Anduril said.

Menace is also equipped with a heating, ventilation and air conditioning system to allow for a comfortable workspace even in environments with extreme temperatures, Anduril said. Mears said it can run on its own internal power generator and a 5G wireless network, or plug into a base’s power and internet systems.

Mears noted that the company in recent years has talked with senior leaders and operational commanders from the Air Force, as well as leaders in Europe and the Pacific region, about their need for a reliable way for joint task force commanders and expeditionary squadron commanders in the field to plan and carry out missions while communicating with their troops. Mears said this is Anduril’s first product that aims to support the Air Force in these missions.

“We think about Menace as being that core [command-and-control] node that also enables mission [planning] at the unclassified up to classified levels,” Mears said.

But Menace’s capabilities aren’t limited to that 20-foot container, Mears said, adding that its software is flexible, scalable and can work in a variety of locations — everything from the Air Force’s Combined Air Operations Center at Al Udeid Air Base, Qatar, to mobile and tactical vehicles in the field in a smaller configuration.

He also said Menace can help with joint warfighting exercises, such as Northern Edge or Defender Europe, and with the actual joint integration, joint warfighting and combined arms activities.

Anduril said it can also help the U.S. Marine Corps put its expeditionary advanced base operations concept into practice; the company has talked with Air Force and Marine Corps officials about the possibility of the services buying Menace.

Mears said Anduril is still figuring out the cost of a single Menace unit.

(Source: Defense News)

 

13 Sep 22. Northrop Grumman collaborated with Cubic Mission and Performance Solutions (CMPS), a division of Cubic Corporation, to successfully demonstrate a High Capacity Backbone (HCB)-enabled Gateway System solution that provides foundational connectivity and processing capabilities to enable Joint All Domain Command and Control (JADC2) and ensure delivery of the right data, to the right place, at the right time.

In a recent demonstration, Northrop Grumman and Cubic showcased an interconnected, vendor-agnostic network through Open Mission Systems (OMS) interfaces, proving the ability to deliver significantly enhanced, all domain command and control capabilities to fifth and fourth generation platforms.

“We connected disparate systems that will enable interoperability to help the Department of Defense achieve their JADC2 vision,” said Kevin Berkowitz, director, network solutions, Northrop Grumman. “This further illustrates our commitment to seamlessly integrate advanced networking capabilities with multiple industry partners, which will in turn create an information advantage critical to succeed in an era of technology-driven conflict.”

The demonstration showcased technologies and solution sets that are critical enablers for JADC2. Incorporating PlatformONE, GatewayONE and Northrop Grumman’s Resilient Network Controller, Northrop Grumman demonstrated rapid technology insertion and network management, recovery and optimization in a contested environment. These solution sets showed how quickly new technology can be deployed to the tactical edge utilizing containerized software architecture.

“Cubic sees this successful demonstration as the first of many to come, including a complex air/ground flight test event we have planned for next year,” said David Harris, vice president and general manager of Secure Communications & GATR, CMPS. “The development of our HaloTM Software Defined Antenna, utilizes novel digital beam forming techniques to enable an ad hoc directional mesh for problem sets like JADC2. The modular, building-block approach will allow the system to be integrated on a variety of platforms enabling secure data transport into and out of highly contested environments.”​

This cross-industry event is the fourth in a series of demonstrations designed to showcase the advanced OMS connectivity, networking and processing capabilities achieved by Northrop Grumman and third-party systems in JADC2 mission environments. Northrop Grumman plans to further expand capabilities with an additional demonstration later this year.

Cubic is a technology-driven, market-leading provider of integrated solutions that increase situational understanding for transportation, defense C4ISR, and training customers worldwide to decrease urban congestion and improve the militaries’ effectiveness and operational readiness. Our teams innovate to make a positive difference in people’s lives. We simplify their daily journeys. We promote mission success and safety for those who serve their nation. For more information about Cubic, please visit www.cubic.com or on Twitter @CubicCorp.

 

13 Sep 22. Saudi Arabia: AI investments will grow as cyber attacks increasingly threaten business operations. Today, 13 September, state-owned Saudi Aramco’s CEO Amin Nasser announced that cyber attacks represent one of the largest threats to the company. Speaking during the Global Artificial Intelligence (AI) summit, in Riyadh, Nasser added that cyber incidents are comparable to physical risks or natural disasters. Escalations in regional tensions between Iran, Saudi Arabia and the US have increased the oil giant’s vulnerability to tit-for-tat cyber hostilities carried out by state-backed or opportunistic actors. In July 2021, Saudi Aramco fell victim to a cyber ransom incident whereby hackers demanded USD 50 m for the release of sensitive data. While no group claimed responsibility, Iran and Saudi Arabia have been engaged in cyber warfare since the early 2000s. Nasser emphasised the importance of companies investing in AI technology to mitigate the impact of cyber attacks, as he predicted an uptick in severity and frequency in the coming months. (Source: Sibylline)

 

13 Sep 22. Iron Bow Technologies Secures Authority to Operate from the United States Army for AttackIQ’s Breach and Attack Simulation Solution. Iron Bow Technologies, the leading technology solutions provider to government, commercial, and healthcare markets, today announced that the company has been granted a three-year Assess Only Authority to Operate (ATO) as the prime contract holder by the U.S. Army’s Defensive Cyber Operations Threat Emulation program for AttackIQ’s Security Optimization Platform. Iron Bow worked closely with our partner, KAIROS, a provider of sophisticated cybersecurity analysis and implementation within commercial, federal, and Department of Defense (DoD) environments, to launch the process.

AttackIQ is the first Breach and Attack Simulation platform to receive this ATO designation. It will allow the U.S. Army to use AttackIQ’s Security Optimization Platform to develop a more strategic and proactive defense posture across their mission-critical assets in support of warfighters around the globe. AttackIQ’s ATO was successfully granted a Moderate/Moderate/Low classification after a thorough, multi-phase process that began in 2021 and included several levels of evaluations and rigorous security assessments.

“With the Assess Only ATO accreditation, AttackIQ will allow the U.S. Army to deploy a threat emulation capability across various production networks in support of critical mission objectives,” said Dakota R. Steedsman, Lieutenant Colonel, U.S. Army. “The AttackIQ platform’s continuous security control validation gives our security teams real-time, data-driven visibility into whether their controls are working as intended, enabling uninterrupted verification of program health at scale and in an automated fashion.”

Iron Bow provides solutions supporting DoD’s operational needs today to meet the modernization goals of tomorrow and has extensive experience implementing cybersecurity solutions to securely speed decision making and operational effectiveness. This partnership with AttackIQ will enable organizations across DoD, as well as other agencies, to apply for reciprocity via the Enterprise Mission Assurance Support Service (eMASS) system, an internal government system that documents all security checks and authorizations.

“Department of Defense information technology leaders and the warfighters they serve require break-through cybersecurity solutions in an ever-evolving threat landscape,” said Rene LaVigne, President and Chief Executive Officer of Iron Bow. “Our ability to deliver agile, flexible, and modular solutions like AttackIQ allows us not just to help DoD leaders meet their objectives but exceed cyber outcomes for the future.”

About Iron Bow Technologies

Iron Bow Technologies is a leading IT solutions provider dedicated to successfully transforming clients’ technology investments into robust business capabilities across the government, commercial, education, and healthcare markets. The Iron Bow team brings a depth of technical expertise and domain knowledge to deliver the right solution and ensure successful business outcomes. Iron Bow’s global reach and strategic partnerships with industry leaders and disruptive technology partners empower clients to implement the latest cutting-edge technology to support mission-critical objectives. (Source: BUSINESS WIRE)

 

06 Sep 22. Washington must act to build capable federal cybersecurity workforce. With the U.S. facing a reported cybersecurity personnel shortage of at least 700,000 workers, the White House’s July workforce summit set the appropriately ambitious goal of filling those vacancies.

The summit—hosted by National Cyber Director Chris Inglis — emphasized plans to build the national workforce and improve its skills while addressing issues of diversity, equity, and inclusion. The programs announced at the summit, however, only minimally address one of the central problems: the mismatch between the skills of applicants and the needs of employers, including the federal government.

Most of the initiatives announced at the summit focused on enhancing school programs and increasing the number of individuals entering the workforce. For example, CISCO, IBM, Girls Who Code, Fortinet, Dakota State University, and Ambassador Susan E. Rice have unveiled plans focused on bolstering K-12 cyber education as well as recruitment from historically black universities and colleges. This will increase the number of cybersecurity professionals entering the market but may not significantly close the gap between qualified cybersecurity professionals and open vacancies in government and industry.

The summit also highlighted a number of skill enhancement initiatives, but these programs lack nationwide scalability and accessibility. The cybersecurity professional association announced its One M Certified in CybersecuritySM initiative to provide individuals with free certification training and exams to help fill 2.72 m vacancies globally.

With chapters in over fifty countries, and it is currently unclear how many of the certification opportunities will go to Americans. The nonprofit NPower said it will offer free IT training for “military-connected individuals” and young adults from underserved communities, but the applicants must live near a handful of cities and the program has age restrictions.

The summit could have achieved more by focusing on several key challenges that are responsible for the persistent mismatch between the skills of applicants and the needs of both public sector and private sector employers.

Building technical skills

First, cybersecurity is a dynamic field that relies on perishable skills and niche capabilities. No matter how much school or training individuals have, or how many certificates they hold, there is always more to learn.

As technology and adversary techniques advance, so do the technical skills required by the workforce at all levels, not just the entry-level. The qualifications employers seek in a given year may be overshadowed by new requirements the next. In addition to gaps in the technical abilities of recent university graduates, 66 percent of those graduates were found to lack desired soft skills like communication, flexibility, and leadership.

On-the-job training

Second, while obtaining a degree in cybersecurity provides students with a broad understanding of the field and its fundamental principles, most organizations, including the Department of Defense, require baseline certifications to demonstrate specific knowledge in security infrastructure, risk mitigation, threat recognition, and other topics. On top of the baseline certifications, employers may require knowledge and sector-specific certifications on the products or technologies they use.

The makers of some vendor-specific technologies, like Splunk, offer select free training on their products, a practice that should be explored and encouraged amongst all vendors. With each employer creating a niche list of qualifications, an individual can go to college for cybersecurity, graduate, and still not be qualified for an entry-level job in the field.

Gaining needed experience

Third, even with the right certifications, individuals might still find themselves unqualified. The biggest obstacle for applicants is the requirement of prior work experience, even for entry-level positions. According to global information technology professional association ISACA’s annual workforce survey, an overwhelming 73 percent of respondents stated that the most important factor for determining whether an applicant is qualified is whether they have previous hands-on experience with the specific systems the company is using.

During the summit, Accenture announced an apprenticeship program to provide such experience, however, there needed to be more discussion of scalable community partnerships that would provide experience on the technologies being used locally.

Obtaining security clearance

Fourth, even with the right certifications and prior experience, applicants will face another obstacle if they want to be a part of the 16 percent of cybersecurity professionals working for the U.S. government or a federal contractor: Nearly all of these positions require a security clearance. For a government contractor, employees with clearances can engage in billable federal support work immediately. However, if an employee does not have a clearance, the company may need to wait months, if not years, before the employee can do billable work. What’s more, there is always a chance they may not obtain the clearance at all. So even if qualified cybersecurity personnel are available, government contractors may not be willing to keep the employee on payroll while waiting for clearance.

Collectively, these four challenges create another problem for the industry. Qualified applicants are so scarce that the minute a company invests in an entry-level employee, advancing them to a mid-career qualification level, that person may well get poached by a competitor. 60 percent of ISACA survey respondents reported difficulties retaining qualified cybersecurity professionals.

Early cybersecurity applicants are having trouble getting jobs in the private sector or federal government. Companies and the government, meanwhile, complain that there are not enough qualified applicants. However, there are plenty of applicants – they just need a clear pathway to becoming qualified.

Goodwill’s IT Training program

The efforts announced at the White House summit are a good start, and there are other community initiatives — not addressed at the White House summit — that also promote certification training. Great examples that could be replicated nationally include the Information Technology Training program available in Denver and Colorado Springs through the Goodwill of Colorado.

This nonprofit organization provides free career development resources, including cybersecurity training and certification exams. And the Microsoft Technology Education and Literacy in Schools program partner schools with industry volunteers to help teachers understand various technology topics to address in teaching.

Washington must do more.

To build on these initiatives, the government must convince companies to invest in hiring entry-level applicants without prior experience. That can be a hard sell when employees are apt to leave after a short time. Similar to a hiring bonus, companies could incentivize new employees to stay for a certain period of time by offering retention bonuses or well-established advancement pathways.

Right now, factors contributing to employee turnover include better offers, poor financial incentives, and lack of development opportunities. Providing employees with professional development as part of a broader retention strategy will reduce employee turnover and ultimately advance the cybersecurity industry’s mission.

The federal government can set an example for industry by creating its own Federal Cyber Workforce Development Institute. An idea promulgated by CSC 2.0, the successor to the congressionally mandated Cyberspace Solarium Commission, this program would offer entry-level federal employees the training and experience needed to become mid-career professionals.

The institute would provide hands-on learning opportunities, skills assessments, and other training for entry-level federal employees as well as develop upskilling and reskilling curriculum for existing employees looking to transition to cybersecurity positions. This program would “make it easier for federal employers to prepare newly hired early-career personnel for federal cyber work roles,” the CSC 2.0 report explained.

Benefit for private sector

While the federal government should seek to retain those that participate in this program, the nation also benefits if they leave for private sector jobs. With critical infrastructure largely owned by private companies and small and medium-sized businesses as the backbone of the U.S. economy, the national interest is served when the government bears more of the burden when industry – particularly small companies cannot – and trains more entry-level cyber personnel knowing that some will move on after a time.

Cybersecurity jobs reflect the specific needs and technologies in use by an organization, causing numerous variations in what “qualified” means, regardless of time in the field. Ultimately, strengthening the national cybersecurity workforce – from where the federal government draws its own workforce – comes down to providing training, a career development path, and retention incentives for new and existing cybersecurity employees.

(Source: C4ISR & Networks)

 

13 Sep 22. AeroVironment signs deal with Persistent Systems to join Wave Relay® Ecosystem. Persistent Systems, LLC (“Persistent”), a leader in mobile ad hoc networking (MANET), announced today that AeroVironment’s unmanned ground vehicles (UGV) business has joined Persistent’s Wave Relay® Ecosystem. The Ecosystem is a growing industry alliance of unmanned aircraft systems (UAS), UGVs, and sensor companies all utilizing Persistent’s Wave Relay® MANET as their preferred network for command-and-control and communications functions.

“We are very excited to have AeroVironment’s UGVs join the Ecosystem,” said Nick Naioti, Senior VP for Business Development for Persistent Systems. “In building the networked battlefield, we are providing the warfighter with increased situational awareness while also reducing size, weight, and power.”

At the core of the Ecosystem, the Wave Relay® MANET enables tactical teams to receive critical information from unmanned systems and their sensors which facilitates improved decision making, increasing both soldier safety and effectiveness.

According to the agreement between the two companies, the following UGVs will incorporate Persistent’s MANET hardware:

  • telemax™ EVO PRO;
  • telemax™ EVO HYBRID;
  • telemax™ EVO PLUS;
  • tEODor™ EVO; and
  • EVO Upgrade Kit.

These ruggedized, all-terrain UGVs perform a variety of dangerous missions, including explosive ordnance disposal (EOD), hazardous materials handling (HAZMAT) and chemical, biological, radiological, and nuclear (CBRN) threat assessment.

“Persistent has established itself in the market as a network provider that delivers extended range, high throughput and robustness against radio interference, all of which are critically important to our customers’ life-saving missions,” said Brian Young, AeroVironment vice president and product line general manager for UGVs.

In addition, Wave Relay® MANET gives companies the opportunity to move beyond simple point-to-point solutions and build whole constellations of connected air and ground assets, Naioti said. (Source: PR Newswire)

 

09 Sep 22. Classified NATO documents have been stolen from the Armed Forces General Staff (EMGFA) agency of Portugal after it suffered from cyber attack. The American cyber intelligence agents warned the Portuguese government about the data breach after noticing the sale of stolen documents, alerted the US embassy in Lisbon.

EMGFA, who is responsible for the control, planning, and operations of the armed forces of Portugal, however, only realised they suffered a cyber attack after hackers posted samples of the stolen material on the dark web with a price tag for interested buyers.

Experts from the National Security Office (GNS) and Portugal’s national cyber security centre was dispatched to EMGFA to carry out a complete screening of the body’s entire network.

Local news organisation Diario de Noticias broke the cyber attack news, claiming it has confirmed the validity of the information via unnamed sources, close to the ongoing investigations.

The leaked documents are of “extreme gravity”, according to DN’s sources. A crisis with the country’s credibility in the military alliance could occur due to the circulation of the documents.

“It was a cyber attack prolonged in time and undetectable, through bots programmed to detect this type of documents, which were later removed in several stages,” one of DN’s sources said.

EMGFA uses air-gapped computers, but the exfiltration used standard non-secure lines. One of the initial conclusions of the investigation is that the top military body has broken its operational security rules at some point in time. (Source: https://www.cybersecurityconnect.com.au/)

————————————————————————-

Spectra Group Plc

 

Spectra Group (UK) Ltd, internationally renowned award-winning information security and communications specialist with a proven record of accomplishment.

Spectra is a dynamic, agile and security-accredited organisation that offers secure Hosted and Managed Solutions and Cyber Advisory Services with a track record of delivering on time, to spec and on budget.

With over 15 years of experience in delivering solutions for governments around the globe, elite militaries and private enterprises of all sizes, Spectra’s platinum and gold-level partnerships with third-party vendors ensure the supply of best value leading-edge technology.

Spectra was awarded the prestigious Queen’s Award for Enterprise (Innovation) in 2019 for SlingShot.

In November 2017, Spectra Group (UK) Ltd announced its listing as a Top 100 Government SME Supplier by the UK Crown Commercial Services.

Spectra’s CEO, Simon Davies, was awarded 2017 Businessman of the Year by Battlespace magazine.

Founded in 2002, the Company is based in Hereford, UK and holds ISO 9001:2015, ISO 27001:2013 and Cyber Essentials Plus accreditation.

————————————————————————-

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • Atkins
  • IEE
  • EXFOR logo
  • DSEi
  • sibylline logo
  • Team Thunder logo
  • Commando Spirit - Blended Scoth Whisy
  • Comtech logo
Hilux Military Raceday Novemeber 2023 Chepstow SOF Week 2023

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    March 24, 2023
    Read more
  • VETERANS UPDATE

    March 24, 2023
    Read more
  • MANAGEMENT ON THE MOVE

    March 24, 2023
    Read more

Copyright BATTLESPACE Publications © 2002–2023.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT