Download Ascent Look Out 2016+


  • Growth in exports is mitigating the impact of domestic cuts
  • Balancing squeezed budgets with information superiority
  • Leveraging the IT evolution, adapted to military environment
  • Moving from silos to an integrated forces approach
  • Terrorist activity increased by 80% in 2014
  • World military expenditure was estimated at $246 per person in 2014
  • Global electronics warfare market is expected to reach $24.25 billion by 2020
  • Global military robots market is projected to grow to $21.11 billion by 2020

Digital Journey

To stay one step ahead of today’s asymmetric threats, our armed forces and intelligence services need ready access to the latest advances in technology. Speed of development and deployment, along with ease of use, are critical success factors in the increasingly complex and fast-moving landscape.
Defeating today’s asymmetric threats demands cooperation between national organizations and allies, placing interoperability at the top of the agenda. New open and more integrated approaches that enable defense and industry organizations to work together effectively will stimulate innovation.
As information superiority becomes the defining metric, defense organizations must master the data and information flood flowing out from both operational and IT sources. The rapidly changing operational environment also demands higher levels of agility, adaptability and scalability.
To maintain strategic advantage, armed forces and intelligence agencies need to secure the entire information value chain. And as cyber space joins the classic realms of military operations, people, assets and infrastructure must be secured from threats across both physical and virtual worlds day and night.

Stéphane Janichewski

Head of Defense & Aerospace Market

Faced with squeezed budgets and a real need for turning information into strategic and tactical advantage, Armed Forces need to rely more and more on the power of IT technology evolution, provided it’s fully adapted to the specific military environment.

Technologies in the Digital Journey
Technology x y x (phone) y (phone) Impact Range Section Keys Description
App stores 88 33 84 55 Early Adoption 2017 Low experience As consumer market waterproof smartphones and tablets are encrypted and adapted for military use, private and audited app stores provide access to bespoke mobile applications.
3D printing 61 45 64 60 Adolescent 2018 Medium excellence Back at base in combat scenarios, the vast engineers’ store rooms that were once full from floor to ceiling with parts of all different shapes and sizes are virtually nowhere to be seen. Modern 3D printing technology has virtually wiped them out. When an engineer is assigned to a job, any parts needed are created there and then.
5G networks 37 40 60 35 Emerging 2019+ High experience,excellence Tactical information systems deliver real superiority in combat. People and ‘things’ are better connected and better informed than ever before. Whether man or machine, they can access online resources, communicate and share their insight wherever and whenever they need to. Today’s easy-to-deploy standalone LTE networks may be superseded by low power, extended range 5G networks in the future.
Advanced data visualization 79 23 77 40 Early Adoption 2017 Medium experience Combined with advanced data analytics, immersive 3D visualization technologies bring clarity to underlying complexity. They allow defense organizations to identify underlying structures and otherwise hidden meanings across increasingly diverse and apparently disparate data sources, amplifying intelligence, surveillance and recognition systems.
Augmented reality 90 13 77 40 Mainstream 2016 Medium experience Out in the battlefield augmented reality improves situational awareness within the field of view. In operations it supports tele-maintenance and tele-operations, enabling engineers to access vital information hands-free through modern wearable devices, improving productivity and safety.
Autonomous vehicles 83 10 50 40 Mainstream 2016 High business,excellence,trust Advanced security robots and unmanned aerial vehicles (UAVs) are increasingly supporting surveillance, protection, detection, rescue from objects, infrastructure destruction and people violation activities.
Security robots undertake dangerous actions without jeopardizing military forces and act in areas that are either extremely difficult or impossible for humans to access autonomous they can self-organize and reach certain level of independent decision making.
computer interface
52 56 68 55 Emerging 2019+ Medium experience Novel brain-computer interfaces promise not only to revolutionize prosthesis for those injured on the battlefield, they offer an opportunity to accelerate learning, enable faster and better neural communications in hostile environments, improve analysis of imagery for detecting potential threats and more.
Cloud Service Integration 66 39 70 45 Adolescent 2018 Medium excellence As cyber space joins the increasingly diverse mission spectrum, the identities of people and things within the IoT are managed through electronic identification (e-ID) technologies. Cloud-based federated identity services simplify the extension of identity and access management across new IoT-based services. In the future trusted information brokers will act as the central verification service to avoid the need for individual registration and authentication of each service.
DevOps 87 20 67 67 Early Adoption 2016 Medium excellence The Agile development methodology accelerates development by presenting early mock-ups, allowing military personnel to express their needs and desires early in the design process. To accelerate deployment, defense organizations are adopting a DevOps approach to development. It reduces time-to-market and cost while improving quality by enhancing collaboration between software developers and IT operations.
Distributed analytics 70 33 62 70 Adolescent 2017 Medium business,excellence New research programs around distributed analytics will address future coalition operations in the congested, cluttered, contested, connected and constrained battlefield.
Edge computing 75 31 66 43 Adolescent 2017 Medium excellence Information gathering and analysis at the edge and enabled by edge computing will allow restrictive and valuable bandwidth to be conserved as only immediately pertinent information will need to be transmitted centrally.
High-performance computing 73 13 72 23 Early Adoption 2017 High business,excellence,trust Growing volumes of data are being turned into critical military intelligence – Military Intelligence 4.0. With the volumes, variety and velocity of data accelerating, high-performance computing (HPC) ensures military personnel can run the complex simulations and analyses that deliver vital intelligence. By combining HPC computation infrastructures, networks and the last mathematical models they can predict behaviors, prevent cyber or terrorist attacks and more.
Hybrid clouds 92 26 89 26 Mainstream 2017 Low experience Cloud computing is helping defense organizations ensure data is accessible whenever and wherever it’s needed, improving mobility and flexibility. Sensitive data, such as the position of peers and foes, is stored in private clouds. Hybrid clouds allow combat personnel to enhance sensitive insights with publicly available data such as maps or weather forecasts.
Industry 4.0
60 5 50 10 Early Adoption 2017 Transformational excellence By promoting Internet of Things (IoT), Industry 4.0 technologies are enabling the liquid operational intelligence and control called for in today’s continually evolving theatre of war and terrorism. Connected objects and vehicles integrated to the heart of the action zone ease information collection and processing directly in the field.
Innovation value webs 72 50 76 47 Early Adoption 2018 Medium business With collaboration within a wider ecosystem of peers and partners key in the fight against an enemy without borders, innovation value webs are empowering network centric warfare and intelligence. Value webs ensure processes are supported along their entire paths, with dynamic and both synchronous and asynchronous participation all supported. In addition these webs are able to process diverse and unpredictable metadata formats.
of Things
65 9 63 12 Early Adoption 2017 Transformational experience,business By promoting Internet of Things (IoT), Industry 4.0 technologies are enabling the liquid operational intelligence and control called for in today’s continually evolving theatre of war and terrorism. Connected objects and vehicles integrated to the heart of the action zone ease information collection and processing directly in the field.
Sensors and geo-location technologies embedded in mobile devices and smart vehicles continually transmit intelligence to a central control center. Any individual or vehicle needing assistance can be found easily, their status understood in advance of reaching them.
Machine learning 64 21 42 50 Adolescent 2017 High business,excellence Behind military robots lies a complex set of automated processes, with no room for error. The wrong information or the wrong outcome of an analysis may lead to automated responses with real life consequences. Machine learning will play a key role in that decision-making.
57 42 56 57 Adolescent 2018 Medium excellence Operations research falls under the category of prescriptive analytics. Its first application was in planning and managing organizational operations during World War II when human and material resources were scarce and managing war logistics was a daunting task.
Quantum computing 22 10 50 16 Emerging 2019+ Transformational trust With communication security critical on the battle field, quantum computing promises to deliver new levels of protection. What’s more, quantum computers threaten to break today’s encryption methods. Their substantial increase in computing power could be a game-changer in intelligence, surveillance and reconnaissance.
Robots 92 5 84 13 Mainstream 2016 High business,excellence Security robots undertake dangerous actions without jeopardizing military forces and act in areas that are either extremely difficult or impossible for humans to access. Autonomous, they can self-organize and reach certain level of independent decision making.
Self-adaptive security 43 26 41 42 Adolescent 2018 High trust Advanced Security Operations Centers (SOC) and Security Information and Event Management (SIEM) are integral to new security strategies. Organizations have deployed real-time controls in a proactive security approach that is helping to prevent cyberattacks. Trusted probes are being deployed within secure environments to look for evidence of specific suspicious behaviors. These pre-emptive security technologies help agencies anticipate threats. Behind the scenes streaming analytics and HPC analyze millions of events in real time.
Self-adaptive security approaches that can, for instance, automatically adapt to a fast-changing context would heighten security in self-organizing ad-hoc and sensor networks.
Meanwhile distributed analytics in combination with HPC supports vital forensic analysis after an incident is detected. They help organizations quickly identify where the attack started, who is behind it and how it was carried out.
Semantic technologies 77 37 69 73 Adolescent 2017 Medium excellence In defense, semantic technologies help organizations unleash the hidden value of data, develop shared common databases and simplify the management of military intelligence reference data. They help intelligence systems to understand the relationships within and across data.
Social media analytics 81 11 40 38 Mainstream 2016 High experience,business Defense organizations are employing social media analytics to gain additional insight into how situations are developing. This will also provide Open Source Intelligence (OSINT) to complement established methods already in place. OSINT enhances situational awareness. In a non-combatant evacuation operation it can provide valuable insight for those preparing to deploy or who have deployed, for example.
Software-defined technologies 85 8 60 29 Mainstream 2016 High trust Build over the wire and software defined techniques improve deployment speed and safety. Software-defined networking (SDN), for example, provides the agile network that helps forces communicate, train and operate together better. Military personnel can create dynamic links between locations and dynamically apply appropriate quality-of-service and bandwidth allocation to those links.
Streaming analytics 68 20 54 38 Early Adoption 2017 High business,excellence The vast volumes of data available today coupled with today’s advanced analytics allows the military to move from a reactive to a proactive position by enabling real-time situational awareness and rapid decision-making. Streaming analytics, for example, allow organizations to extract intelligence that can be detected and acted on at a moment’s notice from data in motion. In addition, streaming analytics can be used to analyze geo-location information in real time to provide a comprehensive, up-to-the-minute view on the location of all mobile assets.
Swarm computing 50 30 49 42 Adolescent 2018 High business,excellence Part of the wider IoT, sensors, robots and other devices together make up the intelligent dust that can detect light, temperature, vibration, magnetism, chemicals and more. Operating wirelessly within a network it provides invaluable data.
Wearable computing 88.5 7 72 21 Mainstream 2016 High experience,business On the battlefield, wearables connect military personnel with their peers and operational headquarters. Electronics and sensors that can be worn or placed in uniforms provide real-time monitoring of their location, vital signs and the environment around them.

Radar View