Lockheed Martin - Experts & Thought Leaders
Latest Lockheed Martin news & announcements
Insta, a trusted cybersecurity and defence technology provider, has launched Insta DomainLink Secret™, a high-performance cross-domain solution (CDS) for secure, real-time data exchange between different networks and systems. Modern technological solution enables real-time, secure bi-directional data transfer between military domains, such as land, maritime, and air, and security clearance between different classification levels across the chain of command. Advanced operational security Developed in collaboration with Lockheed Martin for the exchange of data in complex military network environments, its advanced operational security and cybersecurity capabilities help safeguard data against threats. The system also enables improved situational awareness and faster tactical decision-making across military domains. Modern military operations need quick data-centric decision-making Typically, military branches, such as the navy and air defence, have their own command and control systems Typically, military branches, such as the navy and air defence, have their own command and control systems with limited ability to exchange information in a controlled way due to a lack of proper cybersecurity controls to enable connections. This can slow decision-making, which reduces situational awareness and might jeopardise the mission and put troops at risk. Multi-domain operations refer to military operations that integrate and synchronise actions across multiple military branches to achieve a key strategic objective. For example, a major NATO mission can include land, maritime, air, space, and cyber operations – all taking place at the same time over a vast area. The more NATO operatives participate, the more complex the data exchange between different networks and systems becomes. Real-time sharing of data and its effects “For example, if there were a military conflict in Europe, it would be necessary to communicate critical information between different systems and chains of command. An F-35 on a stealth mission needs to be able to share the information that all of its sophisticated sensor systems detect with the rest of the forces." "If the aircraft detects an enemy threat, you need to decide very quickly who responds to it: the air force, a navy vessel, or ground-based assets? Real-time sharing of data and its effects across all branches is critical for both command and on-field operatives to effectively respond to threats and achieve high joint operational capability,” says Petri Reiman, Senior Vice President, Defence and Cyber Security at Insta. Tailor-made keys are on the way to being replaced by flexible systems Insta DomainLink Secret™ introduces a new level of agility, empowering system operators themselves to adapt In order to benefit from cross-domain technologies in the past, it has been necessary to have them tailor-made, or they have required complex coding and scripting, slowing down their implementation. Programming or scripting-based solutions are further limited by static, pre-defined rule sets that could not be changed during real-time operation. Any changes require re-coding and testing by a developer. In contrast, Insta DomainLink Secret™ introduces a new level of agility, empowering system operators themselves to adapt and refine operational rules instantly, without technical bottlenecks. Data superiority and increasing cyber threats drive asset in defence The last few years have also seen a rise in cyber attacks targeting defence systems and the military. Governments have responded, with, for example, the UK increasing spending on cyber capabilities in 2025. Additionally, at the 2025 NATO Summit in The Hague, member states pledged to spend 5% of GDP on defence by 2035, with 1.5% dedicated towards cybersecurity and critical infrastructure protection. Insta DomainLink Secret™’s filtering feature Insta DomainLink Secret™’s filtering feature allows users to control data flows and who has access to them While mission-critical data is available from multiple sources in the field, certain information should not be shared across the entire chain of command. To ensure operational security for any mission or procedures, Insta DomainLink Secret™’s filtering feature allows users to control data flows and who has access to them. In practice, the system can be programmed to control what information is transmitted, what information can be received or even what data, for example, a radar is permitted to send out. Challenges of the modern defence and military realities “Information superiority is a key dimension of multi-domain operations – you simply must have a full operational picture available at all times. Our Cross Domain Solution has been specifically developed to meet the increasing challenges of the modern defence and military realities, including cyber threats." "Our decades of experience in demanding defence solutions and strong focus on developing state-of-the-art command and control systems utilising data and AI put us in a unique position to offer secure solutions for NATO needs,” says Reiman. Performance and security in critical environments Insta DomainLink Secret™ is built on FPGA technology that enables hardware-based content validation and filtering To further enhance performance and security in critical environments, Insta DomainLink Secret™ is built on Field Programmable Gate Array (FPGA) technology that enables hardware-based content validation and filtering, enhancing performance and security in critical environments. Additionally, FPGA technology is highly adaptable and can be reconfigured to different situations and threats as the hardware does not need to be removed for updates. Integrating the new fighter’s systems The F-35 stealth fighters, which Finland will start receiving in 2026, are known as the world’s most modern and versatile fighter jets. In addition to maintaining the aircraft’s avionics systems, Insta will also be responsible for integrating the new fighter’s systems with the Finnish command and control systems in collaboration with the Finnish Defence Forces. Insta will showcase the solution at DSEI UK 2025 organised in London 9–12 September.
Technology company Insta and the Finnish Defence Forces have agreed on the three-year acquisition package related to Finland's F-35 fighter program. The acquisition is based on the strategic partnership agreement between the Finnish Defence Forces and Insta and covers the years 2024–2026. The acquisition covers, among other things, building maintenance and service capabilities for the avionics of the Finnish Air Force’s Lockheed Martin F-35 Lightning II multi-role fighters, i.e., the plane’s electronic systems, as well as related support services. The F-35 fighters will be put into service from 2026 onwards. Partnership with the Finnish Defence Forces This agreement ensures in part that Finland has the necessary competences and the ability to maintain the F-35 systems and security of supply for decades to come. The systems in the F-35 fighter jet require special expertise and a broad understanding of technology. Long-term cooperation, a strategic partnership with the Finnish Defence Forces, and earlier fighter purchases have resulted in Insta accumulating strong technology and business area expertise that can support the security of supply of the Finnish Defence Forces’ critical systems, even during emergencies. The systems in the F-35 fighter jet require special expertise and a broad understanding of technology "So far, Insta has been responsible for the maintenance of the avionics systems on the Hornet fighter jets. Building capability for maintaining the F-35’s avionics systems allows for us to establish a strong continuum of competence regarding critical systems and technology and, with the introduction of new technology, also provides new types of opportunities for further developing competence," says Ville Kettula, Insta’s VP for the aviation business. A shared situational awareness is decisive With Finland’s accession into NATO, defence systems are being increasingly cross-border connected, the amount of data is growing, and the technology is advancing at a record pace. Being able to leverage this data for leadership and the forming of a situational picture will be decisive in terms of warfare. The F-35 stealth fighters, which Finland will start receiving in 2026, are known as the world’s most modern and versatile fighter jets. They are also flying data links that continuously gather a situational awareness of their environment and compare it to threats. The planes share data among themselves and with the ground forces, thereby enabling them to be used for surveillance and reconnaissance duties as well. Advancement of technology and equipment The piled data is simultaneously relayed to all plans that have joined the data link The advanced sensor technology allows for detecting the own aircrafts, vehicles, ships, and troops as well as those of the enemy and unknown units. The stealth capabilities of this fifth-generation fighter enable it to see further than the distance required for its detection. The gathered information is simultaneously relayed to all systems that have joined the data link. "The advancement of technology and equipment at record pace will also emphasise the significance of preventive maintenance and repair, not to mention cyber security. In addition to maintaining the aircraft’s avionics systems, Insta will also be responsible for integrating the new fighter’s systems with the Finnish command & control systems together with the Finnish Defence Forces," Kettula explains. Research and product development In addition to maintenance activities, Insta has engaged in continuous research and product development work in order to improve the operational reliability, flight safety, and performance of the fighters. Finland will receive a total of 64 F-35 fighters. The aircraft has an estimated service life of 30 years, which means that there will be work to be done well into the future. NATO offers new international opportunities for Insta Insta’s AirC2 product family contains solutions for the integrated command of air defence As a provider of maintenance for the F-35 fighter fleet’s avionics, Insta is part of Lockheed Martin’s global maintenance network and, a contracting partner to the aircraft manufacturer. "We have the opportunity to provide maintenance and repair services for avionics systems on F-35 fighters even outside of Finland. The potential market is extensive since several NATO countries have chosen F-35 fighters," says Petri Reiman, Senior Vice President for Insta Advance. In addition to avionics, Insta’s Defence business focuses on command & control systems, simulators, cyber security, and system integrations for connected defence. Insta’s AirC2 product family, for example, contains solutions for the integrated command of air defence in terms of both anti-aircraft and fighter defence. Agreement with NCIA "Insta’s solutions are state of the art in terms of the level of integration and the capability in terms of different systems and service branches. NATO is strongly emphasising multi-domain thinking, where such integration is a key factor; this makes our solutions interesting to others," Reiman explains. In March of this year, Insta signed a collaboration agreement with the NATO Communications and Information Agency (NCIA). The agreement enables Insta to offer the NCI Agency, for NATO’s own needs or for use in other NATO countries, commercial off-the-shelf products (COTS) and services, such as situational picture systems, command & control systems and cyber security services, data encryption and gateway solutions as well as software services. Already in 2023, Insta and Lockheed Martin signed a collaboration agreement on the development of the next-generation data relay and filtering solution. The signed agreement was the first project related to the indirect industrial cooperation of Finland’s F-35 fighter project.
Under the patronage of His Excellency President Abdel Fattah El-Sisi, President of Egypt’s Arab Republic and Supreme Commander of the Armed Forces, Egypt is set to host the 3rd edition of Egypt Defence Expo (EDEX), taking place from 4 to 7 December 2023, at Egypt International Exhibition Centre. The exhibition will showcase the latest military technology, equipment, and systems across land, sea, and air through more than 400 exhibitors from 46 countries. Event attendees The event will welcome a number of officials and military delegations who have confirmed their attendance to witness the latest defence technology and systems while enabling them to exchange ideas and build invaluable relationships between key players in the industry. EDEX 2023 will include 22 country pavilions from Armenia, Bosnia and Herzegovina, Brazil, Bulgaria, China, Czech Republic, Egypt, France, Germany, Greece, India, Italy, Kazakhstan, Pakistan, Romania, Saudi Arabia, Serbia, Slovakia, South Korea, Ukraine, United Arab Emirates, United States of America. Defence and security event The exhibition provides a unique opportunity for visitors to witness the latest technology Organised by Arabian Word Events (AWE), the pioneering organiser of award-winning international events, and in cooperation with the Ministry of Defence, the Ministry of Military Production, and the Arab Organisation for Industrialisation, EDEX is the only defence and security event that covers Africa and the Middle East and the largest in Africa. The exhibition provides a unique opportunity for visitors to witness the latest technology, equipment, defence systems, and military products in addition to the Egyptian Pavilion where attendees can view the cutting-edge present and future capabilities of the Ministry of Military Production. High-level military delegations from more than 100 countries have been invited, and 35,000 visitors are expected to attend the exhibition over four days. EDEX EDEX is set to feature an impressive lineup of renowned companies covering all aspects of defence and security, such as land vehicles, air defence, coastal defence, shipbuilders, maintenance and repair, cyber security, missile systems, unmanned and autonomous systems, parachuting and airdrop, satellite communication, search and rescue, surveillance systems, tactical equipment, training and simulation equipment, and much more. Don't miss the chance to explore cutting-edge innovations across these crucial sectors at the event. Industry sponsors EDEX has secured high-level industry sponsors including a handful of the world's most reputable military equipment manufacturers namely; Amstone, Dassault Aviation, Hanwha, MBDA, ALIT, Lockheed Martin, Naval Group, Northrop Grumman, Boeing, Esri, NAS and Leonardo DRS. Over its past editions, the event gained growing momentum with the participation of nearly 400 exhibitors from 42 countries in 2021, a notable increase from 376 exhibitors from 41 countries in 2018. Also, EDEX 2021 saw the attendance of 78 official VIP delegations from 54 countries, and more than 30,000 visitors.
Insights & Opinions from thought leaders at Lockheed Martin
Back in the 1960s a lead engineer working in conjunction with the United States Navy for Lockheed’s Skunk Works team coined the acronym KISS, which translated to the design principle ‘keep it simple stupid’. The KISS principle embraces the concept of simplicity, stating that most systems work best if they are kept simple rather than geared up to be more complicated. When it comes to physical security systems, this concept can also play a key element in its overall success. Secure work environments For years the tug of war in the security industry has pitted the need for a secure environment against the desire for technology that is convenient for users. However, finding a happy medium between the two has often seemed elusive. I believe you can design and have operational convenience at the same time as achieving high security" Jeff Spivey, a security consultant and the CEO of Security Risk Management, has this to say about it, “If there is an understanding of the security-related risks and their separate and/or collective impact on the organisation’s bottom line business goals, a resolution can be reached.” Jeff also does not think that convenience and high security have to be opposing each other. He says, “I believe you can design and have operational convenience at the same time as achieving high security.” Importance of secure access control The premise is that for organisations and spaces to be truly secure, they must be difficult to access. So, by its very nature, access control is designed to be restrictive, allowing only authorised staff and visitors to access a facility or other secured areas inside. This immediately puts convenience at odds with security. Most people will tolerate the restrictive nature of a controlled entrance using badge, card or biometric because they understand the need for security. When that technology gets in the way of staff traversing freely throughout the facility during the course of a business day, or hindering potential visitors or vendors from a positive experience entering the building, they become less tolerant, which often leads to negative feedback to the security staff. Enhancing corporate security Security consultants like Spivey and security directors all stress that understanding the threats and risk levels of an organisation will most likely dictate its physical security infrastructure and approach. All the technology in the world is useless if it is not embraced by those who are expected to use it and it doesn’t fit the culture of the organisation. Once employees and customers are educated about what security really is, they understand that they're not losing convenience, they're gaining freedom to move safely from point A to point B. Converged data and information shape new access options Migration of physical access control systems to a more network-centric platform is a game-changer for security technologies The migration of physical access control systems to a more network-centric platform has been a game-changer for emerging security technology options. The expansion of the Internet of Things (IoT), Near-Field Communication devices powered by Bluetooth technology, and the explosion of converged information systems and identity management tools that are now driving access control are making it easier than ever before for employees and visitors to apply for clearance, permissions and credentials. Wireless and proximity readers Advancements in high-performance wireless and proximity readers have enhanced the user’s access experience when presenting credentials at an entry and expediting movement throughout a facility. A user is now able to access a secured office from street-level without ever touching a key or card. Using a Bluetooth-enabled smartphone or triggering a facial recognition technology, they enter the building through a security revolving door or turnstile. A total building automation approach adds extra convenience, as well as seamless security, when access technology is integrated into other systems like elevator controls. A total building automation approach adds extra convenience and seamless security How to Meet Security Concerns at the Entry While security managers are charged with providing their facilities the maximum level of security possible, there is always the human element to consider. But does the effort to make people comfortable with their security system ecosystem come at a cost? Does all this convenience and the drive to deliver a positive security experience reduce an organisation’s overall levels of security? And if so, how can we continue to deliver the same positive experience including speed of entry – while improving risk mitigation and threat prevention? Door entrances, barriers Users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through Let’s examine some of the various types of entrances being used at most facilities and the security properties of each. With some entrance types, there is the possibility for security to fall short of its intended goals in a way that can’t be addressed by access control technology alone. In particular, with many types of doors and barriers, tailgating is possible: users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through. To address this, many organisations hire security officers to supervise the entry. While this can help to reduce tailgating, it has been demonstrated that officers are not immune to social engineering and can often be “talked into” letting an unauthorised person into a facility. Deploying video cameras, sensors Some organisations have deployed video surveillance cameras or sensors to help identify tailgaters after the fact or a door left open for longer than rules allow. This approach is not uncommon where facilities have attempted to optimise throughput and maintain a positive experience for staff and visitors. Security staff monitoring the video feeds can alert management so that action can be taken – but this is at best a reactive solution. It does not keep the unauthorised persons from entering, and so is not a totally secure solution. Optical turnstiles, speedgates Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself. Not all security entrances work the same way. And, there will always be a balance between security and convenience – the more secure the entry, the less convenient it is for your personnel and visitors to enter your facility. For example, it takes more time to provide 2-factor authentication and enter through a mantrap portal than to provide only one credential and enter through an optical turnstile or speedgate. Perimeter protection So, it is an important first step to determine what is right at every entrance point within and around the perimeter. Remember that convenience does not equate to throughput. Convenience is the ease and speed of entry experienced by each individual crossing that threshold, while throughput relates to the speed at which many individuals can gain access to the facility. A more convenient entry makes a better first impression on visitors and is good for overall employee morale. Throughput is more functional; employees need to get logged in to begin their workday (and often to clock in to get paid), and they quickly become frustrated and dissatisfied when waiting in a long line to enter or exit the premises. Considering form and function when designing a security entrance can ensure that those requiring both high-security and convenience are appeased.
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download