11 juin 2018 | International, C4ISR

THALES LANCE LA PREMIÈRE OFFRE DE CLOUD DE DÉFENSE DÉDIÉ AUX FORCES ARMÉES

A Eurosatory 2018, Thales lance la première solution globale d'infrastructure de cloud privé dédié aux forces armées pour une efficacité accrue dans la conduite des opérations. Avec Nexium Defence Cloud, Thales est au cœur de la transformation numérique de ses clients et s'adapte aux besoins spécifiques des armées qui évoluent dans un environnement contraint et sécurisé.

Points clés

  • Thales lance une solution globale et résiliente pour permettre aux forces de rester connectées en permanence depuis n'importe quel terminal leur offrant une totale autonomie
  • Thales offre un accès privatif aux données, adapté aux contraintes spécifiques des infrastructures militaires du centre de commandement au thé'tre d'opérations
  • Cette nouvelle solution bénéficie de l'expertise de Thales en matière de cybersécurité

Depuis quelques années, les services de cloud ont changé le quotidien de la société civile et généré un développement considérable d'applications amenant de nouveaux usages chez des clients connectés en permanence, depuis n'importe quel type de terminal et ayant un fort besoin de partage des contenus. Ces nouveaux besoins sont également ceux des forces armées.

Les solutions de cloud déjà utilisées pour des applications civiles ne sont pas adaptées aux besoins des forces armées. Elles exigent une bande passante illimitée dont les forces armées ne disposent pas sur le terrain. Le Cloud de défense Thales est une solution souveraine qui peut fonctionner dans un contexte contraint leur offrant une totale autonomie sur les thé'tres d'opérations.

L'hyper-connectivité du champ de bataille est porteuse d'une révolution technologique pour les armées engendrant de nouveaux besoins de collecte, d'échange et de traitement de grands volumes de données en temps réel. Face aux nouvelles menaces que les conflits futurs sont susceptibles d'engendrer, les forces armées doivent pouvoir réagir immédiatement à n'importe quel scénario, parfois de façon simultanée. Avec son offre de Cloud de défense et ses solutions de connectivité associées, Thales propose une solution globale fondée sur une maîtrise de bout-en-bout de l'hébergement des données et des applications pour permettre un accès entièrement privé aux données dans un environnement dédié et cyber-sécurisé de la métropole aux thé'tres d'opérations.

Nexium Defence Cloud est une solution à la fois globale et modulaire. Elle propose une vaste palette de configurations : depuis des infrastructures de très haute capacité pour les quartiers généraux, facilement extensibles, jusqu'à des box tout-en-un, pour transformer en quelques heures un camp projeté en nouveau nœud du cloud. Cette interconnexion effectuée facilement au sein d'organismes et d'états-majors ad hoc renforce l'efficacité des missions en toute sécurité.

Le déploiement, la configuration et la mise à jour des équipements et des applicatifs peuvent être préparés et mis en œuvre à distance pour permettre aux forces armées de se concentrer sur la conduite des opérations.

https://www.thalesgroup.com/fr/monde/defense/press-release/thales-lance-la-premiere-offre-de-cloud-de-defense-dedie-aux-forces

Sur le même sujet

  • The military is building a space plane. Now it looks to have an engine up to the task

    17 juillet 2018 | International, Aérospatial

    The military is building a space plane. Now it looks to have an engine up to the task

    By SAMANTHA MASUNAGA A decade after the U.S. Air Force commissioned the next generation of GPS satellites, the first of these spacecraft is finally set to launch into orbit later this year. As with other national security missions, a roughly 200-foot-tall rocket will blast the massive satellite to space, fulfilling a contract worth more than $80 million. But as nations develop technology to disable or shoot down satellites — as China did to one of its own satellites with a ground-based ballistic missile in 2007 — the U.S. military has started to look at options for rapidly and cheaply launching smaller crafts into space. An experimental program spearheaded by a Pentagon research agency could eventually be part of that solution. The Defense Advanced Research Projects Agency, along with aerospace giant Boeing Co., is developing a reusable spaceplane expected to launch small satellites 10 times in 10 days. The vehicle's first test flight is set for 2021, which hints at the Defense Department's growing interest in reusable rocket technology, particularly its potential to drive down launch costs and speed up turnaround time. In recent weeks, the spaceplane's rocket engine, known as the AR-22, completed 10 test fires in 240 hours without need for refurbishments or major repairs, said Jeff Haynes, program manager at Aerojet Rocketdyne. The test firing took place at NASA Stennis Space Center in Mississippi from June 26 to July 6. The engine test is “really good progress,” said Claire Leon, director of Loyola Marymount University's graduate program in systems engineering and former director of the launch enterprise directorate at the U.S. Air Force's Space and Missile Systems Center. “SpaceX has had its success,” she said. “I think this engine test also demonstrates that other companies are doing the technology development and having success that will enable reusability.” The title of first reusable system belongs to NASA's Space Shuttle, though more recently, several commercial space firms, including Microsoft co-founder Paul Allen's Stratolaunch and British billionaire Richard Branson's Virgin Orbit, have developed systems that would reuse aircraft to launch satellites from the belly of a plane. https://www.stripes.com/news/the-military-is-building-a-space-plane-now-it-looks-to-have-an-engine-up-to-the-task-1.538009

  • Four big questions for cybersecurity in 2019

    2 janvier 2019 | International, C4ISR

    Four big questions for cybersecurity in 2019

    By: Justin Lynch How will cybersecurity experts remember 2018? In the past year, the Trump administration announced it would take more offensive hacking operations against foreign countries, the Department of Justice announcedsweeping indictments against Chinese hackers and the U.S. intelligence community reported that foreign countries continued to interfere in American elections. So what comes next? Here are four overarching questions for the cybersecurity community in 2019: What will the new Pentagon chief do with expanded cyber powers? In August, the president gave the secretary of Defense the ability to conduct cyberattacks against foreign countries so long as they do not interfere with the national interest of the United States, according to four current and former White House and intelligence officials. But the resignation of Jim Mattis, the Defense secretary, means the next Pentagon chief will have a broad arsenal of cyber authorities. For the cyber community, Patrick Shanahan, the current acting secretary, is a relative unknown. He has not given significant insight into how he views the role of offensive cyberattacks for the Pentagon, and his scheduled Jan. 1 elevation comes as some in the Trump administration and U.S. Cyber Command have pushed for even more authorities. However, he has spoken at length about the need for the defense industry to bolster its own cyber practices. Although the appointment of Shanahan as acting Pentagon chief is temporary, he is on the short list of officials who may take on the job full time. The new Pentagon chief may also have to decide when the National Security Agency and U.S. Cyber Command should split. Both bodies are led by Gen. Paul Nakasone, but that may change. Cyber Command is in the process of gaining its own infrastructure to conduct offensive cyberattacks, and a Pentagon official told Fifth Domain in November that it appeared the split was all but certain to happen in the coming years, although no formal decision as been made. What comes next in the U.S.-China cyber relationship? The Department of Justice released a flurry of indictments against Chinese hackers in 2018, accusing Beijing's cyber sleuths of infiltrating American government agencies and defense contractors. The most recent round of allegations came Dec. 18, and the legal action could continue in 2019. While announcing the most recent indictments, Deputy Attorney General Rod Rosenstein accused China of breaking an agreement not to use hacked materials for commercial use, although he did not offer evidence. The hacking allegations come amid a broader trade war between the United States and China. Experts have told Fifth Domain a trade war could increase digital tension between the two nations. If the trade war continues, experts say they see little incentive for China to limit its cyberattacks. Will America suffer blowback for more offensive cyber operations? When the Trump administration announced the United States would take more offensive actions in cyberspace, some in the federal cybersecurity community criticized the plan as faulty. “The side effects of the strategy of ‘persistent engagement' and ‘defend forward' are still ill-understood,” Max Smeets and Herb Lin, experts at Stanford University wrote for Lawfare. “A United States that is more powerful in cyberspace does not necessarily mean one that is more stable or secure.” Experts also warn of making any rush judgments about the effectiveness of these offensive cyberattacks. Current and former intelligence officials worry that uncovering and attributing a hack can take more than a year, and, even then, that process is not perfect. One former official pointed to the leaked documents about Russian targeting of American election infrastructure in 2016 that was sent to the news organization the Intercept. It took months for the intelligence community to understand the full extent of the hack, the official said, an example of how long it takes to detect a cyberattack. However, all of that means it is reasonable to expect that the merits of the new offensive cyber operations may not be known publicly for years. Will Congress take action to streamline cybersecurity contracting and research? Yes, changing the way government does business is ambitious. But experts argue that if the United States wants to keep up with digital innovations from China and other countries it is necessary to change the American government's relationship with the private sector and academia. The effort to streamline cybersecurity funding and research will fall to the new Congress, in which Democrats will take over the House of Representatives. But when it comes to the U.S. government's relationship with the cyber industry, structural barriers to innovation remain. On average, it takes roughly seven years for an idea to get a contract inside the U.S. government. In that length of time, a product is already two generations old. Former Pentagon officials have used the digital fight against the Islamic State as an example of how long the process takes. It took roughly two years for Cyber Command to receive the proper equipment and training after the order to digitally defeat the Islamic State, officials told Fifth Domain. In addition, the cybersecurity industry is watching a series of bills in Congress. Sen. Mark Warner, D-Va., has pushed for a streamlined security clearance process, and industry officials told Fifth Domain they expect him to continue the effort in the new year. The bill could make it easier and cheaper to get a security clearance. And many in the federal cybersecurity community have called for a change in academia's relationship with cybersecurity. The universities and research institutions in the United States focusing on quantum computing are “subpar,” George Barnes, deputy director at the NSA said in June. Experts say that quantum computers will make traditional cybersecurity methods obsolete because of the expansive computing power. However, new investments in artificial intelligence and a new Solarium Commission, which was created to help contextualize cyber in the broader national and economic security discussion, may provide solutions to these problems. https://www.fifthdomain.com/industry/2018/12/31/four-big-questions-for-cybersecurity-in-2019

  • Contracts for August 4, 2021

    5 août 2021 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

    Contracts for August 4, 2021

    Today

Toutes les nouvelles