cybersecurity delivering confidence in the cyber domain...as a large-scale systems integrator, we...
Post on 12-Oct-2020
0 Views
Preview:
TRANSCRIPT
Cybersecurity Delivering Confidence in the Cyber Domain
“ From a wide range of industry- leading cyber products to nation-level cyber operations, our customers trust Raytheon’s capabilities to protect their most important networks and help them understand the dynamic cyber domain. We provide these capabilities worldwide and strive to bring the best people, technology and innovation to support their missions.”
— Lynn Dugle, President, Raytheon Intelligence, Information & Services
GLOBAL FOOTPRINT
END-TO-END CYBER CAPABILITIES
INNOVATION, RESEARCH AND DEVELOPMENT
With decades of intelligence and cyber expertise, Raytheon offers unmatched, full-spectrum, end-to-end cyber solutions that help you secure your space and confidently navigate the cyber domain.As a large-scale systems integrator, we take a solutions-oriented approach to addressing advanced persistent threats. We continue to invest in research and development — and maintain partnerships that span the globe. It’s all part of helping organizations, government agencies and nations effectively minimize cyber risk and safeguard information and infrastructure.
From access to assurance, Raytheon delivers integrated national and Internet-scale solutions that take an enterprise approach to the world’s toughest cyber challenges.
END-TO-END
CYBER CAPABILITIES
PARTNER WITH A CYBER LEADERRaytheon’s unmatched, full-spectrum, end-to-end cyber solutions enable you to stay confident and in control. It’s about taking a holistic approach to cybersecurity. It’s about leveraging decades of expertise. Most of all, it’s about staying committed to the future of cyber, wherever it may lead.
CYBERSECURITY
Cybersecurity Operations CentersRaytheon deploys people, processes and technologies to provide industry-leading cyber defense and integrated threat management. Our Cybersecurity Operations Centers effectively address advanced threats in high-risk environments.n Partnerships with organizations
and nationsn Agile threat response processesn Scalable, service-oriented architectures n Analysis that identifies and
predicts threatsn Operator selection, training
and mentoring
Computer Security Incident Response TeamAdvanced monitoring, protection and investigation of cyber incidents
vCom (Virtual Cyber Operations Manual)Secure, scalable virtual training environments for individual or team participants
Information Assurance SolutionsWith 50 years of intelligence and military expertise, Raytheon provides robust and resilient architectures, network and data zoning and segregation, hardened configurations, comprehensive assessments, integrated monitoring, identity management and secure supply chain assistance. We use the latest techniques to detect threats and safeguard multiple systems across data classification levels.
Trusted Access™
Secure single or multilevel data, network and application access via a single connection. Available for thin, virtual or mobile devices
Trusted Gateway System™
Multi-directional workflow-based data transfer, including trusted print delivery and a trusted mail system
WebShieldSecure HTTP traffic monitoring for multilevel network access and data retrieval/discovery
Second LookComputer memory capture and preservation for Linux systems
Insider Threat MitigationRaytheon uses a combination of policies, training and monitoring to address insider threats. With scalable solutions that span hundreds of thousands of endpoints across thousands of systems in multiple domains, we enable you to:n Monitor and correlate end-user
behavior across networksn Observe, aggregate, analyze and
audit data from the endpointn Balance privacy with protection
SureView™
Proactive, endpoint information protection solution
SureView CrossView™
Cross-domain transfer capability
SureView Convergence™
Enterprise visibility to multiple security data sources
Privileged User Management PoliciesPrivileged user abuse monitoring, detection and deterrence
5050 YEARS AS AN INTELLIGENCE
INDUSTRY PRIME
80COUNTRIES IN
WHICH WE HAVE CUSTOMERS WORLDWIDE
Threat Research and AssessmentsRaytheon leverages the latest technologies to assess internal and external vulnerabilities, reduce threat surfaces and determine security control effectiveness. From identifying avenues of attack to helping you develop a mitigation plan, we effectively support your security architecture and operations.n 300 million+ tests/weekn Static and dynamic software analysis n Cooperative and non-cooperative
engagementsn Network emulation of more than
100,000 endpointsn Processes for turning threat indicators
into defensive action
Open Source Intelligence Critical research that identifies advanced threat indicators online
Fly-away KitsMobile capability that enables on-site incident response and remediation, forensics, malware capture and analysis
ForensicsComprehensive IT forensics training and certification
Proactive/Dynamic DefenseThrough state-of-the-art cyber surveillance, reconnaissance and counter-intelligence, Raytheon enables you to confuse cyber intruders and thwart attack. Determining new attack vectors, monitoring network behavior, employing fused multi-source information to “connect the dots” — it’s all part of effective proactive defense.n Layered defense with integrated and
reinforcing featuresn Data exfiltration preventionn Rapid cyber threat information sharing
and defense tuning
Web Monitoring SystemDistributed scalable monitoring and analysis of foreign language websites and social media
Open Source Intelligence Identifying threat vectors for proactive diverting and blocking
Broadcast Monitoring System Continuous real-time monitoring of international television, radio and web media
Predictive Data AnalyticsRaytheon leverages deep domain expertise and powerful analytics to predict the next cyber attack. Our automation solutions streamline analysis and enhance productivity, while connecting potential risks to your operational and business goals.
Intersect Analytics ProductsAutomated predictive analytics tools
Data ClarityDynamic cyber modeling and simulation framework
SureView Spotlight Analytics Interface™
Seamless integration with best of breed analytical tools
Conversational Speech Transcription and Retrieval System (C-STARS)Discover and retrieve content in recorded conversational telephone speech
100,000+HUNDREDS OF
THOUSANDS OF ENDPOINTS
1,000THOUSANDS
OF CYBER PROFESSIONALS
ENTERPRISE-WIDE
#1LEADING INDUSTRY
PARTNER ON DARPA’S CYBER
PROGRAMS
300300 MILLION+
INTERNET-SCALE VULNERABILITY
TESTS
Cleared for public release. Copyright ©2014 Raytheon Company. All rights reserved. IIS2014-063 The word Raytheon and the Raytheon logo mark are trademarks of Raytheon Company and the subject of U.S. and foreign trademark registrations.
Raytheon Intelligence, Information and Services 22270 Pacific BoulevardSterling, VA 20166USA
www.raytheon.com/cyber
top related