One way to understand information assurance is to think of it as the practice of ensuring that information systems will perform as needed when needed, and that they remain accessible only to authorized users. he technical and managerial measures designed to ensure the confidentiality, possession or control, integrity, authenticity, availability and utility of information and information systems.


Details the following five pillars of information assurance:

Test and Evaluation

We bring together a rare combination of skills, products, assets and facilities to provide customers with realistic live and synthetic environments in which to Test & Evaluate their Defence Capability. Covering range development and operation, provision of representative threats, trials design, trials delivery and data evaluation, we bring unparalleled understanding and expertise to the generation and assurance of Defence Capability.

We operate a broad range of Test & Evaluation capabilities across air, land, sea and information, including ranges, ground facilities and chambers. Each of these facilities are fully instrumented enabling high quality data to be captured, ensuring the test performed can be properly assessed and understood. A range of modelling and simulation tools compliment the physical test capabilities, enabling cost effective evaluation to be undertaken.

Security underpins the operation of all Test & Evaluation services. It is key to protecting national and commercial interests, to maintaining the integrity of data, and to ensuring safe and sanitized environments to conduct military exercises and tests. We provide fixed networked ranges and deployable instrumentation that enables segregation of land, sea and air space, and protects against intrusion or data loss. Data taken from instrumentation, or generated through modelling and simulation, has to be extracted, processed and reported securely, and kept safe from cyber-attack or corruption, as does the operation of safety critical range infrastructure.