Paris. 11 June 2018. Thales has launched the first comprehensive private cloud infrastructure solution to improve the operational efficiency of the armed forces. With Nexium Defence Cloud, Thales is at the heart of the digital transformation of its customers and adapting to the specific needs of armed forces operating in constrained environments with stringent security requirements.
Thales offers users private access to data in the constrained environment of military infrastructure networks, from central command to forces deployed in theatres of operation. This new solution benefits from Thales’s cybersecurity expertise. At Eurosatory 2018, Thales is launching the first comprehensive private cloud infrastructure solution to improve the operational efficiency of the armed forces. With Nexium Defence Cloud, Thales is at the heart of the digital transformation of its customers and adapting to the specific needs of armed forces operating in constrained environments with stringent security requirements. In recent years, cloud services have changed the day-to-day lives of businesses and individuals, driving the development of a whole range of applications to address new use cases. Organisations with a real need to share content can now remain connected at all times from any type of terminal or device.
The armed forces share the same requirements. The cloud solutions in use today for civil applications are not appropriate for deployed forces. They require unlimited bandwidth that armed forces do not have in the field. The Thales Defence Cloud is a sovereign solution designed for constrained environments, enabling deployed forces to conduct their missions in total autonomy in the theatre of operations. Hyperconnectivity on the battlefield promises to drive a technological revolution for armed forces and engender a growth in demand for new capabilities to gather, share and process large volumes of data in real time. As threat environments evolve, armed forces units will be able to safely keep their data without any threat of security breach and it falling into the adversories hands.