cybersecurity delivering confidence in the cyber domain...as a large-scale systems integrator, we...

6
Cybersecurity Delivering Confidence in the Cyber Domain

Upload: others

Post on 12-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cybersecurity Delivering Confidence in the Cyber Domain...As a large-scale systems integrator, we take a solutions-oriented . approach to addressing advanced persistent threats. We

Cybersecurity Delivering Confidence in the Cyber Domain

Page 2: Cybersecurity Delivering Confidence in the Cyber Domain...As a large-scale systems integrator, we take a solutions-oriented . approach to addressing advanced persistent threats. We

“ From a wide range of industry- leading cyber products to nation-level cyber operations, our customers trust Raytheon’s capabilities to protect their most important networks and help them understand the dynamic cyber domain. We provide these capabilities worldwide and strive to bring the best people, technology and innovation to support their missions.”

— Lynn Dugle, President, Raytheon Intelligence, Information & Services

Page 3: Cybersecurity Delivering Confidence in the Cyber Domain...As a large-scale systems integrator, we take a solutions-oriented . approach to addressing advanced persistent threats. We

GLOBAL FOOTPRINT

END-TO-END CYBER CAPABILITIES

INNOVATION, RESEARCH AND DEVELOPMENT

With decades of intelligence and cyber expertise, Raytheon offers unmatched, full-spectrum, end-to-end cyber solutions that help you secure your space and confidently navigate the cyber domain.As a large-scale systems integrator, we take a solutions-oriented approach to addressing advanced persistent threats. We continue to invest in research and development — and maintain partnerships that span the globe. It’s all part of helping organizations, government agencies and nations effectively minimize cyber risk and safeguard information and infrastructure.

Page 4: Cybersecurity Delivering Confidence in the Cyber Domain...As a large-scale systems integrator, we take a solutions-oriented . approach to addressing advanced persistent threats. We

From access to assurance, Raytheon delivers integrated national and Internet-scale solutions that take an enterprise approach to the world’s toughest cyber challenges.

END-TO-END

CYBER CAPABILITIES

PARTNER WITH A CYBER LEADERRaytheon’s unmatched, full-spectrum, end-to-end cyber solutions enable you to stay confident and in control. It’s about taking a holistic approach to cybersecurity. It’s about leveraging decades of expertise. Most of all, it’s about staying committed to the future of cyber, wherever it may lead.

CYBERSECURITY

Cybersecurity Operations CentersRaytheon deploys people, processes and technologies to provide industry-leading cyber defense and integrated threat management. Our Cybersecurity Operations Centers effectively address advanced threats in high-risk environments.n Partnerships with organizations

and nationsn Agile threat response processesn Scalable, service-oriented architectures n Analysis that identifies and

predicts threatsn Operator selection, training

and mentoring

Computer Security Incident Response TeamAdvanced monitoring, protection and investigation of cyber incidents

vCom (Virtual Cyber Operations Manual)Secure, scalable virtual training environments for individual or team participants

Information Assurance SolutionsWith 50 years of intelligence and military expertise, Raytheon provides robust and resilient architectures, network and data zoning and segregation, hardened configurations, comprehensive assessments, integrated monitoring, identity management and secure supply chain assistance. We use the latest techniques to detect threats and safeguard multiple systems across data classification levels.

Trusted Access™

Secure single or multilevel data, network and application access via a single connection. Available for thin, virtual or mobile devices

Trusted Gateway System™

Multi-directional workflow-based data transfer, including trusted print delivery and a trusted mail system

WebShieldSecure HTTP traffic monitoring for multilevel network access and data retrieval/discovery

Second LookComputer memory capture and preservation for Linux systems

Insider Threat MitigationRaytheon uses a combination of policies, training and monitoring to address insider threats. With scalable solutions that span hundreds of thousands of endpoints across thousands of systems in multiple domains, we enable you to:n Monitor and correlate end-user

behavior across networksn Observe, aggregate, analyze and

audit data from the endpointn Balance privacy with protection

SureView™

Proactive, endpoint information protection solution

SureView CrossView™

Cross-domain transfer capability

SureView Convergence™

Enterprise visibility to multiple security data sources

Privileged User Management PoliciesPrivileged user abuse monitoring, detection and deterrence

5050 YEARS AS AN INTELLIGENCE

INDUSTRY PRIME

80COUNTRIES IN

WHICH WE HAVE CUSTOMERS WORLDWIDE

Page 5: Cybersecurity Delivering Confidence in the Cyber Domain...As a large-scale systems integrator, we take a solutions-oriented . approach to addressing advanced persistent threats. We

Threat Research and AssessmentsRaytheon leverages the latest technologies to assess internal and external vulnerabilities, reduce threat surfaces and determine security control effectiveness. From identifying avenues of attack to helping you develop a mitigation plan, we effectively support your security architecture and operations.n 300 million+ tests/weekn Static and dynamic software analysis n Cooperative and non-cooperative

engagementsn Network emulation of more than

100,000 endpointsn Processes for turning threat indicators

into defensive action

Open Source Intelligence Critical research that identifies advanced threat indicators online

Fly-away KitsMobile capability that enables on-site incident response and remediation, forensics, malware capture and analysis

ForensicsComprehensive IT forensics training and certification

Proactive/Dynamic DefenseThrough state-of-the-art cyber surveillance, reconnaissance and counter-intelligence, Raytheon enables you to confuse cyber intruders and thwart attack. Determining new attack vectors, monitoring network behavior, employing fused multi-source information to “connect the dots” — it’s all part of effective proactive defense.n Layered defense with integrated and

reinforcing featuresn Data exfiltration preventionn Rapid cyber threat information sharing

and defense tuning

Web Monitoring SystemDistributed scalable monitoring and analysis of foreign language websites and social media

Open Source Intelligence Identifying threat vectors for proactive diverting and blocking

Broadcast Monitoring System Continuous real-time monitoring of international television, radio and web media

Predictive Data AnalyticsRaytheon leverages deep domain expertise and powerful analytics to predict the next cyber attack. Our automation solutions streamline analysis and enhance productivity, while connecting potential risks to your operational and business goals.

Intersect Analytics ProductsAutomated predictive analytics tools

Data ClarityDynamic cyber modeling and simulation framework

SureView Spotlight Analytics Interface™

Seamless integration with best of breed analytical tools

Conversational Speech Transcription and Retrieval System (C-STARS)Discover and retrieve content in recorded conversational telephone speech

100,000+HUNDREDS OF

THOUSANDS OF ENDPOINTS

1,000THOUSANDS

OF CYBER PROFESSIONALS

ENTERPRISE-WIDE

#1LEADING INDUSTRY

PARTNER ON DARPA’S CYBER

PROGRAMS

300300 MILLION+

INTERNET-SCALE VULNERABILITY

TESTS

Page 6: Cybersecurity Delivering Confidence in the Cyber Domain...As a large-scale systems integrator, we take a solutions-oriented . approach to addressing advanced persistent threats. We

Cleared for public release. Copyright ©2014 Raytheon Company. All rights reserved. IIS2014-063 The word Raytheon and the Raytheon logo mark are trademarks of Raytheon Company and the subject of U.S. and foreign trademark registrations.

Raytheon Intelligence, Information and Services 22270 Pacific BoulevardSterling, VA 20166USA

www.raytheon.com/cyber