株式会社グローバルインフォメーション
TEL: 044-952-0102
表紙
市場調査レポート

軍事部門向けモバイルソリューション:「戦場の霧」の突破

Cutting Through the Fog of War: Mobile Solutions in the Military

発行 VDC Research Group, Inc. 商品コード 350694
出版日 ページ情報 英文 35 Pages; 7 Exhibits
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1USD=115.27円で換算しております。
Back to Top
軍事部門向けモバイルソリューション:「戦場の霧」の突破 Cutting Through the Fog of War: Mobile Solutions in the Military
出版日: 2016年01月26日 ページ情報: 英文 35 Pages; 7 Exhibits
概要

当レポートでは、軍事・防衛部門向けモバイルデバイス&ソリューションの市場について調査し、軍事・防衛部門で利用されているデバイス、アプリケーション、ソフトウェアの種類と概要、ハードウェア・ソフトウェアの市場規模の推移と予測、競合環境、モバイル技術の市場機会、軍事組織に必要とされるセキュリティレベルとその充足手段などをまとめています。

エグゼクティブサマリー

  • 主要調査結果

世界市場の概要

  • 産業再編
  • 急激な技術の変化
  • データ駆動型の接続オペレーション

非戦場用モビリティ

  • 政府部門におけるモビリティ利用
  • セキュリティ
  • セキュリティ vs 機能性
  • ハードウェア・ソフトウェア支出予測

戦場用モビリティ

  • モバイルデバイス
  • 戦術無線
  • タブレット・ノートブック・スマートフォン
  • 各種アプリケーション
  • 指揮統制
  • 状況認識
  • エッジコンピューティング/周辺データ
  • 5カ年予測

競合環境

契約状況

  • 各種契約の分析
  • CHS-4 (Common Hardware Systems-4)
  • GTACS (Global Tactical Advanced Communication Systems)
  • CTS (Communication Transmission Systems)
  • S3 (Strategic Services Sourcing)
  • Alliant
  • NETCENTS-2 (Network-Centric Solutions-2)
  • CANES (Consolidated Afloat Networks and Enterprise Services)

VDC Researchについて

目次

The military and defense sector has significant demand for mobile devices and solutions given the emphasis placed on reliable communications, information reconnaissance and sharing. The need for devices at the vanguard of technology to remain competitive has resulted in militaries acquiring commercial off-the-shelf (COTS) products that have short life cycles and constantly improving technology. However, COTS devices often fail to address the unique security and environmental needs of militaries, thus complicating the acquisition process and increasing procurement costs. Employed in the offices of defense organizations and on the battlefield, governments utilize mobile devices to improve employee and soldier effectiveness by providing access to information essentially from anywhere and at anytime. Moreover, despite enhanced security requirements, defense organizations have developed large application ecosystems to support business processes and improve worker productivity. The defense space is frequently evolving and demand depends largely on domestic and international socioeconomic and political factors.

What questions are addressed?

  • What mobile devices are used in the military/defense market today?
  • What types of mobile applications and software are used by militaries and defense organizations, and how are they used?
  • What is the market size and growth rate for military/defense mobile applications and hardware?
  • How do mobile technology opportunities differ by region?
  • What level of mobile security is required by military organizations and how do you achieve this level of security?
  • What is the rugged proposition for militaries?

Who should read this report?

Anyone participating directly or indirectly in the development, marketing, or distribution of solutions for defense-related deployment environments is a suitable audience. This report summarizes key market trends and important solutions that we have identified through our research. Ultimately, this report is intended to educate readers about the key participants involved in the military/defense ecosystem and to critically analyze prominent vendors and solutions providers.

Executive Summary

Militaries and defense organizations have extensive and unique communication and mobility needs, which require frequent upgrading to remain competitive against possible threats. Governments have traditionally spent large sums of money to develop cutting-edge technologies, and an enormous defense market is the result. However, over the past few years, commercial technology has rapidly evolved to a level deemed suitable by many governments as the performance gap between military specific technologies and the broader mobile market decreased. This level of adequacy has increased the acquisition of commercial off-the-shelf technology. Tablets and smartphones provide perhaps the most visible example, but even tactical radios have developed significantly with limited government-sponsored research and development. Moreover, commercially-built applications, processing equipment, and wireless networks have an integral role in many of the final devices and solutions employed by militaries. This trend, combined with shrinking military budgets in many western nations over the past few years, has had a notable impact on the process of acquiring defense technology.

Leveraging mobile devices and communication systems to engage in network-centric warfare, militaries have enhanced their ability to distribute and act on critical information. Taking advantage of these devices and systems in a military setting requires heightened security considerations, which, if not managed appropriately, could detract from their usability. As a result, achieving a balance between security and usability is imperative, albeit difficult. To date, investments in security have been substantial and the applications deployed have been successful in improving the effectiveness of ground soldiers. Nonetheless, room for improvement exists, with disjointed legacy systems proving a pain point for many defense organizations.

Soldiers are increasingly becoming personal area networks plugged into a greater network or apparatus that supplies the information critical to decision-making. Mobile devices facilitate communications among soldiers and provide information critical to winning individual battles. However, the data from troops and other sources must also be transferred up command structures to leaders for analysis so decisions crucial to winning the war can be made.

Key Findings

  • The United States Department of Defense's acquisition strategy, emphasizing commercial off-the-shelf technology (COTS) and lowest price technologically acceptable (LPTA) procurement, has significant implications for the types of devices used by the armed services.
  • The demand for mobile devices and software is significant, with rugged mobile devices comprising a larger percentage of opportunities, but consumer devices growing at a quicker rate (13.4%).
  • Despite militaries investing heavily in services, many companies are taking a second look at their service portfolio as the Pentagon pursues an acquisition strategy based on price and not necessarily innovation.
  • Mobile device use on the battlefield can result in increased situational awareness by leveraging GIS data, SMS messaging, and accessing mobile applications.
  • Increased global tension and conflict is invigorating expenditures in the defense market. Cyber security and information technology is shaping up to be the next battlefield.
  • The penetrable nature of mobile devices requires a layered approach to security that does not compromise functionality, and often involves device management, encryption, and access management.

Table of Contents

Inside This Report

  • What questions are addressed?
  • Who should read this report?

Table of Contents

Executive Summary

  • Key Findings

Global Market Overview

  • Exhibit 1: Military Spending and Power by Region
  • Industry Consolidation
  • Rapid Technological Change
  • Data-Driven Connected Operations

Non-Field Mobility

  • Government Mobility Applications
  • Security
  • Exhibit 2: A Layered Approach to Mobile Security
  • Exhibit 3: OSWP's Top 10 Security Threats
  • Security vs. Functionality
  • Forecast of Hardware and Software Spend
  • Exhibit 4: Consumer Device Forecast
  • Exhibit 5: Enterprise Mobility Management Spend Forecast ($100,000 Dollars)

Field Mobility

  • Mobile Devices
  • Tactical Radios
  • Tablets, Notebooks, Smartphones
  • Applications
  • Command and Control
  • Situational Awareness
  • Edge Computing/Perishable Data
  • Five Year Forecast
  • Exhibit 6: Rugged Large Form Factor Forecast (Millions of Dollars)
  • Exhibit 7: Rugged Small Form Factor Forecast (Millions of Dollars)

Competitive Landscape

Contract Vehicles

  • Contract Insights
  • Common Hardware Systems-4 (CHS-4)
  • Global Tactical Advanced Communication Systems (GTACS)
  • Communication Transmission Systems (CTS)
  • Strategic Services Sourcing (S3)
  • Alliant
  • Network-Centric Solutions-2 (NETCENTS-2)
  • Consolidated Afloat Networks and Enterprise Services (CANES)

VDC Research

  • About the Author
  • About VDC Research
Back to Top