Core data center functionality is moving to the field as part of battlefield multi-domain transformation. It is becoming commonplace for command posts, mobile command centers, and even mobile platforms: vehicles, ships, and planes to contain micro data centers that provide new capabilities and services at the cyber-edge to the warfighter. What still needs to be addressed is how to effectively transition existing core cyber security controls so that data is protected in the field when faced with conditions such as:

  • Harsh environments
  • Bandwidth-limited and disconnected environment
  • Supply Chain Security
  • Overrun or hostile scenarios
  • SWaP Constraints

This session will discuss how core cyber security controls can be transitioned to the tactical field in order to safely provide highly sensitive data for command and warfighters at the cyber-edge.

Download Now