Cutting Through the Fog of War: Mobile Solutions in the Military
|発行||VDC Research Group, Inc.||商品コード||350694|
|出版日||ページ情報||英文 35 Pages; 7 Exhibits
|軍事部門向けモバイルソリューション：「戦場の霧」の突破 Cutting Through the Fog of War: Mobile Solutions in the Military|
|出版日: 2016年01月26日||ページ情報: 英文 35 Pages; 7 Exhibits||
The military and defense sector has significant demand for mobile devices and solutions given the emphasis placed on reliable communications, information reconnaissance and sharing. The need for devices at the vanguard of technology to remain competitive has resulted in militaries acquiring commercial off-the-shelf (COTS) products that have short life cycles and constantly improving technology. However, COTS devices often fail to address the unique security and environmental needs of militaries, thus complicating the acquisition process and increasing procurement costs. Employed in the offices of defense organizations and on the battlefield, governments utilize mobile devices to improve employee and soldier effectiveness by providing access to information essentially from anywhere and at anytime. Moreover, despite enhanced security requirements, defense organizations have developed large application ecosystems to support business processes and improve worker productivity. The defense space is frequently evolving and demand depends largely on domestic and international socioeconomic and political factors.
Anyone participating directly or indirectly in the development, marketing, or distribution of solutions for defense-related deployment environments is a suitable audience. This report summarizes key market trends and important solutions that we have identified through our research. Ultimately, this report is intended to educate readers about the key participants involved in the military/defense ecosystem and to critically analyze prominent vendors and solutions providers.
Militaries and defense organizations have extensive and unique communication and mobility needs, which require frequent upgrading to remain competitive against possible threats. Governments have traditionally spent large sums of money to develop cutting-edge technologies, and an enormous defense market is the result. However, over the past few years, commercial technology has rapidly evolved to a level deemed suitable by many governments as the performance gap between military specific technologies and the broader mobile market decreased. This level of adequacy has increased the acquisition of commercial off-the-shelf technology. Tablets and smartphones provide perhaps the most visible example, but even tactical radios have developed significantly with limited government-sponsored research and development. Moreover, commercially-built applications, processing equipment, and wireless networks have an integral role in many of the final devices and solutions employed by militaries. This trend, combined with shrinking military budgets in many western nations over the past few years, has had a notable impact on the process of acquiring defense technology.
Leveraging mobile devices and communication systems to engage in network-centric warfare, militaries have enhanced their ability to distribute and act on critical information. Taking advantage of these devices and systems in a military setting requires heightened security considerations, which, if not managed appropriately, could detract from their usability. As a result, achieving a balance between security and usability is imperative, albeit difficult. To date, investments in security have been substantial and the applications deployed have been successful in improving the effectiveness of ground soldiers. Nonetheless, room for improvement exists, with disjointed legacy systems proving a pain point for many defense organizations.
Soldiers are increasingly becoming personal area networks plugged into a greater network or apparatus that supplies the information critical to decision-making. Mobile devices facilitate communications among soldiers and provide information critical to winning individual battles. However, the data from troops and other sources must also be transferred up command structures to leaders for analysis so decisions crucial to winning the war can be made.