Lockheed Martin- Experts & Thought Leaders
Latest Lockheed Martin news & announcements
Technology company Insta and the Finnish Defence Forces have agreed on the three-year acquisition package related to Finland's F-35 fighter program. The acquisition is based on the strategic partnership agreement between the Finnish Defence Forces and Insta and covers the years 2024–2026. The acquisition covers, among other things, building maintenance and service capabilities for the avionics of the Finnish Air Force’s Lockheed Martin F-35 Lightning II multi-role fighters, i.e., the plane’s electronic systems, as well as related support services. The F-35 fighters will be put into service from 2026 onwards. Partnership with the Finnish Defence Forces This agreement ensures in part that Finland has the necessary competences and the ability to maintain the F-35 systems and security of supply for decades to come. The systems in the F-35 fighter jet require special expertise and a broad understanding of technology. Long-term cooperation, a strategic partnership with the Finnish Defence Forces, and earlier fighter purchases have resulted in Insta accumulating strong technology and business area expertise that can support the security of supply of the Finnish Defence Forces’ critical systems, even during emergencies. The systems in the F-35 fighter jet require special expertise and a broad understanding of technology "So far, Insta has been responsible for the maintenance of the avionics systems on the Hornet fighter jets. Building capability for maintaining the F-35’s avionics systems allows for us to establish a strong continuum of competence regarding critical systems and technology and, with the introduction of new technology, also provides new types of opportunities for further developing competence," says Ville Kettula, Insta’s VP for the aviation business. A shared situational awareness is decisive With Finland’s accession into NATO, defence systems are being increasingly cross-border connected, the amount of data is growing, and the technology is advancing at a record pace. Being able to leverage this data for leadership and the forming of a situational picture will be decisive in terms of warfare. The F-35 stealth fighters, which Finland will start receiving in 2026, are known as the world’s most modern and versatile fighter jets. They are also flying data links that continuously gather a situational awareness of their environment and compare it to threats. The planes share data among themselves and with the ground forces, thereby enabling them to be used for surveillance and reconnaissance duties as well. Advancement of technology and equipment The piled data is simultaneously relayed to all plans that have joined the data link The advanced sensor technology allows for detecting the own aircrafts, vehicles, ships, and troops as well as those of the enemy and unknown units. The stealth capabilities of this fifth-generation fighter enable it to see further than the distance required for its detection. The gathered information is simultaneously relayed to all systems that have joined the data link. "The advancement of technology and equipment at record pace will also emphasise the significance of preventive maintenance and repair, not to mention cyber security. In addition to maintaining the aircraft’s avionics systems, Insta will also be responsible for integrating the new fighter’s systems with the Finnish command & control systems together with the Finnish Defence Forces," Kettula explains. Research and product development In addition to maintenance activities, Insta has engaged in continuous research and product development work in order to improve the operational reliability, flight safety, and performance of the fighters. Finland will receive a total of 64 F-35 fighters. The aircraft has an estimated service life of 30 years, which means that there will be work to be done well into the future. NATO offers new international opportunities for Insta Insta’s AirC2 product family contains solutions for the integrated command of air defence As a provider of maintenance for the F-35 fighter fleet’s avionics, Insta is part of Lockheed Martin’s global maintenance network and, a contracting partner to the aircraft manufacturer. "We have the opportunity to provide maintenance and repair services for avionics systems on F-35 fighters even outside of Finland. The potential market is extensive since several NATO countries have chosen F-35 fighters," says Petri Reiman, Senior Vice President for Insta Advance. In addition to avionics, Insta’s Defence business focuses on command & control systems, simulators, cyber security, and system integrations for connected defence. Insta’s AirC2 product family, for example, contains solutions for the integrated command of air defence in terms of both anti-aircraft and fighter defence. Agreement with NCIA "Insta’s solutions are state of the art in terms of the level of integration and the capability in terms of different systems and service branches. NATO is strongly emphasising multi-domain thinking, where such integration is a key factor; this makes our solutions interesting to others," Reiman explains. In March of this year, Insta signed a collaboration agreement with the NATO Communications and Information Agency (NCIA). The agreement enables Insta to offer the NCI Agency, for NATO’s own needs or for use in other NATO countries, commercial off-the-shelf products (COTS) and services, such as situational picture systems, command & control systems and cyber security services, data encryption and gateway solutions as well as software services. Already in 2023, Insta and Lockheed Martin signed a collaboration agreement on the development of the next-generation data relay and filtering solution. The signed agreement was the first project related to the indirect industrial cooperation of Finland’s F-35 fighter project.
Under the patronage of His Excellency President Abdel Fattah El-Sisi, President of Egypt’s Arab Republic and Supreme Commander of the Armed Forces, Egypt is set to host the 3rd edition of Egypt Defence Expo (EDEX), taking place from 4 to 7 December 2023, at Egypt International Exhibition Centre. The exhibition will showcase the latest military technology, equipment, and systems across land, sea, and air through more than 400 exhibitors from 46 countries. Event attendees The event will welcome a number of officials and military delegations who have confirmed their attendance to witness the latest defence technology and systems while enabling them to exchange ideas and build invaluable relationships between key players in the industry. EDEX 2023 will include 22 country pavilions from Armenia, Bosnia and Herzegovina, Brazil, Bulgaria, China, Czech Republic, Egypt, France, Germany, Greece, India, Italy, Kazakhstan, Pakistan, Romania, Saudi Arabia, Serbia, Slovakia, South Korea, Ukraine, United Arab Emirates, United States of America. Defence and security event The exhibition provides a unique opportunity for visitors to witness the latest technology Organised by Arabian Word Events (AWE), the pioneering organiser of award-winning international events, and in cooperation with the Ministry of Defence, the Ministry of Military Production, and the Arab Organisation for Industrialisation, EDEX is the only defence and security event that covers Africa and the Middle East and the largest in Africa. The exhibition provides a unique opportunity for visitors to witness the latest technology, equipment, defence systems, and military products in addition to the Egyptian Pavilion where attendees can view the cutting-edge present and future capabilities of the Ministry of Military Production. High-level military delegations from more than 100 countries have been invited, and 35,000 visitors are expected to attend the exhibition over four days. EDEX EDEX is set to feature an impressive lineup of renowned companies covering all aspects of defence and security, such as land vehicles, air defence, coastal defence, shipbuilders, maintenance and repair, cyber security, missile systems, unmanned and autonomous systems, parachuting and airdrop, satellite communication, search and rescue, surveillance systems, tactical equipment, training and simulation equipment, and much more. Don't miss the chance to explore cutting-edge innovations across these crucial sectors at the event. Industry sponsors EDEX has secured high-level industry sponsors including a handful of the world's most reputable military equipment manufacturers namely; Amstone, Dassault Aviation, Hanwha, MBDA, ALIT, Lockheed Martin, Naval Group, Northrop Grumman, Boeing, Esri, NAS and Leonardo DRS. Over its past editions, the event gained growing momentum with the participation of nearly 400 exhibitors from 42 countries in 2021, a notable increase from 376 exhibitors from 41 countries in 2018. Also, EDEX 2021 saw the attendance of 78 official VIP delegations from 54 countries, and more than 30,000 visitors.
Finnish high-technology company Insta and Lockheed Martin Corporation have signed a cooperation agreement for developing next-generation security and gateway solutions. This is the first agreement under indirect industrial cooperation in the Finland acquisition of the 5th Generation F-35. During the project, Insta and Lockheed Martin will develop together a Cross Domain Solution, a bi-directional next-generation network security & gateway solution for demanding military use that enables cooperation in various security-level networks. Network security and data encryption solutions Insta has long experience in developing demanding data filtering and data encryption solutions Insta, which is focussed on smart technology and cyber security, has long experience in developing demanding data filtering, network security and data encryption solutions. With this cooperation, the solution is further developed for future data filtering needs. “The cooperation enables us to expand our comprehensive and versatile product family of network security and data encryption solutions. This kind of gateway solution is needed in multi-domain operations. Command and control systems heavily rely on tactical communication capability to coordinate and execute operations effectively and our solutions address both Cyber and Operational security aspects,” tells Petri Reiman, Senior Vice President from Insta. Technological capabilities of both companies By combining the expertise and technological capabilities of both companies the goal of the two-year project is to develop a product that can also be offered to the international market. Insta is a strategic partner of the Finnish Defence Forces and one of Finland’s key partners for cyber security, offering a wide range of services from consultancy to cyber-attack prevention and from network security to secure digital device identity, and has operated in the defence market for more than 50 years. Deliver superior performance to customers through command-and-control solutions, secure communication solutions, and life-cycle services in avionics. Services and products are trusted by corporations and public sector organisations in Finland and abroad.
Insights & Opinions from thought leaders at Lockheed Martin
Back in the 1960s a lead engineer working in conjunction with the United States Navy for Lockheed’s Skunk Works team coined the acronym KISS, which translated to the design principle ‘keep it simple stupid’. The KISS principle embraces the concept of simplicity, stating that most systems work best if they are kept simple rather than geared up to be more complicated. When it comes to physical security systems, this concept can also play a key element in its overall success. Secure work environments For years the tug of war in the security industry has pitted the need for a secure environment against the desire for technology that is convenient for users. However, finding a happy medium between the two has often seemed elusive. I believe you can design and have operational convenience at the same time as achieving high security" Jeff Spivey, a security consultant and the CEO of Security Risk Management, has this to say about it, “If there is an understanding of the security-related risks and their separate and/or collective impact on the organisation’s bottom line business goals, a resolution can be reached.” Jeff also does not think that convenience and high security have to be opposing each other. He says, “I believe you can design and have operational convenience at the same time as achieving high security.” Importance of secure access control The premise is that for organisations and spaces to be truly secure, they must be difficult to access. So, by its very nature, access control is designed to be restrictive, allowing only authorised staff and visitors to access a facility or other secured areas inside. This immediately puts convenience at odds with security. Most people will tolerate the restrictive nature of a controlled entrance using badge, card or biometric because they understand the need for security. When that technology gets in the way of staff traversing freely throughout the facility during the course of a business day, or hindering potential visitors or vendors from a positive experience entering the building, they become less tolerant, which often leads to negative feedback to the security staff. Enhancing corporate security Security consultants like Spivey and security directors all stress that understanding the threats and risk levels of an organisation will most likely dictate its physical security infrastructure and approach. All the technology in the world is useless if it is not embraced by those who are expected to use it and it doesn’t fit the culture of the organisation. Once employees and customers are educated about what security really is, they understand that they're not losing convenience, they're gaining freedom to move safely from point A to point B. Converged data and information shape new access options Migration of physical access control systems to a more network-centric platform is a game-changer for security technologies The migration of physical access control systems to a more network-centric platform has been a game-changer for emerging security technology options. The expansion of the Internet of Things (IoT), Near-Field Communication devices powered by Bluetooth technology, and the explosion of converged information systems and identity management tools that are now driving access control are making it easier than ever before for employees and visitors to apply for clearance, permissions and credentials. Wireless and proximity readers Advancements in high-performance wireless and proximity readers have enhanced the user’s access experience when presenting credentials at an entry and expediting movement throughout a facility. A user is now able to access a secured office from street-level without ever touching a key or card. Using a Bluetooth-enabled smartphone or triggering a facial recognition technology, they enter the building through a security revolving door or turnstile. A total building automation approach adds extra convenience, as well as seamless security, when access technology is integrated into other systems like elevator controls. A total building automation approach adds extra convenience and seamless security How to Meet Security Concerns at the Entry While security managers are charged with providing their facilities the maximum level of security possible, there is always the human element to consider. But does the effort to make people comfortable with their security system ecosystem come at a cost? Does all this convenience and the drive to deliver a positive security experience reduce an organisation’s overall levels of security? And if so, how can we continue to deliver the same positive experience including speed of entry – while improving risk mitigation and threat prevention? Door entrances, barriers Users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through Let’s examine some of the various types of entrances being used at most facilities and the security properties of each. With some entrance types, there is the possibility for security to fall short of its intended goals in a way that can’t be addressed by access control technology alone. In particular, with many types of doors and barriers, tailgating is possible: users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through. To address this, many organisations hire security officers to supervise the entry. While this can help to reduce tailgating, it has been demonstrated that officers are not immune to social engineering and can often be “talked into” letting an unauthorised person into a facility. Deploying video cameras, sensors Some organisations have deployed video surveillance cameras or sensors to help identify tailgaters after the fact or a door left open for longer than rules allow. This approach is not uncommon where facilities have attempted to optimise throughput and maintain a positive experience for staff and visitors. Security staff monitoring the video feeds can alert management so that action can be taken – but this is at best a reactive solution. It does not keep the unauthorised persons from entering, and so is not a totally secure solution. Optical turnstiles, speedgates Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself. Not all security entrances work the same way. And, there will always be a balance between security and convenience – the more secure the entry, the less convenient it is for your personnel and visitors to enter your facility. For example, it takes more time to provide 2-factor authentication and enter through a mantrap portal than to provide only one credential and enter through an optical turnstile or speedgate. Perimeter protection So, it is an important first step to determine what is right at every entrance point within and around the perimeter. Remember that convenience does not equate to throughput. Convenience is the ease and speed of entry experienced by each individual crossing that threshold, while throughput relates to the speed at which many individuals can gain access to the facility. A more convenient entry makes a better first impression on visitors and is good for overall employee morale. Throughput is more functional; employees need to get logged in to begin their workday (and often to clock in to get paid), and they quickly become frustrated and dissatisfied when waiting in a long line to enter or exit the premises. Considering form and function when designing a security entrance can ensure that those requiring both high-security and convenience are appeased.
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadHoneywell GARD USB threat report 2024
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
Download