CONTENT PREVIEW
C4iSR: Joint & Common Equipment

Cyber domain growth on show at Eurosatory

28 June 2018
Cyber has grown as a business focus for a number of companies, including IAI, which recently established a separate cyber division in its Elta subsidiary. Above, an illustration of the company’s work in the area. Source: IAI

The cyber domain had a significant presence at the 2018 Eurosatory exhibition in Paris, highlighting its rapid growth as an industry focus over the past few years.

There were 75 exhibitors at the event with activities in the sector, according to the show’s organisers, while 15% of official delegations were interested in the sector.

Thales, for instance, demonstrated a range of cyber-focused technologies and services. The company’s systems ‘are spread across all Thales products and solutions’, said Sylvain Barbier, cybersecurity product line manager – critical information systems and cybersecurity, in a presentation.

Barbier drew particular attention to the Thales Cyber Expertise for Leading Security family, or Cybels, which is designed to offer training, boost protection, and enhance decision making across the cyber domain. Barbier pointed to the Cybels Range cybersecurity training solution, a simulation training platform designed to support training, testing, and research and development needs.

Cybels Range virtualises an organisation’s environment, including some hardware components, with the aim of training personnel. According to Thales, “the use of [an] organisation’s own security components makes the training even more realistic and the people ready for their job”. Cybels Range is linked into Thales’ Cyber Threat Intelligence platform, in order to be updated with the latest threats as they emerge.

Barbier also provided an overview of the company’s Cybels Sentinel, a tactical cybersecurity operations centre designed for use on the battlefield. This is a situational awareness and incident response solution, according to the company, which can be deployed on any military information system, and combines a range of cyber technologies to neutralise threats and a firewall to block all known attacks. This “could be used by decision makers, but also by soldiers in the field,” Barbier said.

Want to read more? For analysis on this article and access to all our insight content, please enquire about our subscription options at ihs.com/contact





(309 of 839 words)
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT