8
Cybersecurity on a Global Scale

Cybersecurity on a Global Scale...disruption after a security breach requires an array of technical sup-port. Raytheon’s deployable team of security experts uses penetration testing

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cybersecurity on a Global Scale...disruption after a security breach requires an array of technical sup-port. Raytheon’s deployable team of security experts uses penetration testing

Cybersecurity on a Global Scale

Page 2: Cybersecurity on a Global Scale...disruption after a security breach requires an array of technical sup-port. Raytheon’s deployable team of security experts uses penetration testing

Time-tested Leadership

A global leader for more than a century with customers in 80 nations

supported by offices in 19 countries worldwide, Raytheon recognizes that

shared problems often require shared solutions. This philosophy has fostered

a collaborative spirit of enterprise, allowing the company to build strong

local partnerships with industry and governments around the globe.

Whether your cybersecurity needs are the most advanced products to

augment cur rent operations or a full range of capabilities, services and

training, Raytheon can meet your requirements. Reflecting such strengths

as innovative technology, situational awareness, operational agility and

best-in-class management, Raytheon’s industry-leading products in

cross-domain and multi-domain access, insider threat prevention, and

behavior-based malware detection provide exceptional defense against

the ever-changing advanced persistent threat.

Page 3: Cybersecurity on a Global Scale...disruption after a security breach requires an array of technical sup-port. Raytheon’s deployable team of security experts uses penetration testing

ANTICIPATE WITHSTAND RECOVER EVOLVE

cy-ber re-sil-ien-cy [n.] The ability of a nation, organization, mission

or business process to anticipate, withstand, recover from, and evolve to

improve capabilities in the face of adverse conditions, stresses or attacks

on the supporting cyber resources it needs to function.

Page 4: Cybersecurity on a Global Scale...disruption after a security breach requires an array of technical sup-port. Raytheon’s deployable team of security experts uses penetration testing

To best combat cyber threats in this evolving environ-ment, governments and industries are changing their primary objective from prevention to resiliency. Trying to stop all forms of cyber-attack is no longer considered realistic. The attackers always seem ahead of the defenders.

Successful attacks are all but inevitable regardless of how many resources can be deployed. Instead, orga-nizations now seek ways to withstand attacks while continuing to operate effectively. Over the past several years, Raytheon has emerged as the clear industry leader in developing resiliency for its own technologies, people and operations, then leveraging its expertise and experience to help many other organizations in government and industry do the same.

Cyber resiliency is not something finite that an organi-zation achieves once and then its work is done. Rather, it’s more of a “state” that an organization continually pursues and evolves toward in an effort to stay ahead of any potential adversary. Combining internal develop-ment with external acquisitions, Raytheon offers the best cyber tools to support a full spectrum of operations.

Featured in this arsenal is an automated cyber testing lab whose 5,000 nodes rank it as the industry’s larg-est. With more than 2,500 cybersecurity professionals, Raytheon has developed proven management processes for some of the largest cyber programs in the industry.

So far, the 21st century is defined as much by the societal impact of cyberspace as by

anything else. The benefits are tremendous and appear to be virtually unlimited. Unfortunately,

they come with a steep price. Attacks and crime in cyberspace are increasing dramatically.

In recent years, as the size of the Internet has grown by 28 percent, the number of attacks

has burgeoned by 300 percent. Estimates of cumulative losses exceed $1 trillion.

Radical Change in Cyberspace: New Way to Meet the Threat

Vital Statistics» 5 first-place positions in recent

global cyber competitions

» #1 company in finding zero-day vulnerabilities

» 5,000 nodes in automated cyber testing lab (one of the industry’s largest)

» Led computer emergency response team for 18,000 seats across 3 classified networks — average 15 million blocked attacks/year

Page 5: Cybersecurity on a Global Scale...disruption after a security breach requires an array of technical sup-port. Raytheon’s deployable team of security experts uses penetration testing

Cyber Security Operations Center (SOC)Raytheon delivers turnkey SOC solutions and improves the perfor-mance of an existing center with equal assurance. We’re experts in malware reverse engineering, and our forensic analysis and indica-tor extraction tools and processes are unsurpassed. Our strength in open-source intelligence collection will help customers identify threats and suspicious activity with much greater efficiency. Highly qualified Raytheon personnel sit beside the customer to train staff and assist in operations.

Cyber Learning and Exercise Support Raytheon provides training solu-tions in several formats across the cyber domain. Our customizable offering, which includes executive-level training, supervisor and specialist training for cyber practi-tioners, and broad-based training for the overall workforce, meets any organization’s cyber training needs.

Embedded Information AssurancePhysical systems with embedded electronics face a variety of cyber threats leading to economic loss and mission failure. Raytheon’s protective measures range from traditional defenses such as bound-ary monitors and controls to secure, encrypted communications. We also have the expertise, tools and meth-odology to design security into the architecture of a system, allowing it to operate effectively throughout a cyber attack.

Network Operations and Security ServicesPreventing data loss and business disruption after a security breach requires an array of technical sup-port. Raytheon’s deployable team of security experts uses penetration testing and gap analysis to assess the effectiveness of our customers’ enterprise defenses and to provide incident response, network moni-toring capabilities, malware analy-sis, and technical support.

Supply Chain AssuranceNetwork and weapon system com-ponents are becoming increasingly popular among attackers looking for a vulnerable point of entry. The pur-pose of Raytheon’s supply chain risk management function is to provide assurance that parts and compo-nents acquired from vendors are free of exploitable vulnerabilities, either intentionally placed or resulting from poor manufacturing or soft-ware coding processes.

Advanced Persistent Threat SolutionsSophisticated enough to jeopardize critical systems and even threaten access to staples such as electric-ity and water, today’s cyber threats have outpaced perimeter safeguards. Consequently, most large-scale organizations are already under cyber attack, and many don’t even know it. Raytheon employs the most effective technologies avail-able today to address system and software vulnerabilities, defeat malware, and repel zero-day and socially engineered attacks.

Supporting the Integrated Cyber Mission Area

Page 6: Cybersecurity on a Global Scale...disruption after a security breach requires an array of technical sup-port. Raytheon’s deployable team of security experts uses penetration testing

Building cyber resiliency depends as much on an organization’s cyber processes and people as on technology. By itself, technology cannot deliver true cyber resiliency, which Raytheon views holistically in the triangular terms of a tripod. If the three legs (people, processes and technology) are sturdy, the tripod stands, and cyber resiliency is achieved.

TECHNOLOGIES

OPERATIONS

PEOPLE

Page 7: Cybersecurity on a Global Scale...disruption after a security breach requires an array of technical sup-port. Raytheon’s deployable team of security experts uses penetration testing

Critical Asset ProtectionWeapon systems and their support equipment demand protection. If compromised, mission effectiveness could suffer, system life expectancy and combat effectiveness could shrink, and reverse engineering and intellectual property theft could occur. Our extensive experience in systems hardening, coupled with our recognized expertise in cyber-security architecture and solutions, means Raytheon can offer proven, customizable solutions to protect your most critical assets.

Cyber Situational Awareness and ControlConsidering all elements of the cyber threat is essential to sound decisions. Raytheon’s cyber infor-mation system provides next-gener-ation situational awareness tailored specifically for the user. The system helps users quickly identify and grasp the significance of interrelated threads across the physical, logical and social layers of an enterprise to pinpoint system degradations or threat activity.

Information Assurance ServicesRaytheon’s proven multi-domain and cross-domain information-sharing solutions ensure secure access to or transfer of data among authorized users or applications. These mea-sures bridge the security gap between and inside domains, resulting in a high-speed, efficient, cost-effective sharing process for the most chal-lenging data environments.

Insider Threat and Counterintelligence SolutionsThreats infiltrate organizations in many ways, but the most common path is human behavior. Raytheon solutions constantly guard against the insider threat. We can detect malware before signatures, defini-tions and other indicators appear, saving precious time. Data aggrega-tion capabilities permit a “whole person” view of an individual, as well as enterprise-wide visibility of end-user behavior across networks at various levels of classification.

Vulnerability and Security AssessmentsCritical infrastructures and facili-ties are vulnerable to violence and terrorism. Identifying and assessing these weaknesses help eliminate likely threats, securing intellectual property and protecting person-nel. Using a combination of tools, techniques and certified person-nel, Raytheon provides custom-ized assessments for government agencies, businesses, airports and seaports, water and power utilities, natural gas systems, nuclear plants, and more.

Cybersecurity Services

Page 8: Cybersecurity on a Global Scale...disruption after a security breach requires an array of technical sup-port. Raytheon’s deployable team of security experts uses penetration testing

Approved for public release. Copyright © 2013 Raytheon Company. All rights reserved. Approved June 26, 2013: IIS2013-172 AMEast 4312196 Printed in the U.S.A. The word Raytheon and the Raytheon logo mark are trademarks of Raytheon Company and the subject of U.S. and foreign trademark registrations.

Raytheon Company Global Headquarters 870 Winter StreetWaltham, MA 02451USA+1 781 522 3000

www.raytheon.com

EuropeAvenue Ariane, 51200 Brussels Belgium +32 2 778 49 00 phone

Canada360 Albert StreetOttawa, Ontario K1R 7X7 +1 613 233 4121 phone

Australia4 Brindabella CircuitCanberra 2609+61 2 6122 0231 phone

Raytheon Regional Offices

Middle EastP.O. Box 28225Abu Dhabi, UAE+971 50 616 5697 phone

United Kingdom1 George StreetUB8 1QQ Uxbridge, London+44 1895 816307 phone

Asia Pacific 600 North Bridge Road#09-06 Parkview SquareSingapore 188778 +6567349271 phone