Notice: Trying to get property 'post_parent' of non-object in /home/defensea/english.defensearabia.com/wp-includes/link-template.php on line 479
Notice: Trying to get property 'post_name' of non-object in /home/defensea/english.defensearabia.com/wp-includes/link-template.php on line 517
Notice: Trying to get property 'ID' of non-object in /home/defensea/english.defensearabia.com/wp-includes/link-template.php on line 534
Notice: Trying to get property 'post_excerpt' of non-object in /home/defensea/english.defensearabia.com/wp-content/themes/mh-magazine/includes/mh-custom-functions.php on line 392
Using a specialized mission support system, Lockheed Martin and Guardtime demonstrated a pre-packaged technology that mitigates data manipulation attempts by internal and external threats to a networked mission centric environment.
The two companies are evaluating solutions that fundamentally address data manipulation and data integrity challenges that arise in military, aerospace and industrial systems increasingly dependent on complex processes, software supply chains, interconnectivity and storage platforms. The demonstration, conducted at Lockheed Martin’s Center for Innovation, represented the first known test specifically designed to address the threat of data manipulation in a networked mission centric environment.
“Network, software and data integrity are critical qualities for our products and our customers, and the cyber security solutions we’ve worked on with Guardtime combine the strengths of anti-tamper technology and information assurance," said Ron Bessire, Lockheed Martin Aeronautics’ vice president for Engineering and Technical Operations. "This new technology offers great opportunity for enterprise and embedded mission systems alike.”
“Guardtime and Lockheed Martin share a common vision where data integrity is the cornerstone of effective mission operations," said David Hamilton, president of Guardtime Federal. "If we can guarantee the integrity of systems, networks and data at the hardware and software level then we can replace uncertainty with confidence in the data and execution processes that enables both enterprise and combat systems, absent of compromise."
Be the first to comment