Cover Image


Cutting Through the Fog of War: Mobile Solutions in the Military

出版商 VDC Research Group, Inc. 商品編碼 350694
出版日期 內容資訊 英文 35 Pages; 7 Exhibits
商品交期: 最快1-2個工作天內
Back to Top
軍事部門用行動解決方案:突破「戰場之霧」 Cutting Through the Fog of War: Mobile Solutions in the Military
出版日期: 2016年01月26日 內容資訊: 英文 35 Pages; 7 Exhibits



  • 主要調查結果


  • 產業重組
  • 急劇的技術變化
  • 資料驅動型的連接營運


  • 政府部門的行動利用
  • 安全
  • 安全 vs 功能性
  • 硬體設備、軟體支出預測


  • 行動裝置
  • 軍用無線電
  • 平板電腦、筆記型電腦、智慧型手機
  • 各種應用
  • 指揮控制
  • 情境察覺
  • 邊緣運算/週邊資料
  • 5年預測



  • 各種契約分析
  • CHS-4 (Common Hardware Systems-4)
  • GTACS (Global Tactical Advanced Communication Systems)
  • CTS (Communication Transmission Systems)
  • S3 (Strategic Services Sourcing)
  • Alliant
  • NETCENTS-2 (Network-Centric Solutions-2)
  • CANES (Consolidated Afloat Networks and Enterprise Services)

關於VDC Research


The military and defense sector has significant demand for mobile devices and solutions given the emphasis placed on reliable communications, information reconnaissance and sharing. The need for devices at the vanguard of technology to remain competitive has resulted in militaries acquiring commercial off-the-shelf (COTS) products that have short life cycles and constantly improving technology. However, COTS devices often fail to address the unique security and environmental needs of militaries, thus complicating the acquisition process and increasing procurement costs. Employed in the offices of defense organizations and on the battlefield, governments utilize mobile devices to improve employee and soldier effectiveness by providing access to information essentially from anywhere and at anytime. Moreover, despite enhanced security requirements, defense organizations have developed large application ecosystems to support business processes and improve worker productivity. The defense space is frequently evolving and demand depends largely on domestic and international socioeconomic and political factors.

What questions are addressed?

  • What mobile devices are used in the military/defense market today?
  • What types of mobile applications and software are used by militaries and defense organizations, and how are they used?
  • What is the market size and growth rate for military/defense mobile applications and hardware?
  • How do mobile technology opportunities differ by region?
  • What level of mobile security is required by military organizations and how do you achieve this level of security?
  • What is the rugged proposition for militaries?

Who should read this report?

Anyone participating directly or indirectly in the development, marketing, or distribution of solutions for defense-related deployment environments is a suitable audience. This report summarizes key market trends and important solutions that we have identified through our research. Ultimately, this report is intended to educate readers about the key participants involved in the military/defense ecosystem and to critically analyze prominent vendors and solutions providers.

Executive Summary

Militaries and defense organizations have extensive and unique communication and mobility needs, which require frequent upgrading to remain competitive against possible threats. Governments have traditionally spent large sums of money to develop cutting-edge technologies, and an enormous defense market is the result. However, over the past few years, commercial technology has rapidly evolved to a level deemed suitable by many governments as the performance gap between military specific technologies and the broader mobile market decreased. This level of adequacy has increased the acquisition of commercial off-the-shelf technology. Tablets and smartphones provide perhaps the most visible example, but even tactical radios have developed significantly with limited government-sponsored research and development. Moreover, commercially-built applications, processing equipment, and wireless networks have an integral role in many of the final devices and solutions employed by militaries. This trend, combined with shrinking military budgets in many western nations over the past few years, has had a notable impact on the process of acquiring defense technology.

Leveraging mobile devices and communication systems to engage in network-centric warfare, militaries have enhanced their ability to distribute and act on critical information. Taking advantage of these devices and systems in a military setting requires heightened security considerations, which, if not managed appropriately, could detract from their usability. As a result, achieving a balance between security and usability is imperative, albeit difficult. To date, investments in security have been substantial and the applications deployed have been successful in improving the effectiveness of ground soldiers. Nonetheless, room for improvement exists, with disjointed legacy systems proving a pain point for many defense organizations.

Soldiers are increasingly becoming personal area networks plugged into a greater network or apparatus that supplies the information critical to decision-making. Mobile devices facilitate communications among soldiers and provide information critical to winning individual battles. However, the data from troops and other sources must also be transferred up command structures to leaders for analysis so decisions crucial to winning the war can be made.

Key Findings

  • The United States Department of Defense's acquisition strategy, emphasizing commercial off-the-shelf technology (COTS) and lowest price technologically acceptable (LPTA) procurement, has significant implications for the types of devices used by the armed services.
  • The demand for mobile devices and software is significant, with rugged mobile devices comprising a larger percentage of opportunities, but consumer devices growing at a quicker rate (13.4%).
  • Despite militaries investing heavily in services, many companies are taking a second look at their service portfolio as the Pentagon pursues an acquisition strategy based on price and not necessarily innovation.
  • Mobile device use on the battlefield can result in increased situational awareness by leveraging GIS data, SMS messaging, and accessing mobile applications.
  • Increased global tension and conflict is invigorating expenditures in the defense market. Cyber security and information technology is shaping up to be the next battlefield.
  • The penetrable nature of mobile devices requires a layered approach to security that does not compromise functionality, and often involves device management, encryption, and access management.

Table of Contents

Inside This Report

  • What questions are addressed?
  • Who should read this report?

Table of Contents

Executive Summary

  • Key Findings

Global Market Overview

  • Exhibit 1: Military Spending and Power by Region
  • Industry Consolidation
  • Rapid Technological Change
  • Data-Driven Connected Operations

Non-Field Mobility

  • Government Mobility Applications
  • Security
  • Exhibit 2: A Layered Approach to Mobile Security
  • Exhibit 3: OSWP's Top 10 Security Threats
  • Security vs. Functionality
  • Forecast of Hardware and Software Spend
  • Exhibit 4: Consumer Device Forecast
  • Exhibit 5: Enterprise Mobility Management Spend Forecast ($100,000 Dollars)

Field Mobility

  • Mobile Devices
  • Tactical Radios
  • Tablets, Notebooks, Smartphones
  • Applications
  • Command and Control
  • Situational Awareness
  • Edge Computing/Perishable Data
  • Five Year Forecast
  • Exhibit 6: Rugged Large Form Factor Forecast (Millions of Dollars)
  • Exhibit 7: Rugged Small Form Factor Forecast (Millions of Dollars)

Competitive Landscape

Contract Vehicles

  • Contract Insights
  • Common Hardware Systems-4 (CHS-4)
  • Global Tactical Advanced Communication Systems (GTACS)
  • Communication Transmission Systems (CTS)
  • Strategic Services Sourcing (S3)
  • Alliant
  • Network-Centric Solutions-2 (NETCENTS-2)
  • Consolidated Afloat Networks and Enterprise Services (CANES)

VDC Research

  • About the Author
  • About VDC Research
Back to Top