+ All Categories
Home > Documents > IBCS - Second Line of Defense€¦ · IBCS IBCS’s open architecture approach to enable component...

IBCS - Second Line of Defense€¦ · IBCS IBCS’s open architecture approach to enable component...

Date post: 20-Jul-2020
Category:
Upload: others
View: 11 times
Download: 0 times
Share this document with a friend
1
THE VALUE OF SYNCHRONIZED AND INTEGRATED MISSILE DEFENSE CAPABILITIES Single Integrated Air Picture Replacing Legacy C2 Systems Customer- Owned Interfaces Cyber Resilient Organizational Tailoring Open Architecture User Friendly Displays Eliminate Single Fail Points Time Critical Advantage Affordability Flexibility Reduce Rolling Stock Smaller Force Package Plug and Fight Future Relevancy Intuitive Information Any Sensor Best Shooter Earlier Engagement Reduce Training Time Network Redundancy Warfighter- Centered IBCS Feature IBCS Benefit Developing the US Army's revolutionary C2 system for joint IAMD enabling any sensor, best shooter IBCS IBCS’s open architecture approach to enable component modernization (e.g., radars, missiles, C2) without major system modifications. This allows the customer to optimize limited resources and facilitate flexible defense designs. With IBCS, the warfighter is part of the decision process from day one. Since they have been integral to its design, warfighters can count on the system to provide them with intuitive, time-critical information to help them continue the fight. IBCS also allows the commanders to have a complete view of the air picture and to be involved in the engagement decisions. Complex regular, symmetric and asymmetric air and missile threats can come from any direction. IBCS utilizes all available information to unleash the potential capabilities of weapons and sensors Plug-and-fight ensures that current and future sensors and weapon systems can interact with other devices in the same network. This approach allows new peripherals be easily incorporated, allowing warfighters to take advantage of integrated Army and joint capabilities. Built In Trust: Proven cyber resiliency is woven into multiple layers of the system to ensure that our customers’ missions remain safe © 2017 Copyright Northrop Grumman ePROCs #17-2099
Transcript
Page 1: IBCS - Second Line of Defense€¦ · IBCS IBCS’s open architecture approach to enable component modernization (e.g., radars, missiles, C2) without major system modifications.

THE VALUE OF SYNCHRONIZED AND INTEGRATEDMISSILE DEFENSE CAPABILITIES

Single IntegratedAir Picture

ReplacingLegacy C2 Systems

Customer-Owned

Interfaces

CyberResilient

Organizational Tailoring

OpenArchitecture

User FriendlyDisplays

Eliminate Single

Fail Points

Time Critical Advantage

A�ordability

Flexibility

Reduce RollingStock

Smaller Force Package

Plug and Fight

FutureRelevancy

IntuitiveInformation

Any SensorBest Shooter

EarlierEngagement

ReduceTraining Time

NetworkRedundancy

Warfighter-Centered

IBCS Feature

IBCS Benefit

Developing the US Army's revolutionary C2 system

for joint IAMDenabling any sensor,

best shooter

IBCS

IBCS’s open architecture approach to enable component modernization (e.g., radars, missiles,

C2) without major system modifications. This allows the customer to optimize limited resources

and facilitate flexible defense designs.

With IBCS, the warfighter is part of the decision process from day one. Since they have been

integral to its design, warfighters can count on the system to provide them with intuitive, time-critical

information to help them continue the fight. IBCS also allows the commanders to have a complete

view of the air picture and to be involved in the engagement decisions.

Complex regular, symmetric and asymmetric air and missile threats can come from any

direction. IBCS utilizes all available information to unleash the potential

capabilities of weapons and sensors

Plug-and-fight ensures that current and future sensors and weapon

systems can interact with other devices in the same network. This approach allows new peripherals

be easily incorporated, allowing warfighters to take advantage of integrated Army and joint capabilities.

Built In Trust: Proven cyber

resiliency is woven into multiple layers of the system to ensure that our customers’ missions remain safe

© 2017 Copyright Northrop GrummanePROCs #17-2099

Recommended