Military Cybersecurity Market
By Solution;
Threat Intelligence & Response, Identity & Access Management, Data Loss Prevention, Security Information & Event Management, Unified Threat Management, Risk & Compliance Management, Managed Security Services and OthersBy Security Layer;
Endpoint Security, Network Security, Cloud Security and Application SecurityBy Deployment;
On-Premise and CloudBy Operation Domain;
Land Forces, Air Forces and Naval ForcesBy Component;
Hardware Appliances and Software & ServicesBy Geography;
North America, Europe, Asia Pacific, Middle East & Africa and Latin America - Report Timeline (2021 - 2031).Military Cybersecurity Market Overview
Military Cybersecurity Market (USD Million)
Military Cybersecurity Market was valued at USD 30,360.01 million in the year 2024. The size of this market is expected to increase to USD 44,164.07 million by the year 2031, while growing at a Compounded Annual Growth Rate (CAGR) of 5.5%.
Military Cybersecurity Market
*Market size in USD million
CAGR 5.5 %
| Study Period | 2025 - 2031 | 
|---|---|
| Base Year | 2024 | 
| CAGR (%) | 5.5 % | 
| Market Size (2024) | USD 30,360.01 Million | 
| Market Size (2031) | USD 44,164.07 Million | 
| Market Concentration | Medium | 
| Report Pages | 307 | 
Major Players
- BAE Systems PLC
 - Thales Group
 - General Dynamics Corporation
 - Lockheed Martin Corporation
 - Northrop Grumman Corporation
 - Raytheon Company
 - Airbus SE
 - IBM Corporation
 - ManTech International Corporation
 - Salient CRGT
 
Market Concentration
Consolidated - Market dominated by 1 - 5 major players
Military Cybersecurity Market
Fragmented - Highly competitive market without dominant players
The Military Cybersecurity Market is becoming essential in protecting defense networks, communication channels, and mission-critical operations from digital threats. With cyber intrusions against defense systems increasing by nearly 45%, militaries are strengthening investments in advanced cybersecurity measures. The focus remains on ensuring the confidentiality, integrity, and resilience of defense data across land, air, sea, and space domains.
Key Drivers Fueling Growth
The rise of cyber warfare tactics has intensified the adoption of next-generation defense cybersecurity solutions. Nearly 40% of defense agencies are prioritizing AI-driven tools to counter advanced threats. As reliance on digital communication and connected systems grows, the need for stronger cybersecurity strategies continues to accelerate.
Technological Advancements and Innovations
Emerging technologies such as artificial intelligence, machine learning, and blockchain are reshaping military cybersecurity. Around 50% of system upgrades now incorporate AI-powered monitoring and predictive analytics. These innovations deliver real-time threat detection, automated response, and enhanced situational awareness within military networks.
Strategic Collaborations and Partnerships
Defense contractors and governments are focusing on strategic collaborations, mergers, and partnerships to build stronger cybersecurity infrastructures. Approximately 35% of new projects involve partnerships between military institutions and private technology providers. These initiatives not only expand cyber capabilities but also strengthen allied nations’ defense interoperability.
Military Cybersecurity Market Key Takeaways
-  
The global military cybersecurity market is projected to grow from USD 17.0 billion in 2025 to USD 31.9 billion by 2035, at a compound annual growth rate (CAGR) of 6.5%
 -  
North America is expected to dominate the market, driven by substantial defense budgets and increasing digitalization of military infrastructure .
 -  
Key drivers include the rise in state-sponsored cyberattacks, the need for secure communication channels, and the integration of advanced technologies like artificial intelligence and machine learning in defense systems
 -  
Major players in the market include BAE Systems, Cisco Systems, Lockheed Martin, Northrop Grumman, and Raytheon Technologies
 -  
Emerging trends involve the adoption of cloud security solutions, zero-trust architectures, and the development of specialized cybersecurity units within national defense forces
 
Military Cybersecurity Market Recent Developments
-  
In December 2020, Northrop Grumman introduced an advanced cybersecurity system designed for military applications, aimed at strengthening data protection and ensuring secure communication across global defense networks. This innovation enhanced the company’s role in providing cutting-edge security solutions for mission-critical operations.
 -  
In February 2023, Thales Group launched a next-generation military cybersecurity solution focused on protecting communication systems and securing military networks against cyber threats. The system ensures uninterrupted mission-critical operations, reinforcing Thales’s commitment to defense-grade cybersecurity innovation
 
Military Cybersecurity Market Segment Analysis
In this report, the Military Cybersecurity Market has been segmented by Solution, Security Layer, Deployment, Operation Domain, Component, and Geography.
Military Cybersecurity Market, Segmentation by Solution
The market is organized by Solution to reflect the toolsets and managed offerings defense organizations deploy to counter advanced persistent threats, reduce attack surface, and improve mission readiness. Procurement cycles favor modular suites that integrate analytics, orchestration, and policy enforcement across complex systems and classified networks. Vendors emphasize interoperability, zero-trust architectures, and compliance with defense standards to accelerate accreditation, while partnerships with primes and sovereign integrators shape long-term sustainment and modernization roadmaps.
Threat Intelligence & ResponseThis segment focuses on curated threat intelligence, malware forensics, and incident response workflows tailored to military command structures. Solutions blend OSINT, classified feeds, and theater-specific indicators to shorten dwell time and enable rapid containment during exercises and live operations. Growth is driven by investments in automated playbooks and hunt teams that fuse cyber data with operational context for faster decision advantage.
Identity & Access ManagementIdentity & Access Management underpins zero-trust by enforcing least-privilege access across bases, deployed platforms, and coalition networks. Programs prioritize MFA, privileged access management, and dynamic attribute-based access controls to mitigate insider risk and credential theft. Adoption is propelled by directives mandating continuous authentication and cross-domain identity federation without degrading mission tempo.
Data Loss PreventionData Loss Prevention protects classified and mission-critical information from exfiltration across endpoints, gateways, and tactical links. Capabilities include content inspection, contextual policies, and secure collaboration for multi-level security environments. Expansion is supported by the need to track data lineage, apply encryption automatically, and ensure compliance with export controls during multinational operations.
Security Information & Event ManagementSIEM aggregates logs from weapon systems, ICS/OT, and IT networks to deliver situational awareness and compliance reporting. Modern platforms incorporate UEBA, SOAR, and threat intel enrichment to prioritize alerts and orchestrate containment. Defense programs seek scalable architectures capable of operating in disconnected or intermittent environments while preserving forensic integrity for after-action analysis.
Unified Threat ManagementUTM consolidates firewalling, IPS/IDS, web filtering, and sandboxing to simplify perimeter defense in garrison and forward-deployed sites. The driver is streamlined lifecycle support and consistent policy enforcement across heterogeneous networks. Vendors differentiate with ruggedized form factors, FIPS-validated crypto, and remote orchestration to sustain capabilities at the edge.
Risk & Compliance ManagementThis segment addresses governance, control mapping, and continuous authorization for classified systems and defense supply chains. Programs rely on automated assessments, SBOM visibility, and remediation tracking to satisfy accreditation baselines. Demand is reinforced by evolving cyber regulations and the need to quantify mission risk to prioritize investments and measure resilience.
Managed Security ServicesMSS providers deliver 24/7 monitoring, threat hunting, and surge response to augment military cyber units and address staffing constraints. Contracts emphasize sovereignty, cleared personnel, and on-prem or sovereign-cloud operations with strict data handling. Growth reflects multi-year transformation deals that combine capability uplift, tool rationalization, and outcome-based SLAs.
OthersThis category includes niche and emerging capabilities such as deception, attack surface management, and post-quantum cryptography pilots. Adoption often begins with pathfinder projects within specialized commands before broader standardization. Vendors that demonstrate interoperability and low integration burden position well for inclusion in future enterprise baselines.
Military Cybersecurity Market, Segmentation by Security Layer
Segmenting by Security Layer aligns investments to where defenses are applied—devices, networks, cloud environments, and software workloads. Defense stakeholders are shifting from castle-and-moat approaches toward defense-in-depth with continuous verification and telemetry sharing across layers. This structure supports coherent zero-trust roadmaps, improves budget traceability, and fosters joint capability development across services.
Endpoint SecurityEndpoint Security covers laptops, servers, and ruggedized devices aboard platforms with EDR/XDR, disk encryption, and application control. Priorities include offline detection, tamper resistance, and low-overhead agents suitable for constrained edge compute. Integration with SIEM/SOAR and supply-chain attestation strengthens forensic confidence and mission assurance.
Network SecurityNetwork Security safeguards terrestrial and tactical transports with segmentation, next-gen firewalls, and intrusion prevention. Programs emphasize encrypted cross-domain flows, resilient routing, and traffic visibility even in contested electromagnetic environments. Vendors compete on throughput, crypto agility, and certified hardware that meets defense environmental and security standards.
Cloud SecurityAs defense adopts private and sovereign clouds, Cloud Security provides posture management, CWPP, and confidential computing for sensitive workloads. Policies focus on data residency, key management, and automated guardrails to maintain accreditation. Momentum is supported by application refactoring and analytics programs that require elastic scale without compromising compliance.
Application SecurityApplication Security embeds protection through DevSecOps, SAST/DAST, and SBOM-driven remediation across custom and COTS software. Defense programs encourage secure coding, software-supply-chain assurance, and runtime protection for mission apps. The outcome is faster delivery cycles with auditable controls that reduce vulnerabilities before deployment to operational networks.
Military Cybersecurity Market, Segmentation by Deployment
Deployment models determine how controls are delivered and sustained under operational constraints. Defense buyers balance sovereignty and latency needs against agility and total cost of ownership. Strategies often combine hardened on-prem systems for classified workloads with cloud delivery for scalable analytics and collaboration, ensuring continuity across training, exercise, and combat operations.
On-PremiseOn-Premise deployments dominate highly classified and disconnected environments where data sovereignty, custom integrations, and deterministic performance are critical. Programs invest in lifecycle support, patch pipelines, and built-in redundancy to meet readiness objectives. Modernization emphasizes virtualization, micro-segmentation, and orchestration to reduce operational burden.
CloudCloud deployment accelerates capability delivery for analytics, collaboration, and software development, leveraging infrastructure as code and automated compliance. Defense clouds prioritize sovereign control, encrypted transport, and continuous monitoring with standardized landing zones. Growth is tied to application modernization and data fusion initiatives that benefit from elastic scale.
Military Cybersecurity Market, Segmentation by Operation Domain
By Operation Domain, cybersecurity is tailored to the mission environments of land, air, and sea forces, each with unique platform, connectivity, and OT/ICS considerations. Programs emphasize resilience, cyber-hardening, and training aligned to service-specific concepts of operation. Vendors succeed by meeting ruggedization needs and integrating with command-and-control systems without impeding operational tempo.
Land ForcesFor Land Forces, priorities include protecting headquarters, mobile command posts, and ground platforms with secure tactical networks. Capabilities focus on endpoint hardening, satcom/line-of-sight link security, and rapid deployment kits for austere environments. Integration with EW and ISR feeds enables faster anomaly detection and cross-domain response.
Air ForcesAir Forces require protections for avionics, mission planning systems, and logistics networks supporting sortie generation. Emphasis is on secure data links, flight-safety certifications, and maintenance data integrity to prevent operational disruption. Partnerships with platform OEMs and MRO providers advance cyber-airworthiness and continuous monitoring.
Naval ForcesNaval Forces operate in bandwidth-limited and isolated conditions, necessitating resilient shipboard networks, secure ICS/OT, and hardened shore connectivity. Solutions prioritize segmentation, deterministic control, and survivability against both cyber and kinetic threats. Lifecycle programs synchronize with refit windows and fleet modernization to deliver sustained capability.
Military Cybersecurity Market, Segmentation by Component
Segmenting by Component distinguishes capital procurement of hardware appliances from software and services that deliver ongoing detection and response. Defense agencies are standardizing reference architectures while rationalizing tool sprawl to improve interoperability and reduce sustainment costs. Vendors that combine certified hardware with adaptable software and expert services align well to evolving mission requirements.
Hardware AppliancesHardware Appliances include certified gateways, crypto modules, and ruggedized sensors engineered for harsh environments. Selection criteria emphasize throughput, crypto agility, tamper evidence, and environmental compliance. Long refresh cycles and trusted supply chains favor vendors with proven manufacturing security and lifecycle assurance.
Software & ServicesSoftware & Services span analytics platforms, orchestration, and managed operations that evolve with the threat landscape. Defense buyers value rapid feature delivery, open APIs, and mission-tailored runbooks to accelerate response. Multi-year frameworks bundle capability upgrades with training and cyber workforce development to harden enterprise posture.
Military Cybersecurity Market, Segmentation by Geography
In this report, the Military Cybersecurity Market has been segmented by Geography into five regions: North America, Europe, Asia Pacific, Middle East and Africa and Latin America.
Regions and Countries Analyzed in this Report
North America leads adoption with sustained budgets for zero-trust, cloud security, and cyber ranges that enhance readiness. The region benefits from a mature defense industrial base, strong MSS ecosystem, and rapid technology transition from commercial innovators. Focus areas include software-supply-chain assurance, AI-enabled analytics, and hardened OT for depots and shipyards.
EuropeEurope prioritizes capability uplift through joint procurements, sovereign cloud initiatives, and interoperability for multinational operations. Programs emphasize identity federation, cross-border threat sharing, and resilience for critical defense infrastructure. Modernization roadmaps align with national security strategies and emphasize lifecycle sustainment and workforce development.
Asia PacificAsia Pacific sees accelerated investments to counter sophisticated regional threats and secure rapidly digitizing forces. Procurement blends domestic development with partnerships for technology transfer and training, targeting endpoint hardening, network segmentation, and secure communications. Nations emphasize adaptable solutions that operate across archipelagic and remote theaters with intermittent connectivity.
Middle East & AfricaMiddle East & Africa expands cyber capabilities alongside broader defense modernization and critical infrastructure protection. Priorities include managed security services, secure cloud landing zones, and ICS/OT hardening for bases and logistics. Vendor selection weighs proven implementations, sovereign data controls, and rapid deployment to support evolving regional security objectives.
Latin AmericaLatin America is building foundational cyber defense with emphasis on policy frameworks, training, and scalable platforms. Governments are adopting risk & compliance tools, endpoint protection, and incident response capabilities that align with budget realities. Partnerships with regional integrators and academia support skills development and sustainable operations.
Market Trends
This report provides an in depth analysis of various factors that impact the dynamics of Global Military Cybersecurity Market. These factors include; Market Drivers, Restraints and Opportunities Analysis.
Drivers, Restraints and Opportunity Analysis
Drivers
- Increasing Frequency and Sophistication of Cyber Threats
 - Modernization of Military Technologies and Infrastructure
 -  
Stringent Regulatory Requirements and Compliance: Stringent regulatory requirements and compliance are pivotal factors influencing the global military cybersecurity landscape. Governments worldwide impose rigorous standards and guidelines to ensure the protection of sensitive military networks, data, and operations against cyber threats. These regulations mandate the implementation of robust cybersecurity measures, including encryption protocols, secure communication channels, and continuous monitoring systems. Compliance with these standards is essential not only for safeguarding national security but also for maintaining interoperability with allied defense forces and adhering to international cybersecurity agreements.
The complexity of regulatory frameworks varies across regions but universally emphasizes the need for defense organizations to adopt proactive cybersecurity strategies. These frameworks often evolve in response to emerging cyber threats and technological advancements, requiring defense entities to continuously update their cybersecurity capabilities and practices. Non-compliance can result in significant consequences, including compromised operational readiness, reputational damage, and potential legal liabilities, underscoring the importance of adherence to regulatory mandates.
While compliance with stringent regulatory requirements presents challenges such as resource allocation and operational constraints, it also creates opportunities for innovation and collaboration within the defense cybersecurity sector. Companies specializing in cybersecurity solutions can capitalize on the growing demand for compliant technologies and services, offering tailored solutions that meet regulatory standards while enhancing the overall cybersecurity posture of military organizations. Moreover, adherence to these regulations fosters trust among stakeholders and reinforces the resilience of defense networks against evolving cyber threats in an increasingly digital and interconnected world.
 
Restraints
- Complexity of Cybersecurity Solutions and Integration
 - Budget Constraints and Funding Challenges
 -  
Lack of Skilled Cybersecurity Personnel: The shortage of skilled cybersecurity personnel is a significant challenge facing the global military cybersecurity market. As cyber threats become increasingly sophisticated and pervasive, there is a growing demand for professionals with specialized expertise in identifying, mitigating, and responding to these threats within military environments. However, the supply of qualified cybersecurity professionals often falls short of the escalating demand, creating a talent gap that hinders the effectiveness of cybersecurity operations.
The complexity and evolving nature of cyber threats require cybersecurity personnel who possess not only technical skills but also strategic and analytical capabilities to safeguard sensitive military networks and systems. Moreover, military cybersecurity operations demand personnel who can adapt quickly to new technologies, understand complex defense protocols, and adhere to stringent security protocols while maintaining operational readiness.
Addressing the shortage of skilled cybersecurity personnel presents opportunities for educational institutions, governments, and private sector organizations to invest in cybersecurity training programs, certifications, and workforce development initiatives. By enhancing educational pathways and offering targeted training programs, stakeholders can cultivate a pipeline of qualified professionals equipped to meet the unique challenges and demands of military cybersecurity, thereby bolstering national defense capabilities.
 
Opportunities
- Rising Investments in Defense Cybersecurity
 - Emerging Technologies like AI and Machine Learning
 -  
Collaboration and Partnerships between Governments and Private Sector: Collaboration and partnerships between governments and the private sector play a pivotal role in enhancing cybersecurity capabilities within the military domain. In an increasingly interconnected and digitalized world, these collaborations are crucial for pooling resources, expertise, and technologies to combat evolving cyber threats effectively. Governments often leverage the innovation and agility of private sector cybersecurity firms to augment their own capabilities in developing advanced defense strategies and technologies.
These partnerships facilitate knowledge sharing and mutual support in areas such as threat intelligence sharing, cybersecurity research and development, and the implementation of robust cybersecurity frameworks. Private sector firms bring cutting-edge technologies and solutions to the table, while governments provide regulatory guidance, funding opportunities, and access to classified information necessary for threat assessment and mitigation.
Collaboration between governments and private sector entities fosters resilience and readiness against cyberattacks by promoting standardized practices, enhancing incident response capabilities, and ensuring continuous improvement in cybersecurity posture. By leveraging each other's strengths and resources, these partnerships strengthen national defense capabilities and contribute to a more secure digital environment for military operations and critical infrastructure.
 
Military Cybersecurity Market Competitive Landscape Analysis
Military Cybersecurity Market is experiencing rapid transformation with rising demand for resilient digital defense mechanisms. The competitive landscape is defined by strong emphasis on collaboration, strategic partnerships, and frequent merger initiatives among defense contractors and technology firms. With an estimated concentration exceeding 55%, major players shape the ecosystem by advancing innovation and strengthening their long-term market positioning.
Market Structure and Concentration
The market demonstrates a moderately consolidated structure, where more than 60% of share is controlled by leading defense and IT firms. Companies adopt integrated strategies to reinforce cyber protection layers while focusing on growth through expanded service portfolios. Increasing alliances signal intensified competitive positioning, with firms aligning to deliver advanced technological advancements for military-grade cyber defense.
Brand and Channel Strategies
Brand visibility relies heavily on targeted strategies that highlight security reliability and operational readiness. Around 45% of companies prioritize channel-focused models, ensuring deeper penetration in defense networks. Emphasis on collaboration across digital ecosystems strengthens trust, while carefully curated branding aligns with innovation narratives. These approaches enable stronger recognition and wider adoption within defense procurement cycles.
Innovation Drivers and Technological Advancements
Innovation remains the central growth engine, with over 70% of market leaders investing in advanced technological advancements such as AI-driven defense systems and automated cyber threat detection. Continuous innovation reinforces competitive differentiation while supporting strategic partnerships in research domains. This momentum reflects an increasing commitment to sustained growth across digital military ecosystems.
Regional Momentum and Expansion
Regional expansion drives competition as more than 40% of firms target new defense hubs through cross-border collaboration and joint ventures. Market share shifts are influenced by accelerated expansion strategies in high-demand territories. Companies reinforce security ecosystems by integrating localized technological advancements, which enables sustainable growth and strengthens strategic positioning in defense alliances worldwide.
Future Outlook
The future outlook points toward heightened focus on adaptive strategies that prioritize innovation and joint defense development initiatives. More than 65% of industry stakeholders anticipate accelerated growth driven by cyber readiness mandates and international defense partnerships. With rising emphasis on integrated systems, the market is set to evolve into a more resilient cybersecurity architecture for military defense frameworks.
Key players in Military Cybersecurity Market include.
- Lockheed Martin Corporation
 - Northrop Grumman Corporation
 - BAE Systems plc
 - Thales Group
 - General Dynamics Corporation
 - Raytheon Technologies Corporation (RTX)
 - Airbus SE
 - IBM Corporation
 - Cisco Systems, Inc.
 - Leidos Holdings, Inc.
 - Booz Allen Hamilton Inc.
 - Science Applications International Corporation (SAIC)
 - ST Engineering Ltd.
 - Israel Aerospace Industries Ltd.
 - ManTech International Corporation
 
In this report, the profile of each market player provides following information:
- Company Overview and Product Portfolio
 - Market Share Analysis
 - Key Developments
 - Financial Overview
 - Strategies
 - Company SWOT Analysis
 
- Introduction 
- Research Objectives and Assumptions
 - Research Methodology
 - Abbreviations
 
 - Market Definition & Study Scope
 - Executive Summary 
- Market Snapshot, By Solution
 - Market Snapshot, By Security Layer
 - Market Snapshot, By Deployment
 - Market Snapshot, By Operation Domain
 - Market Snapshot, By Component
 - Market Snapshot, By Region
 
 - Military Cybersecurity Market Dynamics 
- Drivers, Restraints and Opportunities 
- Drivers 
- Increasing Frequency and Sophistication of Cyber Threats
 - Modernization of Military Technologies and Infrastructure
 - Stringent Regulatory Requirements and Compliance
 
 - Restraints 
- Complexity of Cybersecurity Solutions and Integration
 - Budget Constraints and Funding Challenges
 - Lack of Skilled Cybersecurity Personnel
 
 - Opportunities 
- Rising Investments in Defense Cybersecurity
 - Emerging Technologies like AI and Machine Learning
 - Collaboration and Partnerships between Governments and Private Sector
 
 
 - Drivers 
 - PEST Analysis 
- Political Analysis
 - Economic Analysis
 - Social Analysis
 - Technological Analysis
 
 - Porter's Analysis 
- Bargaining Power of Suppliers
 - Bargaining Power of Buyers
 - Threat of Substitutes
 - Threat of New Entrants
 - Competitive Rivalry
 
 
 - Drivers, Restraints and Opportunities 
 - Market Segmentation 
- Military Cybersecurity Market, By Solution, 2021 - 2031 (USD Million) 
- Threat Intelligence & Response
 - Identity & Access Management
 - Data Loss Prevention
 - Security Information & Event Management
 - Unified Threat Management
 - Risk & Compliance Management
 - Managed Security Services
 - Others
 
 - Military Cybersecurity Market, By Security Layer, 2021 - 2031 (USD Million) 
- Endpoint Security
 - Network Security
 - Cloud Security
 - Application Security
 
 - Military Cybersecurity Market, By Deployment, 2021 - 2031 (USD Million) 
- On-Premise
 - Cloud
 
 - Military Cybersecurity Market, By Operation Domain, 2021 - 2031 (USD Million) 
- Land Forces
 - Air Forces
 - Naval Forces
 
 - Military Cybersecurity Market, By Component, 2021 - 2031 (USD Million) 
- Hardware Appliances
 - Software & Services
 
 - Military Cybersecurity Market, By Geography, 2021 - 2031 (USD Million) 
- North America 
- United States
 - Canada
 
 - Europe 
- Germany
 - United Kingdom
 - France
 - Italy
 - Spain
 - Nordic
 - Benelux
 - Rest of Europe
 
 - Asia Pacific 
- Japan
 - China
 - India
 - Australia & New Zealand
 - South Korea
 - ASEAN (Association of South East Asian Countries)
 - Rest of Asia Pacific
 
 - Middle East & Africa 
- GCC
 - Israel
 - South Africa
 - Rest of Middle East & Africa
 
 - Latin America 
- Brazil
 - Mexico
 - Argentina
 - Rest of Latin America
 
 
 - North America 
 
 - Military Cybersecurity Market, By Solution, 2021 - 2031 (USD Million) 
 - Competitive Landscape 
- Company Profiles 
- Lockheed Martin Corporation
 - Northrop Grumman Corporation
 - BAE Systems plc
 - Thales Group
 - General Dynamics Corporation
 - Raytheon Technologies Corporation (RTX)
 - Airbus SE
 - IBM Corporation
 - Cisco Systems, Inc.
 - Leidos Holdings, Inc.
 - Booz Allen Hamilton Inc.
 - Science Applications International Corporation (SAIC)
 - ST Engineering Ltd.
 - Israel Aerospace Industries Ltd.
 - ManTech International Corporation
 
 
 - Company Profiles 
 - Analyst Views
 - Future Outlook of the Market
 

