Sponsored by Spectra Group
05 Feb 20. Thales to provide Royal Navy with the most advanced mission systems to protect UK maritime interests globally.
- Thales is proud to be delivering the digital heart of the UK’s next generation Type 31 Frigates
- Thales to expand its footprint in the UK with the opening of a new Naval Combat Management Centre in Crawley (West Sussex) and increase its mission system capabilities and future growth.
Thales, as part of Babcock Team 31, has been selected to deliver the digital heart of the UK’s next generation frigates. Thales will be the mission systems integrator for the Type 31 programme, delivering the combat system, communications systems and the navigation and bridge system. The T31 general purpose frigate programme will provide the UK Government with a fleet of five ships, at an average production cost of £250 million per ship.
Following a comprehensive competitive process, T31, a capable, adaptable and technology-enabled global frigate will be the UK Royal Navy’s newest class of warships, with the first ship scheduled in the water in 2023.
At its height, the programme will maximise a workforce of around 1250 highly- skilled roles in multiple locations throughout the UK, with around 150 new technical apprenticeships likely to be developed. The work is expected to support an additional 1250 roles within the wider UK supply chain.
Building on our global successes Thales is expanding its capabilities in mission systems delivery in the UK. This will generate new jobs and technical skills in Crawley, West Sussex where the new team has been established. A new naval combat management centre has also been developed to provide a space for customers, employees and end-users to train, test and see how our solutions deliver operational benefits and to continuously gain customer feedback.
“Thales has been at the forefront of innovation with the Royal Navy for over 100 years. We are immensely proud of the trusted critical solutions we provide to the Royal Navy to protect our waters. This means we can continue to expand our significant UK footprint whilst also looking to export markets.” Victor Chavez, Chief Executive of Thales in the UK
Notes to editors:
- Tacticos is the mission system and has been designed from the outset to be open and provides access to the core data model via open published standards that can be used to enable continuous growth and evolution through life.
- Type 31 will offer the Royal Navy a new class of ship with a proven ability to deliver a range of peacekeeping, humanitarian and warfighting capabilities whilst offering communities and supply chains throughout the UK a wide range of economic and employment opportunities.
- A key element of the Type31 programme is to supply a design with the potential to secure a range of export orders thereby supporting the UK economy and UK jobs. Type31 will offer export customers an unrivalled blend of price, capability and flexibility backed by the Royal Navy’s world-class experience.
- Type 31 is a multi-role frigate equipping today’s mariner with real-time data to support immediate and complex decision-making.
05 Feb 20. Here are the Pentagon’s issues with the Army’s new command post set-up. The Army’s new command post tool received lukewarm results from the Pentagon’s weapon testers, though the Army asserts that deficiencies have been fixed.
In its annual report, the Director Operational Test and Evaluation office, or DOT&E, stated that the Army needed to make several improvements to the Command Post Computing Environment in the way of software, hardware, cybersecurity and maintainability. CPCE is a web-enabled system that will consolidate current mission systems and programs into a single-user interface.
The DOT&E report assessed that CPCE was not operationally effective, suitable or survivable in a cyber-contested environment. While soldiers found the CPCE concept to be an improvement over existing systems, the report notes that CPCE didn’t support leaders and soldiers with sufficient scalability, collaboration or operations management.
DOT&E recommended the Army improve hardware and software on CPCE to address deficiencies, improve cybersecurity, demonstrate joint and coalition interoperability and improve training as a means of improving maintainability that will decrease reliance on contractors in the field.
The Army has maintained that the approach it is using for CPCE — an agile and development operations approach in which software and fixes are iterated in an evolving manner — means that CPCE will always be improving based on upon user feedback gained through operational and developmental testing.
“We tested a version of Command Post Computing Environment last fall; by the time the test report was written we iterated it four times. Even between now and what we will deliver in the Defender ’20 next year to the 1st Cavalry Division, we’re going to turn the crank again and make that software even better,” Maj. Gen. David Bassett, Program Executive Officer for Command, Control, Communication-Tactical, told reporters in October.
The Army also told C4ISRNET that it has fixed the majority of the issues DOT&E identified in its report.
In November 2019, the Army conducted a follow on developmental test to address concerns with software sustainability and coordinated the test with DOT&E, Paul Mehney, director of public communications for PEO C3T, told C4ISRNET.
Servers have been replaced, enabling greater capacity for CPCE. Those upgraded servers will be fielded to units going to Europe for Defender 2020, which will also be used to gain useful insights and improvements for CPCE.
The Army has also upgraded the software referenced in the report, maintaining the software is now stable. CPCE is slated to be formally included as part of the first delivery of the Army’s modernized network kit to four infantry brigades under what’s known as capability set 2021. (Source: Defense News)
04 Feb 20. Saudi Arabia’s National Cybersecurity Authority launches today the Global Cybersecurity Forum in Riyadh, the Middle East largest to date cybersecurity event. The Forum, held under the patronage of King Salman bin Abdulaziz al Saud, is taking place over two days, on 4-5 February 2020, at the Ritz-Carlton Hotel in Riyadh. The international Forum is hosting global policy makers, businesses, investment firms and international organization representatives to discuss how the world’s collective cybersecurity should be maintained in the face of tomorrow’s threats. Over the two days, participants from all over the world will discuss how the issues under the Forum’s five themes (cybersecurity industry, international cyber collaboration, cyber culture, cyber disruption, and cyber threats and resilience) should be understood, and what responses need to be developed to strengthen the integrity of the world’s cyber defenses.
Some of the key speakers at GCF who will be talking to the above themes include the Heads of the UK and Singapore governments’ Cybersecurity Authorities, both globally renowned experts in their field, as well the Chairman of Advisory Board of World Economic Forum’s Center for Cybersecurity.
Experts from the tech sector include Diana Kelley, Microsoft’s Cybersecurity Field CTO, and Travis Reese, the President of FireEye. Saudi Arabia’s own national cybersecurity champions will also be speaking on the criticality of cybersecurity in their respective fields: Eng. Khalid Alharbi, CISO for Aramco, and Yasser Al Swailem, Cybersecurity VP for Saudi Telecom Company.
Speaking about the Forum, the Chairman of the Saudi Arabia’s National Cybersecurity Authority, H.E. Dr. Musaad bin Muhammed Al Aiban, Minister of State, Member of the Council of Ministers, said “We are tremendously excited to host this event and act as a catalyst for cybersecurity cooperation and innovation. The constantly evolving threat landscape requires intensified global cooperation on cybersecurity and the Global Cybersecurity Forum is encouraging global leaders to take meaningful actions to better protect the world’s economies and makes cyberspace safer for all”.
Saudi Arabia has steadily increased its cybersecurity capabilities in recent years and is now the most cybersecure state among the Arab nations. The country is looking to further consolidate its position as a regional leader and become a global cybersecurity hub, so the Forum will also bring investors together with cybersecurity business that are developing the defensive technologies needed to stay ahead of the rapidly evolving threats.
The Forum, which is convening more than 1200 participants from more than 58 countries will be attended by some of the world’s leading cybersecurity companies, including Microsoft, IBM, and FireEye. The Forum is anticipated to generate significant investments in the cybersecurity industry, accelerating the development of Saudi Arabia’s already rapidly growing cyber sector and supporting the growth of the global cyber industry.
The Global Cybersecurity Forum will help bolster global cooperation between regional and global cybersecurity players. Five major MOUs will be signed by NCA with Saudi and international organisations throughout the event to reemphasize and strengthen their commitment to international cybersecurity cooperation.
The MoUs being announced illustrate how the Forum is helping fuel growth of the cybersecurity industry, expanding on Saudi Arabia’s existing capacities and creating up-stream growth beyond its borders, not just in jobs, but in knowledge and technological innovation through collaborative initiatives to expand the capacity and develop the technologies needed to keep the world ahead of tomorrow’s threats. The MoUs will allow NCA to provide better cybersecurity training to its youth and collaborate with international organisation on cybersecurity strategies.
The MoU between NCA and Global Resilience Federation seeks to enhance cybersecurity protections for critical national infrastructure through improved information sharing and threat mitigation strategies through a national information sharing blueprint.
The MoU between NCA and Underwriters Lab is a strategic partnership that will enable the Kingdom of Saudi Arabia to further enhance its national capabilities in cyber threat mitigation.
The MoUs signed by NCA with King Abdullah University of Science and Technology, the Saudi Human Resources and Development Fund and NEOM will enable Saudi students to acquire a deep knowledge and understanding of cybersecurity matters, increasing the pipeline of qualified cybersecurity professionals for the growing cybersecurity industry.
04 Feb 20. Tassie cyber security node to support tech and defence innovation. Minister for Industry, Science and Technology Karen Andrews has confirmed the launch of the Tasmanian Cyber Security Innovation Node in Launceston. An initiative of the Commonwealth and Tasmanian state government has launched the Tasmanian Cyber Security Innovation Node, as the Commonwealth pushes to position Australia as a global cyber security powerhouse. The Tasmanian Cyber Security Innovation Node launched in Launceston joins five other state and territory nodes created in partnership with the Australian government-backed AustCyber.
Federal Minister for Industry, Science and Technology Karen Andrews said the new node would help drive innovation and economic growth in the cyber security sector.
“Growing the sector in Tasmania will attract business investment, create new jobs and support Australia’s national security through development of advanced cyber security capability,” Minister Andrews said.
“The global cyber security market is expected to be worth US$270bn by 2026 and the Morrison government wants our local businesses to be a critical player. This node and others in the network will foster collaboration, which will help Australia seize the opportunities and meet the rising demand for skilled cyber workers and services,” Minister Andrews added.
The Tasmanian Node will have a particular focus on driving national strategy in the smart cities, internet of things and marine technology sectors.
Tasmanian minister for science and technology Michael Ferguson said the node would be an important part of protecting Tasmania from future cyber security threats.
“Linking in with national cyber security efforts will assist Tasmania to respond more rapidly to future state, national and international threats, which are expected to become more pervasive in the future,” Mr Ferguson said.
AustCyber’s Tasmania Cyber Security Innovation Node is a collaboration between AustCyber, the Tasmanian government and Enterprize Tasmania Ltd.
AustCyber was established as part of the Coalition’s Industry Growth Centres Initiative and is designed to grow a globally competitive cyber security sector. (Source: Defence Connect)
03 Feb 20. How the USMC wants to improve oversight of its network. The Marine Corps is creating new network battalions and companies in an effort to improve oversight and the command and control of its network. These new organizations — described as a “huge, huge deal” — are part of an effort to reduce the number of organizations charged with network functions. The move will also allow for more accurate readiness reporting, said Col. Ed Debish, commanding officer of the Marine Corps Cyberspace Operations Group.
“Currently, we have six different commands that have something to do with managing the Marine Corps Enterprise Network,” he said at a Jan. 31 lunch hosted by the AFCEA Quantico chapter.
Now, one commander — the head of Marine Corps Forces Cyberspace Command — will oversee and manage these groups.
“Primarily, what they’re going to do is deliver enterprise business services down to the end user device,” Debish told C4ISRNET following his remarks. “They’re also going to be responsible for managing the BAN and LAN — the building area networks and the local area networks on the bases and stations around the Marine Corps.”
The new commands will absorb the organizations that previously performed many of these functions, including the Marine Air-Ground Task Force (MAGTF) Information Technology (IT) Support Centers, or MITSCs.
“The problem that it was designed to solve was unity of command and unity of effort on the Marine Corps Enterprise Network. It’s going to give us visibility all the way down to the end user device where we didn’t have that visibility before,” he said.
The arrangement will also help Marines better understand readiness of the network. Previously, it could be difficult to determine what equipment was working and part of the network. Now, with one command, those assessments should be easier, Debish said, as they’ll be managed under a single entity.
Additionally, the new organizations will help with one of the Marine Corps’ top IT priorities: to deploy its network abroad in a more agile and mobile way.
“The idea is to move that enterprise capability to the tactical edge with the deploying force,” Debish said. “If you were to just remotely connect back into the enterprise network, you’re going over a VPN connection to a data center somewhere that might be thousands of miles removed from it. But if you lost that connection, then what happens? You don’t have any access to any of your data or your network.”
The first battalion will be created this year at Camp Pendleton. The battalion commander will assume command around April. The first company is expected to be created this year and be based out of Marine Corps Forces Europe/Africa, located in Germany.
Next year, leaders expect to create the second and third network battalions at Camp Lejeune and Okinawa, respectively. (Source: C4ISR & Networks)
03 Feb 20. USAF seeks to modify tanker-transport fleet into command and control nodes. The US Air Force (USAF) plans to equip its fleet of tanker-transport aircraft with beyond-line-of-sight (BLOS) communications pods so as to serve as command and control (C2) nodes in the future battlespace. A request for information (RFI) issued by the service on 3 January calls for industry to provide BLOS communications systems that can be housed in an underwing-mounted pod for carriage by the Boeing KC-135R/T Stratotanker and KC-46A Pegasus platforms.
“The focus of this RFI is on the identification of existing technologies and the near to long-term development potential for the next generation of BLOS communication systems that can be [housed] within a wing-mounted pod on tanker platforms and capable of providing voice, video, and data communications capabilities,” the USAF said. “BLOS communication systems that exist today include tropospheric scatter and high frequency systems as well as various tethered and untethered unmanned aerial vehicles that act as relays. The government is interested in systems that could provide the best redundancy to satellite communications (SATCOM) systems in terms of performance characteristics. The response should address aspects such as operating distance of each technology, reliability, throughput, latency, time of day, and weather dependence.”
The RFI did not disclose a timeline for possible fielding of such a system, and neither did it say how many BLOS pods the USAF would be looking to acquire. The USAF currently fields 396 KC-135R/Ts and is in the process of receiving up to 179 KC-46As. (Source: Jane’s)
BATTLESPACE Comment: This concept was examined in the nineties by General Jumper head of USAF at that time when FCS was also in play.
29 Jan 20. Airbus CyberSecurity and Amossys Sign Cyber Security Partnership Agreement. Airbus CyberSecurity and Amossys will have signed a partnership agreement at the International Cybersecurity Forum (FIC) in Lille. The partnership between the major industrial cyber security services supplier and the Rennes-based SME at the cutting edge of cyber security innovation respectively has three focus areas.
The first concerns detecting vulnerabilities, particularly those specific to the environment of operators of essential services (OVI), and responding to cyber security incidents. Already qualified as an Information Systems Security Auditor Provider (PASSI) and a Security Incident Detection Service Provider (PDIS) by the National Cybersecurity Agency of France, ANSSI, Airbus CyberSecurity is seeking to complete its OVI protection offering with a Security Incident Response Service Provider (PRIS) offer, for which the certification process is underway. Amossys, which is also a certified PASSI and is taking steps to obtain PRIS accreditation, brings to Airbus CyberSecurity its expertise and innovative capabilities in incident response through its Computer Emergency Response Team (CERT). This team stands out for its expanded service offering, particularly in detecting system compromises, i.e. past or current attacks on an information system.
The second relates to studies and innovation work, particularly in artificial intelligence (AI). Teams of AI architects, researchers, experts and data-scientists from the two companies will develop artificial intelligence models capable of analysing behaviour, predicting security events, simulating the adversary, and assessing information systems with embedded AI.
Given the importance of education and training in cyber security, the third aspect of this partnership focuses on developing Airbus’s CyberRange platform, which is already used by many engineering schools and continuing education institutes. The aim is to enhance the functional capabilities of CyberRange by integrating Amossys software modules simulating cyber attacks.
Amossys Managing Director Frédéric Rémi said: “Being backed by a major company such as Airbus will not only help promote our innovations and expertise, but also give us access to larger markets, particularly abroad, while retaining our independence and our flexibility as an SME.”
“The partnership with Amossys is key: it is an innovative alliance between two experienced incident response teams which will help us speed up our developments in AI and training for cyber security experts,” said Frédéric Julhes, Head of Airbus CyberSecurity France.
Strategic partnerships between small and medium-sized enterprises and large industrial companies are of vital importance and are now a necessity in security. In fact, they are a fundamental part of the strategy driven by the Cyber Excellence Cluster, in which both partners are active. (Source: ASD Network)
01 Feb 20. Pentagon finalizes first set of cyber standards for contractors. The Pentagon has finalized the long anticipated cybersecurity standards contractors will have to follow before winning contracts from the Department of Defense, a new process called the Cybersecurity Maturity Model Certification (CMMC) 1.0.
The model is a tiered cybersecurity framework that grades companies on a scale of one to five based on the level of classification and security that necessary for the work they are performing.
“The government and the contractor community must keep working together to address real and growing cybersecurity threats, and we need a robust response to protect our infrastructure, information, and supply chains,” said David Berteau, president and chief executive of the Professional Services Council, a trade association for federal contractors. “With today’s announcement, DoD has achieved a significant milestone.
Here’s what industry officials need to know about the version finalized Jan. 31.
Why it was needed
Previously, the Pentagon did not have unified standard for cybersecurity that businesses needed to follow when bidding for contracts. Companies could claim to meet certain industry standards for cybersecurity, but those assertions were not tested by auditors, nor did the standards take into account the type of work a company was bidding to complete. Since then, defense officials have said that cybersecurity is not a one size fits all approach.
In the meantime, adversaries have discovered it is easier to target unsuspecting down tier suppliers, rather than prime contractors.
“Adversaries know that in today’s great power competition environment, information and technology are both key cornerstones and attacking a sub-tier supplier is far more appealing than a prime,” Ellen Lord, the under secretary of defense for acquisition and sustainment, told reporters in a briefing at the Pentagon Jan. 31.
Officials have said cyber theft by adversaries costs the United States about $600bn a year.
What will change?
Contracts will mandate bidders reach a certain level of certification to win specific jobs. For example, if businesses aren’t bidding on a contract that has extremely sensitive information, they must only achieve the first level of certification, which involves basic cybersecurity such as changing passwords and running antivirus software. More sensitive programs will require more stringent controls.
Smaller companies down the supply chain will not, however, have to have the same level of certification as primes, said Katie Arrington, chief information security officer for the Office of the Under Secretary of Defense for Acquisition and the point person for the certification.
Another significant change with the new process is the creation of an accreditation board and assessors. The board is an outside entity, separate from DoD, that will be charged with approving assessors to certify companies in the process.
The accreditation body was formed earlier this month and officials are working on identifying and training the assessors, which will be called Certified Third-Party Assessment Organizations (C3PAO).
Officials explained Jan. 31 that CMMC will follow a crawl, walk, run approach to ensure companies aren’t unprepared for the change. The accreditation board is in the process of training the auditors that will oversee the certificaion. Once the requirements are met, a company’s certification is good for 3 years.
In the meantime, DoD plans to release 10 requests for information and 10 requests for proposals that will include the new cyber standards this year. The first solicitation could come as early as June.
Arrington said earlier this week that she expects 1,500 companies to be certified by the end of 2021.
She added that all new contracts starting in fiscal year 2026 will contain the cybersecurity requirements, however, Lord noted that they will not be not retroactive to previous contracts. (Source: Fifth Domain)
31 Jan 20. DOD to Require Cybersecurity Certification in Some Contract Bids. By the end of September, the Defense Department will require at least some companies bidding on defense contracts to certify that they meet at least a basic level of cybersecurity standards when responding to a request for proposals.
DOD released its new Cybersecurity Maturity Model Certification today, billed by the undersecretary of defense for acquisition and sustainment as “Version 1.0.”
By June, the department plans to publish as many as 10 requests for information on contracts that include CMMC requirements, Ellen M. Lord said during a Pentagon news conference announcing the certification effort. By September, she said, the department will also publish corresponding requests for proposals that include those requirements. By fiscal year 2026, all new DOD contracts will contain the CMMC requirements, Lord said.
“I believe it is absolutely critical to be crystal clear as to what expectations for cybersecurity are, what our metrics are, and how we will audit for those expectations,” Lord said. “CMMC is a critical element of DOD’s overall cybersecurity implementation.”
Lord said cybersecurity risks threaten the defense industry and the national security of the U.S. government, as well as its allies and partners. About $600bn, or 1% of the global gross domestic product, is lost through cyber theft each year, she noted.
“Adversaries know that in today’s great-power competition environment, information and technology are both key cornerstones,” she said. “Attacking a sub-tier supplier is far more appealing than a prime [supplier].”
The CMMC gives the department a mechanism to certify the cyber readiness of the largest defense contractors — those at the top who win contracts are called “primes” — as well as the smaller businesses that subcontract with the primes.
The new CMMC provides for five levels of certification in both cybersecurity practices and processes.
“Something … simple in Level 1 would be, ‘Does your company have antivirus software? Are you updating your antivirus software? Are you updating your passwords?'” said Katie Arrington, DOD’s chief information security officer for acquisition. “CMMC Level 1 is the basic cyber hygiene skills we should be doing every day. They are there to protect yourself, your company and your own information.”
By CMMC Level 2, Arrington said, the department will also begin looking at cybersecurity processes as well, to ensure cybersecurity is not just practiced, but that a company is effectively documenting, managing, reviewing and optimizing its practices across its entire enterprise.
Arrington said that for the roughly 10 requests for information and requests for proposals DOD is expected to publish later this year for potential contracts, she expects a mix of CMMC certification levels will be required.
“We’ll have some CMMC Level 3, CMMC Level 1, and there may be one or two with the 4 or 5 CMMC levels going out,” Arrington said.
The department will not be certifying potential defense contractors for CMMC on its own. Instead, Lord explained, a series of CMMC “third-party assessment organizations” or C3PAOs, will conduct those assessments. The C3PAOs will also not be paid by the department, Lord said. “That’s a private transaction between industrial base companies and those of certification bodies,” she added.
No C3PAOs have been designated to conduct the assessments yet, Lord said. noting that while multiple companies are interested, DOD has not yet designated who is qualified.
A newly created 13-member CMMC accreditation body, made up of members of the defense industrial base, the cybersecurity community and the academic community will oversee the training, quality and administration of the C3PAOs, Lord said.
Meanwhile, she said, the department is drafting a memorandum between DOD and the CMMC accreditation body to outline its roles, responsibilities and rules. She said one area of concern will be to ensure no conflicts of interest are involved in accreditation. For example, a C3PAO would not be able to accredit itself for CMMC.
No existing contracts with the department will have CMMC requirements inserted into them, Arrington said.
Subcontractors to a prime contractor will not all need to have the same level of CMMC certification to win a contract, Arrington said.
“Security is not one size fits all,” she added. Instead, she said, depending on how controlled unclassified information flows between those parties involved in a contract, subcontractors might need only be a CMMC Level 1 company.
CMMC will ensure a more level and fair playing field for companies bidding on DOD contracts, Arrington said. Today, she said, some small businesses bidding on work might self-attest that they meet requirements to handle certain kinds of information, but in fact only are planning to meet those requirements, while another business might actually be meeting the requirements. CMMC, she said, will ensure that only companies that actually meet requirements can compete for contracts.
“We need to make sure our industry partners are prepared to take on the work, and our third-party auditors will ensure that they are implementing the practices that we need in place to secure that national defense and our industrial base,” Arrington said.
Lord said the department is aware that CMMC requirements could be a burden to some smaller companies and that DOD is working with primes and smaller companies to help them overcome that burden.
“We need small and medium businesses in our industrial base, and we need to retain them,” she said. “We will continue to work to minimize impacts, but not at the cost of national security.” (Source: US DoD)
31 Jan 20. Skyfront to Provide Long-Range BVLOS UAVs to Silvus Technologies. Skyfront, a provider of hybrid-electric Unmanned Aerial Vehicles (UAVs), and Silvus Technologies, a provider of Multi-Input Multi-Output (MIMO) communications, have announced a partnership that combines Skyfront’s five-hour endurance Perimeter UAV with Silvus’ high-power StreamCaster radios.
The combined product, the Perimeter XLRS, can fly for up to 5 hours while maintaining command and control links and streaming real-time video up to 60 miles / 100 km from the ground control station.
This partnership has enabled UAV operators to inspect pipelines and power lines and perform surveillance missions across the world. The Perimeter’s onboard StreamCaster radio provides the Perimeter with a steady, reliable video and control link. The StreamCaster’s MIMO and beamforming technologies successfully overcome range limitations, signal attenuation and multipath interference, to allow the Perimeter XLRS to operate in environments where other data links typically fail, such as in maritime, mountain, and jungle deployments.
The Perimeter XLRS’s integration of the StreamCaster is comprehensive. It includes:
- Latency-free manual/joystick and waypoint control up to 60 miles away
- RF/EMI protection from the powerful onboard radio
- Testing and integration with numerous sensor payloads
- H264/H265 encoding for any HDMI-output camera
- A fully integrated ground station with directional ground antennas
- Seamless power and harnessing
- AES256-encrypted video and control links
- Elimination of interference between GNSS unit and radio
“The integration of the StreamCaster into the Perimeter line of UAVs has enabled it to fully utilize its extreme endurance and fly beyond-line-of-sight (BVLOS) missions with ease,” said Troy Mestler, CEO of Skyfront. “We are very excited to be partnering with Silvus Technologies to bring long-range aerial platforms into the mainstream.”
“Silvus Technologies is proud to have Skyfront as one of our UAV partners. The Perimeter XLRS’s ability to support long endurance VTOL flight with the Silvus MN-MIMO waveform makes it a unique differentiator in the marketplace,” said Kasey Cooper, Director of Unmanned Systems at Silvus Technologies. (Source: UAS VISION)
Spectra Group Plc
Spectra Group (UK) Ltd, internationally renowned award-winning information security and communications specialist with a proven record of accomplishment.
Spectra is a dynamic, agile and security-accredited organisation that offers secure Hosted and Managed Solutions and Cyber Advisory Services with a track record of delivering on time, to spec and on budget.
With over 15 years of experience in delivering solutions for governments around the globe, elite militaries and private enterprises of all sizes, Spectra’s platinum and gold-level partnerships with third-party vendors ensure the supply of best value leading-edge technology.
Spectra was awarded the prestigious Queen’s Award for Enterprise (Innovation) in 2019 for SlingShot.
In November 2017, Spectra Group (UK) Ltd announced its listing as a Top 100 Government SME Supplier by the UK Crown Commercial Services.
Spectra’s CEO, Simon Davies, was awarded 2017 Businessman of the Year by Battlespace magazine.
Founded in 2002, the Company is based in Hereford, UK and holds ISO 9001:2015, ISO 27001:2013 and Cyber Essentials Plus accreditation.