Skip to content Go to main navigation Go to language selector
Saab Global
sat

From Data to Decision: Securing Clarity and Speed in MDO

6 min read

In modern conflicts, the advantage lies with those who can understand, decide and act with precision more quickly. When data flows across domains, the real challenge lies in turning complexity into clarity while ensuring that information remains secure, sovereign and trustworthy.

Data is becoming an increasingly central and integral part of defence. Through data fusion, machine learning, artificial intelligence, and continuous refinement, data can strengthen human judgement and accelerate the path from insight to action. The purpose of these technologies is not to replace people, but to support them by providing greater speed, clarity and confidence.

However, speed alone is not enough. In defence, the challenge lies not only in moving faster, but also in protecting information from adversaries while ensuring that it is visible only to authorised users.

gripen e flying with ai  1940

From Data to Decision in Multi-Domain Operations

In the future, commanders and decision-makers will no longer be able to wait for reports from different branches, systems and classifications to be compiled. They require an immediate, comprehensive overview of events unfolding across land, sea, air, cyber and space, combined with insight into potential future developments. This puts considerable pressure on the flow of data through various communication methods.

As multi-domain operations evolve, leaders require real-time visibility of assets from sea to space. Data from sensors, vehicles, troops, satellites, drones, civil infrastructure, weather systems, logistics chains and intelligence streams must converge into a common operational picture that filters out irrelevant information, highlights what matters and reveals patterns too complex for any human to process alone.

sat
"From orbit to action, data leads the way"

This is not about information overload. It is about clarity, focus and foresight. It is about enabling leaders to act while a threat is still emerging, rather than after it has already materialised. The key question therefore becomes how data can be secured without slowing decisions.

Security that stays with the data

The Zero Trust security model (ZT) - a design and implementation strategy of IT systems - is based on a clear principle: never trust, always verify. Trust is not implicit based on network location or system ownership; instead, every request for access is continuously evaluated. This includes users, devices, applications, and services operating inside the network perimeter.

Within NATO, a closely aligned concept is Data‑Centric Security (DCS), which reflects the shift away from perimeter‑based defence towards protecting information as a strategic asset. NATO’s data‑centric approach is commonly framed around three core focus areas: Control, Protect, and Share.

Together, these principles underpin advanced platforms and are fundamental to mission‑critical environments where information superiority, resilience, and trust must be preserved under contested conditions.

 ska6725 edt kopiera

Enforcing Security in Coalition Operations

For platforms operating in joint and combined environments, Data‑Centric or Zero Trust security ensures that every person, system, and partner nation has access only to the information they are authorised and entitled to see. This supports both the protection of sensitive information and the delivery of an operational picture tailored to each role, responsibility, and mission.

For example, a soldier’s tablet may be required to verify its identity, configuration, and security posture before each access request. Authorisation is limited to the specific data or service required to perform the task at hand and never to the broader network by default. 

Behaviour is continuously assessed, and anomalies can trigger renewed authorisation checks, restriction, or revocation of access. Even highly privileged users and administrators are subject to the same principles.

Must be sovereign by design

For nations and coalitions, digital command has become a matter of sovereignty. As digital infrastructure evolves, national institutions and parts of civil infrastructure will become increasingly connected to defence operations, raising legal, operational and security issues.

 dsc4583 hr cmyk

This is why platforms with highly sensible data should be deployable on sovereign national infrastructure, governed by national rules and designed to support host nation data controls. This gives armed forces the ability to control their digital command layer while seamlessly sharing it with allies on their own terms.

Supporting the rear and frontlines of communication                         

As operations evolve, connections across the force must deepen both vertically and horizontally. The power of multi-domain capability is not confined ton empower senior leadership. It extends to local commanders, frontline personnel and the logistical support behind them, delivering better information to both the front and the rear.

In times of conflict, the pressure does not stop at the battlefield. Energy grids, communications systems, transportation networks, and other elements of civilian infrastructure may be disrupted, degraded, or contested. These systems sit at the interface between the military and civil society and are central to Civil–Military Cooperation (CIMIC).

Within a multi‑domain context, civilian infrastructure is not only something to be protected it is also a producer and consumer of operationally relevant data. In the near future - information flows between civil authorities, operators of critical infrastructure, humanitarian actors, and military forces become essential for shared situational awareness, coordination, and decision‑making across domains.

In such an environment, the movement of information cannot rely on any single form of connectivity.

Resilience depends on secure communication across multiple channels. Satellite, mobile, fibre and legacy communications networks, as well as established infrastructure, must work together to ensure data can be moved where and when it is needed. This supports continuity across the force, strengthening every line of communication and defence.

220519 p5 63 lh13664

Built for what comes next

The future battlespace will require more than speed alone. It will demand clarity amid complexity, resilience under pressure, and the capacity to act without compromising security or sovereignty. In such an environment, advantage will lie with those who can connect information across domains, protect it at every stage, and sustain its flow to those who need it most, even when primary communication channels are disrupted.

This is not about replacing human judgement. It is about reinforcing it. It is about giving commanders, decision-makers and operators the confidence to act faster with a better understanding and greater control. This capability forms the foundation of modern defence and of preparing for the future battlespace.