UK MOD to Build Open Source Analytics Platform

mod.png

The Ministry of Defence has launched a competition to build an evolutionary new open source analytics platform to help it better understand its data.

The department is seeking prototype solutions to help analyse its structured and unstructured data.
The platform will help the MOD to understand its internal information, documents, processes and interactions, allowing it to streamline processes, collaborate and share knowledge more easily. Ministry of Defence embraces cloud apps with Office 365 move Ministry of Defence launches private cloud for app sharing MoD scientists publish open source code on GitHub for first time

The department has £250,000 available for the first phase of the competition, with up to £2 million allocated for phase two, which will be awarded to the most successful phase one projects.  The project will be created by the Centre for Defence Enterprise (CDE), on behalf of the MOD’s information systems and services wing, will be led by CIO Mike Stone.

Companies interested in competing are invited to attend a briefing event at techUK in London on 24 June and have until 13 Ausgust 2015 to submit their proposals online.
“Traditionally the MOD has been cautious of adopting emerging and unproved technologies. However, we need to adopt these freely available capabilities and services now,” said Stone announcing the initiative.
            
“I hope this CDE competition will encourage industry, and particularly small and medium-sized enterprises (SMEs) that are delivering analytics and digital enablers, to help us develop a capability that will become an important part of defence transformation,” he added.
Stone joined the MOD a year ago with a promise to “dramatically improve” the department’s IT by adopting more user-friendly technologies and exploiting cloud and mobile.
Last week the department announced it has started to move its 420,000-strong workforce to Microsoft Office 365.

The IT team are working to improve 30 different issues identified by Stone, including better access to the internet and social media, quicker logon times, better file sharing, browser choice, reducing device size and weight and more regular password resets.
Computerworld:  http://bit.ly/1Mb53ns

« Australia is 'one of most aggressive' in Mass Surveillance
Digital Currencies: A Gold Standard for Bitcoin »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

4ARMED

4ARMED

4ARMED specializes in penetration testing, information security consultancy and security training

Applicure Technologies

Applicure Technologies

Applicure Technologies develops the leading multi-platform web application security software products to protect web sites and web applications from external and internal attacks.

SecurityScorecard

SecurityScorecard

SecurityScorecard provides the most accurate security ratings & continuous risk monitoring for vendor and third party risk management.

Communications Security Establishment (CSE)

Communications Security Establishment (CSE)

CSE is Canada's national cryptologic agency, providing the Government of Canada with IT Security and foreign signals intelligence (SIGINT) services.

WetStone Technologies

WetStone Technologies

WetStone develops software solutions that support investigators and analysts engaged in eCrime Investigation, eForensics and incident response activities.

Crypto Quantique

Crypto Quantique

Crypto Quantique's ground-breaking technology radically simplifies the process of generating a hardware root of trust in an IoT device.

CyPhyCon

CyPhyCon

CyPhyCon is an annual event exploring threats and solutions to cyber attacks on cyber-physical systems such as industrial control systems, Internet of Things and Industrial Internet of Things.

CYRISMA

CYRISMA

CYRISMA is a revolutionary cybersecurity platform that helps organizations manage risk without the usual headaches associated with enterprise cybersecurity tools.

FourthRev

FourthRev

FourthRev is an education-technology start-up with a mission to solve the skills crisis of the Fourth Industrial Revolution.

McDonald Hopkins

McDonald Hopkins

McDonald Hopkins is a business advisory and advocacy law firm. We focus on insightful legal solutions that help our clients strategically plan for an increasingly competitive future.

Serbus

Serbus

Serbus Secure is a fully managed suite of secure communication, enterprise mobility and mobile device security tools.

Cyber Explorers

Cyber Explorers

Cyber Explorers is a fun, free and interactive learning platform for future digital superstars. An exciting addition to UK curriculum delivery or after school activities.

Cytex

Cytex

Cytex is the All-in-One solution for SMB data protection & compliance needs.

Neya Systems

Neya Systems

Neya Systems, a leader in advanced off-road autonomy and high-level multi-robot mission planning, provides innovative solutions for uncrewed ground, aerial, and surface vehicles.

CardinalOps

CardinalOps

The CardinalOps platform continuously assesses your detection posture and eliminates coverage gaps in your existing detection stack so you can easily implement a threat-informed defense.

Replica

Replica

Replica creates authentic virtual environments that ensure identities and assets are always protected no matter where or what work needs to get done.