Featured Products

Trusted Thin ClientTrusted Thin Client®
An accredited solution that provides users with secure simultaneous access to information on any number of different networks through a single connection point. Trusted Thin Client maintains secure data separation while allowing users appropriate access to networks at different classification levels (e.g., Top Secret/SCI, Secret, and Sensitive But Unclassified) or to networks that hold the same security level in an organization (e.g., the Internet and a financial network).

more...

Trusted Gateway System™Trusted Gateway System™
Provides exceptional built-in manual review and automatic validations, such as virus scanning, file type verification, dirty word search, and deep content inspection, enabling safe and simultaneous data movement between networks at different sensitivity levels.

more...

High Speed GuardHigh Speed Guard
An accredited solution that enables highly complex, bi-directional, automated data transfers between multiple domains. High Speed Guard has demonstrated the fastest bi-directional transfer rates of more than 9 gigabits per second (Gb/s) on dual processor commodity servers.

more...

Trusted Print Delivery™Trusted Print Delivery™
A Commercial-Off-The-Shelf (COTS), highly secure, multi-directional guard solution that allows users to print from existing applications at different security or sensitivity levels to a single printer located on the high side network. Reducing printer hardware at individual security levels reduces capital investment, printer inventory, hardware maintenance/supplies, and administration.

more...

WebShieldWebShield
A data guard that provides secure web search and browse-down capabilities from high side networks to lower level networks. WebShield is a secure mechanism for complete information browsing and discovery.

more...

SimShield™SimShield™
SimShield is an accredited COTS fixed-format data guard with the capability to label, segregate, protect, and exchange data between systems executing at different sensitivity or classification levels. SimShield allows for more effective training activities and more efficient test events resulting in overall cost savings, a better trained warfighter and more thoroughly and quickly tested equipment.

more...

Small Format Guard™Small Format Guard™
Small Format Guard is a small, lightweight guard that provides low-power, high throughput and low latency. Built to operate outside of traditional data centers, Small Format Guard supports robust security protocols and is adaptable to specific mission needs where strict size, weight, power, and cooling (SWaP-C) specifications are required.

more...

Trusted Mail System™Trusted Mail System™
Trusted Mail System is a Commercial-Off-The-Shelf (COTS) highly secure solution that enables the policy-enforced exchange of emails and attachments between users on different networks eliminating the need to switch between email systems at multiple levels. TMS provides a single inbox that consolidates email residing on multiple networks, at the highest level.

more...

SureView™SureView™
Although technology introduces avenues for threats to enter an organization, it is the users, not the technology itself that put organizations' information in jeopardy. SureView™ enables safe and effective use of mission-critical technologies by capturing human behavior technical observables, which include policy violations, compliance incidents or malicious acts that are warning signs leading up to a breach.

more...

CrossView™CrossView™
The Raytheon CrossView Solution provides cross domain transfer capability for Raytheon SureView, enabling SureView agents from multiple networks to operate on one, consolidated, SureView system. This offers a comprehensive picture of user activity across networks with different classification levels within SureView.

more...

Convergence™Convergence™
Convergence aggregates audit data from multiple external data sources, such as HR records, phone logs and physical access into an existing SureView system. The aggregation of this data with existing SureView data provides a broader set of easily searchable data that can produce more insight into an individual’s activities and behaviors.

more...

DataClarity®DataClarity®
The Data Clarity® Platform is a big data search and analytics enterprise application with a low total cost of ownership that reduces the risk and loss fraudulent activities pose to operations.

more...

Trusted Thin Client RemoteTrusted Thin Client Remote
Trusted Thin Client Remote allows users to take the same secure network access provided through Trusted Thin Client and Trusted Thin Client Virtual into the field on an encrypted bootable USB memory stick, SD memory card, embedded hard drive, or solid state drive (SSD).

more...

Trusted Access: MobileTrusted Access: Mobile
Trusted Access: Mobile provides the highest level of security available today for accessing sensitive data from mobile devices (smartphones and tablets). Trusted Access: Mobile utilizes a virtual mobile infrastructure (VMI) and secure redisplay technologies to allow mobile users to access sensitive data without risk of data loss or leakage.

more...

Trusted Thin Client VirtualTrusted Thin Client Virtual
An accredited solution that provides users with secure simultaneous access to information on any number of different networks through a single connection point.Trusted Thin Client Virtual maintains secure data separation while allowing users appropriate access to networks at different classification levels (e.g., Top Secret/SCI, Secret, and Sensitive But Unclassified) or to networks that hold the same security level in an organization (e.g., the Internet and a financial network).

more...

SpotlightSpotlight™
SureView Spotlight is an analytics framework that enables seamless integration with best of breed analytical tools including: risk assessment algorithm, anomaly detection, user trend analysis, role based profiling and threat indicators to mitigate the insider threat.

more...

Press and Media Releases

November 5, 2014 - Raytheon to Present at Australia’s Military Communications and Information Systems Conference (MilCis) 2014 Company Executive to Address Benefits of Military-Grade Cross Domain Solutions for Information Sharing

Dulles, Va., – November 5, 2014 -- Raytheon Company (NYSE: RTN),today announced that Jason Ostermann, Chief Engineer, Raytheon Cyber Products will present a session titled, “Reduce Risk and Increase Collaboration through Secure Information Sharing” at the Military Communications and Information Systems Conference (MilCis) in Canberra, Australia.

WHAT:

Cross domain information sharing solutions are built with strict security controls to ensure that the right data is shared with the right people and across systems to efficiently and effectively protect personal and public interests. In this session, attendees will learn the importance of secure data transfer, from machine-to-machine and person-to-person, while mitigating against viruses, malware and policy violations

WHEN: Wednesday, November 12, 2014; 4:00 p.m. – 5:00 p.m.
WHO: Jason Ostermann, Chief Engineer, Raytheon Cyber Products
WHERE: National Convention Center
31 Constitution Ave, Canberra ACT 2601, Australia
October 22, 2014 - Raytheon Executive to Speak at Cyber Security & Information Technology Day at Peterson Air Force Base Session to Focus on How to Protect and Share Data across Integrated Operations

Dulles, Va., – October 22, 2014 -- Raytheon Company (NYSE: RTN), today announced announced that Randy Hill, Cross Domain Solutions Architect, Raytheon Cyber Products will present a session titled, “Delivering Actionable Intelligence through Secure Information Sharing” at the Cyber Security & Information Technology Day at Peterson Air Force Base. The event is hosted by the Information Systems Security Association’s Colorado Springs Chapter.

WHAT:

How do you keep critical information dispersed across different secure networks safe, yet ensure that it is readily available to the people who need it at the time that they need it? With classified information residing in numerous secured networks throughout the DoD and Intelligence agencies, that becomes a serious challenge. Add to that challenge the fact that the people who need access to highly sensitive data may be granted access at varying classification levels depending on the network on which the data resides. This session will focus on best practices and real-world government implementations for how this problem is being addressed today and what the government is doing to ensure the right balance between information protection and information sharing.

WHEN: Wednesday, October 29, 2014; 10:00 a.m. – 11:00 a.m.
WHO: Randy Hill, Cross Domain Solutions Architect, Raytheon Cyber Products
WHERE: Peterson Air Force Base, Colorado Springs, CO
667 Ent Ave, Colorado Springs, CO 80914
October 17, 2014 - Raytheon to Host Webcast on Assessment & Authorization Processes for Cross Domain Solutions Webcast Educates Attendees on Transition from Certification & Accreditation to Assessment & Authorization

Dulles, Va., – October 17, 2014 -- Raytheon Company (NYSE: RTN), today announced announced that it is partnering with Government Computer News (GCN) to host a webcast titled, “Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions.” Certification & Accreditation (C&A) is transitioning to Assessment & Authorization (A&A) as part of an evolution of existing Information Assurance (IA) practices. It is a profound step forward that advances the practice of IA at the Department of Defense (DoD) and reflects the growing importance of IA within the federal government.

WHAT:

This webcast will update attendees with the latest information on A&A processes for cross domain, multilevel security solutions. In this webcast attendees will learn:

  • How to understand and navigate the SABI (Secret and Below Interoperability) and TSABI (Top Secret/SCI and Below Interoperability) processes
  • Changes to processes and documentation that impact SABI and TSABI
  • Current initiatives to standardize the A&A approaches and processes
WHEN: Thursday, October 23, 2014 at 2:00 PM EDT (18:00:00 UTC)
WHO: Steve Welke is a Principal Consultant for Assurance Policy and Standards at Raytheon. For nearly three decades, Steve has been working in the information assurance field, with specific focus on trusted operating system and cross domain solution requirements.
REGISTER: http://gcn.com/webcasts/2014/10/raytheon-update-assessment-and-authorization-102314.aspx?tc=page0
October 3, 2014 - Raytheon Analytics Expert Selected to Present at ISS World Americas

Dulles, Va., – October 3, 2014 -- Raytheon Company (NYSE: RTN), today announced that Christopher Westphal, Director of Analytics Technologies, Cyber Products, and Steven Tessler, Cyber Engineer, Cyber Products, will present three seminars at ISS World Americas. Scheduled to take place October 6-8, 2014, in Bethesda, MD, this conference brings together North and South American law enforcement, intelligence and homeland security analysts as well as telecom operators to provide attendees with methodologies and tools to combat drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's telecommunications networks, the internet and social networks.

WHAT:
  • Visual Analytics: Discovering Real-World Patterns by Exploiting Meta Data Content
    Christopher Westphal, Monday, October 6, 2014, 1:00-3:15 p.m. ET
  • Big Data Analytics for Entity Based Representations: Detecting Networks, Connections, and Correlations
    Christopher Westphal,
    Monday, October 6, 2014, 3:30-4:30 p.m. ET
  • How Big Data Analytics is Empowering the Pursuit – and Conviction – of Criminals
    Steven Tessler,
    Tuesday, October 7, 2014, 11:30-12:30 p.m. ET
WHERE: Bethesda North Marriott Hotel & Conference Center
5701 Marinelli Road Bethesda, Maryland 20852 USA
WHO: Christopher Westphal, Director of Analytics Technologies, Raytheon Cyber Products and  Steven Tessler, Cyber Engineer, Raytheon Cyber Products
September 30, 2014 - Raytheon, Lexmark and Government Computer News Present Cost Savings through Secure Printing Webcast Learn How to Print from Existing Applications at Different Security or Sensitivity Levels to a Single Printer

Dulles, Va., – September 30, 2014 -- Raytheon Company (NYSE: RTN), today announced that it is partnering with Lexmark and Government Computer News (GCN) to host a webcast titled, “Increase Data Security through Your Print Solution.”

WHAT:

You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect information from across your organization with the people who need it, exactly when they need it. In this webcast, attendees will learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies. Attendees will learn:

  • How to streamline your printing environment
  • How to increase security through an automated file transfer process
  • How a multilevel printing solution can benefit your enterprise
  • Benefits of a workflow optimization initiative
WHEN: Thursday, October 2, 2014 at 2:00 PM EDT (18:00:00 UTC)
WHO: Graham Welling is Product Development Manager at Raytheon Cyber Products for cross domain transfer solutions.

Mark Vance is a program manager in Lexmark's Global Marketing organization and manages Lexmark’s output management software portfolio worldwide
REGISTER: http://gcn.com/webcasts/2014/10/raytheon-increase-data-security-100214.aspx?tc=page00

Attendees will receive a copy of Raytheon’s whitepaper titled “Printer Consolidation While Increasing Data Security.”

September 30, 2014 - Raytheon and Government Computer News to Present Insider Threat Detection Webcast Learn how Organizations Leverage Visibility into End-user Behavior with Big Data Analytics to Detect and Prevent Insider Misuse

Dulles, Va., – September 30, 2014 -- Raytheon Company (NYSE: RTN), Raytheon Company (NYSE: RTN) today announced that it is partnering with Government Computer News (GCN) to host a webcast titled, “Big Data Marries End User Behavior – Mitigate the Insider Threat.”

WHAT:

Business leaders hear a lot of buzz words. Two at the top of today’s list are: big data and insider threat. What do they really mean? Are they really worthy of attention? Why do some trusted insiders do bad things, and how do many organizations allow those bad things to happen? And most importantly, how can organizations leverage visibility into end-user behavior with big data analytics, to detect and prevent insider misuse? Attendees will learn:

  • 3 activities to worry about regarding the insider threat
  • 5 ways they’re allowed to happen
  • How big data and end-user behavior effectively mitigate the threat
  • Lessons learned from a decade of implementing insider threat programs
WHEN: Thursday, October 9, 2014 at 2:00 PM EDT (18:00:00 UTC)
WHO: Daniel Velez is Senior Program Manager for Insider Threat at Raytheon where he is responsible for the delivery and support of insider threat monitoring, investigation solutions and services to Raytheon's customers. Prior to joining Raytheon, he served as a Sr. Cyber Counterintelligence Investigator specializing in insider threat detection and investigations. He is also retired from the U.S Navy Submarine Force where he served in duties from nuclear reactor operations to strike group operations and antisubmarine warfare.

Derek Brink, Vice President/Research Fellow, Information Technology at Aberdeen Group helps organizations to improve their security and compliance initiatives by researching, writing about and speaking about the people, processes and technologies that correspond most strongly with leading performance. Brink joined Aberdeen in 2007 with more than 20 years of experience in high-tech strategy development and execution, corporate / business development, product management and product marketing, including positions at RSA Security, IBM, Sun Microsystems, and Hewlett-Packard.
REGISTER: http://gcn.com/webcasts/2014/10/raytheon-mitigate-the-insider-threat-100914.aspx?&pc=G4434x1&utm_source=webmktg&utm_medium=E-Mail&utm_campaign=G4434x1
September 24, 2014 - Raytheon Executive to Address “Mitigating Privileged User Abuse” at NASA Goddard Cyber Expo 2014

Dulles, Va., – September 24, 2014 -- Raytheon Company (NYSE: RTN), today announced that Ashok Sankar, Vice President of Cyber Strategies, Raytheon Cyber Products will present a session titled, “The Privileged User Discussion: Security Enforcer or Threat?” at the NASA Goddard Cyber Expo 2014

WHAT: This session will provide attendees with best practices for building a privileged user strategy, outline who has a privileged user problem, use cases – IT sabotage, fraud, financial gain, etc., as well as share findings from CERT’s research on this growing challenge.

At the core of the privileged user problem is this dichotomy: With greater access to a company’s computer assets comes greater security risk. The privileged user can be a company’s security enforcer, but also its greatest security liability. Put another way, if a privileged user wants to do bad things, their elevated access to the company network – and all the information that entails -- makes it easier for them. Further, because of the access they maintain to their organization’s most confidential information, they become high-value targets to corporate “hacktivists” and adversaries eager to penetrate a company’s defenses.
WHO: Ashok Sankar, Vice President of Cyber Strategies, Raytheon Cyber Products
WHEN: Thursday, October 2, 2014; 1:00 p.m. – 1:30 p.m.
WHERE: NASA Goddard Space Flight Center, Greenbelt, MD
8800 Greenbelt Road, Greenbelt, MD 20771
September 22, 2014 - Raytheon survey reveals mobile device security is sacrificed for workforce efficiency Risks will only increase as mobile device usage expands

Dulles, Va., – September 22, 2014 -- Raytheon Company (NYSE: RTN) While mobile devices are an integral part of the workplace, the cyber security practices and budgets in most organizations are not keeping pace with the growing number of devices that must be managed and kept secure. According to a new survey issued today by Raytheon Company (NYSE: RTN), 52 percent of organizations and employees frequently sacrifice security practices to realize the efficiency benefits of mobile connectivity.

The report, "Security in the New Mobile Ecosystem," was conducted by information security industry leader Ponemon Institute. The comprehensive report is based on 618 respondents who implement enterprise security, manage mobile technologies and platforms, and set mobile strategy. Fifty-seven percent of respondents identified themselves as senior executives/managers.

According to the research, on average one-third of employees use mobile devices exclusively to do their work and this is expected to increase significantly to an average of 47 percent of employees in the next 12 months. Even in light of this anticipated growth, 64 percent surveyed claimed that they do not currently or expect to have sufficient budget to mitigate or curtail mobile device cyber security threats.

Despite the increasingly high levels of cyber security risks with mobile devices, the top two methods being used today – Mobile Device Management (MDM) and secure containers – are not sufficient. In fact, half of those surveyed are not satisfied with their organization's current mobile security solutions, and 57 percent agreed that implementing a virtualization-based solution, which keeps data off of the actual device, should be considered.

"This survey points to the fact that there is a struggle to find the right balance between the cyber security needs of an organization and the efficiencies demanded by employees to do their jobs,"Ashok Sankar, senior director of product management and strategy at Raytheon Cyber Products. "Mobile devices are becoming a dominant workplace tool, and organizations must adopt a mobile strategy with data security technologies that enable employees to work effectively without putting sensitive information at risk."

For a full copy of the report, go to  Security in the New Mobile Ecosystem

About the Ponemon Institute 
The Ponemon Institute is dedicated to advancing responsible information and privacy management practices in business and government. To achieve this objective, the Institute conducts independent research, educates leaders from the private and public sectors, and verifies the privacy and data protection practices of organizations in a variety of industries. For more information, visit http://www.ponemon.org.

September 10, 2014 - Raytheon Director of Insider Threat Strategies Selected as Panelist for New York Cyber Security Summit Panel to Explore the Human Element, Insider Threats, Social Networking, Behavioral Aspects and how to Implement Security Awareness Programs

Dulles, Va., – September 10, 2014 -- Raytheon Company (NYSE: RTN), today announced that Michael Crouse, Director of Insider Threat Strategies, Cyber Products, will participate on a panel discussion titled “The Weakest Link – Securing the Human” at the 2014 Cyber Security Summit in New York City. Taking place on September 18, the event is part of a conference series connecting C-Level and senior executives with cutting-edge technology providers and renowned information security experts.

WHAT: Many organizations focus on implementing new and innovative technologies when it comes to cyber security and protecting the enterprise. However, these very same organizations are failing to address their greatest risk, the human. This panel will explore how organizations are effectively addressing this issue to include what human risks they are addressing, how they are effectively mitigating them and how they are measuring their impact.
WHO: Michael Crouse, Director of Insider Threat Strategies, Raytheon Cyber Products
WHEN: Thursday, September 18, 2014; 10:15 a.m. – 11:00 a.m. ET
WHERE: The Hilton New York, New York, NY, 1335 Avenue of the Americas, New York, NY 10019
September 2, 2014 - Raytheon Hosts SANS Webcast Focused on how to Address Insider Threats in Law Enforcement The Internal Data Thief, the Privileged User is Increasingly Growing as a Serious Problem

Dulles, Va., – September 2, 2014 -- Raytheon Company (NYSE: RTN), today announced that it is partnering with the SANS institute to host a webcast titled, “Solving Insider Threats in Law Enforcement.”

WHAT: Just like any other institution with valuable information and influence, law enforcement agencies from the largest and most well-known to the smallest local agencies are all potential targets. While most enterprises are more concerned with external threats, the internal data thief, the privileged user, is far more serious problem for law enforcement. In this webcast, attendees will hear expert analysis of the problem that law enforcement institutions face and provide suggestions for preventing, detecting and protecting against these threats.
WHO: Michael Crouse is director of insider threat strategies for Raytheon. In this role Mr. Crouse oversees the execution of existing federal and commercial cyber audits/antimalware requirements programs, while identifying new, global growth opportunities within the Department of Defense (DoD)/Intelligence Community (IC) and the private sector. He works closely with top government decision makers and lends key influence in helping them develop new network security policies, specifically with regard to audit requirements and the detection and mitigation of insider threats.
WHEN: Friday, September 05 at 1:00 PM EDT (17:00:00 UTC)
REGISTER: https://www.sans.org/webcasts/98450
August 25, 2014 - Raytheon Hosts SANS Webcast to Outline Nine Steps Towards Implementing a Successful Insider Threat ProgramNine Steps Emphasizes the Importance of Integrating the Human Dynamic with Technology Options

Dulles, Va., – August 25, 2014 -- Raytheon Company (NYSE: RTN), today announced that it is partnering with the SANS institute to host a webcast titled, “Nine Steps Towards a Successful Insider Threat Program.”

WHAT: This session will focus around steps every organization can take to implement a successful insider threat program. Every complete insider threat program contains these elements: policies, processes, technology controls, risk management and auditing/monitoring. If there's a unifying message within all of the steps of an insider threat program is that it is not about technology - it is about people and technology.
WHO: Daniel Velez is the Senior Program Manager for Insider Threat at Raytheon Cyber Products, and he is responsible for the delivery and support of insider threat monitoring and investigation solutions and services to Raytheon's customers. Prior to joining Raytheon, Daniel served as a Sr. Cyber Counterintelligence Investigator specializing in insider threat detection and investigations. Daniel is also retired from the U.S Navy Submarine Force where he served in duties from nuclear reactor operations to strike group operations and antisubmarine warfare.
WHEN: Tuesday, August 26 at 1:00 PM EDT (17:00:00 UTC)
REGISTER: https://www.sans.org/webcasts/steps-successful-insider-threat-program-98270

In addition to this webcast please download our whitepaper titled, “Privileged Users: Superman or Superthreat? A Privileged User Risk” This paper includes details on the nine steps. http://trustedcs.com/resources/whitepapers/RTN-PrivilegedUserAccessPUMARiskMitigationWP.pdf

August 4, 2014 - Raytheon Executives to Speak at National Association of State Auditors, Comptrollers and Treasurers Annual ConferencePanel Session to Focus on Critical Role Analytics Play in Identifying Fraud and Cyber Attacks

Dulles, Va., – August 4, 2014 -- Raytheon Company (NYSE: RTN), today announced that Christopher Westphal, Director of Analytics Technology, Cyber Products, and Steven Tessler, Senior Computer Systems Technologist, Cyber Products will participate on a panel session at the National Association of Auditors, Comptrollers and Treasurers’ annual conference titled “Analytics Tools: Hot on the Trail of Fraudsters and Cyber Criminals.” Scheduled to take place August 9-13 in Sante Fe, NM, the conference will cover current and emerging trends in IT, workforce and performance management, policies and accountability and transparency.

WHAT: When it comes to fraud cases and cyber network attacks, analytics solutions provide a turnkey system for proactively monitoring, detecting and preventing these threats. For example, state auditors, comptrollers and treasurers can use these tools to save endless amounts of wasted dollars: the analytics solutions can identify citizens that evade tax returns, or that file multiple claims for the same home. Similarly, analytics tools are critical when it comes to catching cyber hackers who are “hiding in plain sight” within state government IT systems. In this session, attendees will learn about emerging innovations in analytics, and how these solutions can stop fraudsters and cyber criminals in their tracks.
WHO:
  • Christopher Westphal, Director of Analytics Technology, Raytheon Cyber Products
  • Steven Tessler, Senior Computer Systems Technologist, Raytheon Cyber Products
WHEN: Tuesday, August 12, 2014; 10:55 p.m. – 12:10 p.m.
WHERE: Eldorado Hotel, Sante Fe, NM
309 W San Francisco Street, Santa Fe, NM 87501

July 28, 2014 - Raytheon Webinar to Outline Critical Role Cross Domain and Virtualization Technologies Play in Support of JIE InitiativeSignal Magazine Editor-In-Chief to Moderate August 7 Webinar

Dulles, Va., – July 28, 2014 -- Raytheon Company (NYSE: RTN), today announced that it is hosting a webcast on August 7 titled, “One DoD, One IT Environment: The Critical Role of Secure Information Sharing and Virtualization Solutions for JIE.” The Joint Information Environment (JIE) promises to bring together separate DoD IT networks to open up communications channels that are now either closed or severely restricted. JIE will set the stage for the very finest in information sharing practices.

WEBSITE FOCUS: During this webinar attendees will hear from experts in cross domain secure information sharing and virtualization solutions in a dynamic question and answer interview format. Participants will learn:
  • How the goals of the JIE initiative can be met through cross domain and virtualization technologies
  • How cross domain and virtualization technologies work together for the utmost in security
  • How existing customers are utilizing cross domain and virtualization technologies to meet their information sharing and security needs
  • What the future holds for cross domain and virtualization technologies
PARTICIPANTS:
WHEN: Thursday, August 7, 2014 at 1:00 PM ET
WEBINAR REGISTRATION: http://www2.trustedcs.com/webmail/17602/190498917/1537a69bdefb0b8c77035fd0e203c161

July 18, 2014 - Raytheon Executive Selected to Participate on Disaster Recovery Panel at Federal Innovation Summit 2014Session to Focus on Protecting Data and Applications in the Cloud

Dulles, Va., – July 18, 2014 -- Raytheon Company (NYSE: RTN), today announced that George Kamis, Director of Cross-Domain Technology, Cyber Products will participate on a panel session titled, “Disaster Recovery: Protecting Data and Applications in the Cloud” at the 2014 Federal Innovation Summit: Modernizing Virtualized Data Centers. Taking place on July 22 in Washington, D.C., attendees will hear from executive decision-makers and subject matter experts on enabling key Federal technology initiatives that transform government IT operations to provide more mobility, manageability, security and productivity and at dramatically lower costs.

WHAT: Panelists will discuss how to design and implement a proactive disaster recovery plan that protects virtualization and private cloud infrastructures from intrusion and ensures data quality and integrity; what happens during a cyber attack and strategies that agencies can use to design and implement an effective service-continuity solution; and how to anticipate the changes in disaster recovery for the next generation of software-defined data centers.
WHEN: Tuesday, July 22, 2014
WHERE: The Hamilton Live, Washington, DC
600 14th Street, NW Washington, DC 20005

June 26, 2014 - Raytheon Named Bronze Winner in Network Products Guide’s 2014 Hot Companies and Best Products AwardsTrusted Access: Mobile Recognized in New Products Category

Dulles, Va., – June 26, 2014 -- Raytheon Company (NYSE: RTN), today announced that its Trusted Access: Mobile solution is a Bronze winner in the “new products” category of Network Products Guide’s 9th Annual 2014 Hot Companies and Best Products Awards. These industry and peer awards from Network Products Guide are the world's premier information technology awards honoring achievements and recognitions in every facet of the IT industry. Winners were honored in San Francisco on Monday, June 23, 2014 during the 9th annual dinner and presentations.

Trusted Access: Mobile is currently being beta tested by a number of commercial and government organizations that require the capability for securely and confidently accessing sensitive and classified information on mobile devices. Unlike other solutions that attempt to secure data on the device using container and MDM-based protection/remediation technologies, Raytheon’s mobile offering virtualizes native mobile applications in a secure virtual mobile infrastructure (VMI) and leverages secure redisplay technologies for user interactions. This alleviates concerns of data loss, theft or compromise and makes it the ideal solution for BYOD deployments. To learn more, download the product datasheet at: http://trustedcs.com/resources/brochures/RTN-TrustedAccessMobileDatasheet.pdf

“Receiving this new product award helps reinforce that our technology is addressing a real need in the mobile security market. Trusted Access: Mobile is the answer to the BYOD dilemma because it is device agnostic and provides the highest degree of security by ensuring that no critical data or applications are resident on the device, yet are completely accessible,” said Ed Hammersla, managing director, Raytheon Cyber Products at Raytheon Intelligence, Information and Services. “Now remote workers, field agents, war fighters, or any employee working outside their office environment, can access their organization’s sensitive, confidential, or proprietary data from their mobile device without putting that data at risk.”

About Network Products Guide Awards
As industry’s leading technology research and advisory publication, Network Products Guide plays a vital role in keeping decision makers and end-users informed of the choices they can make in all areas of information technology. You will discover a wealth of information and tools in this guide including the best products and services, roadmaps, industry directions, technology advancements and independent product evaluations that facilitate in making the most pertinent technology decisions impacting business and personal goals. The guide follows conscientious research methodologies developed and enhanced by industry experts. To learn more, visit www.networkproductsguide.com

June 23, 2014 - Raytheon to Showcase Suite of Commercial and Government Security Products at Gartner Security and Risk Management Summit Raytheon’s Director of Insider Threat Strategies to Present Findings from Survey on Privileged User Abuse & The Insider Threat

Dulles, Va., – June 23, 2014 -- Raytheon Company (NYSE: RTN), today announced that it is a Platinum sponsor at this week’s Gartner Security and Risk Management Summit in National Harbor, MD. Located in booth #644, attendees will have the opportunity to meet with Raytheon experts and view product demonstrations in the areas of insider threat, analytics, mobile security and secure information sharing. In addition, Michael Crouse, Director of Insider Threat Strategies will present “Privileged User & Insider Threat 2014 Ponemon Survey Findings.”

WHAT: Product demonstrations to include:
Speaking session information:
  • On Wednesday, June 25 from 3:15 p.m. to 4:00 p.m., Michael Crouse, Director of Insider Threat Strategies, Raytheon will present the findings from its recent insider threat survey. Focusing on ‘the human factor,’ the survey report, “Privileged User Abuse & The Insider Threat”, finds that many individuals with the highest levels of network access in organizations are often granted access to data and areas of the network not necessary for their roles and responsibilities. The goal of this survey is to not only share current insider threat statistics but to educate organizations on their privileged users and the threats and attacks that can happen because of the access they own. Attendees will be provided with a copy of the full report.
WHERE: Gaylord National, National Harbor, MD
201 Waterfront Street, National Harbor, Maryland 20745

June 9, 2014 - Raytheon’s Chief Cross Domain Engineer to Present at the United Kingdom IA14 Cybersecurity Event June 17 Presentation in London Offers Attendees How to Implement a Secure Enterprise-Wide Multi-Domain Printing Solution

Dulles, Va., – June 9, 2014 -- Raytheon Company (NYSE: RTN), today announced that Jason Ostermann, Chief Engineer, Transfer Solutions, Office of the CTO, Raytheon Cyber Products will present “Streamlining and Securing the Print Process Across Security Classifications” at the IA14 event on June 17 in London England. The purpose of IA14 is to examine how the UK can be a world leader in Cyber Security and IA, underpinning the nation’s world leading information economy.

WHAT: Attendees will have the opportunity to see a demonstration and associated benefits of Raytheon’s Trusted Print Delivery™ (TPD) solution. This solution enables organizations to provide a high level of data security, while improving business processes and reducing costs. TPD is a commercial, highly secure solution that allows users to print from existing applications at different security classifications to a single printer. Reducing printer hardware at individual security classifications reduces capital investment, printer inventory, hardware maintenance/supplies, and administration.
WHEN: Tuesday, June 17, 2014
WHO: Jason Ostermann, Chief Engineer, Transfer Solutions, Office of the CTO, Raytheon Cyber Products
WHERE: Park Plaza Westminster Bridge Hotel, London England
Raytheon will be located in stand #15 to provide product demonstrations

June 4, 2014 - Raytheon Hosts SANS Webcast to Share Key Findings from Ponemon Insider Threat Survey “Ask the Expert” Session Offers Attendees Guidance and Advice on how to Mitigate Risks of Privileged User Access

Dulles, Va., – June 4, 2014 -- Raytheon Company (NYSE: RTN), today announced that Michael Crouse, Director of Insider Threat Strategies for Raytheon and John Pescatore, Director Emerging Security Trends, SANS Institute will present a webcast titled, “Fighting the Insider Threat: Privilege Management and Abuse Prevention Strategies.”

WHAT: This SANS “Ask the Expert” session will provide an overview of the most relevant findings from the Ponemon Survey and provide guidance and advice on how to mitigate the risks of privileged user access without impacting your company or agency's ability to collaborate and innovate.
WHEN: Tuesday, June 10 at 1:00 PM EDT
WHO: Michael Crouse is director of insider threat strategies for Raytheon. In this role Mr. Crouse oversees the execution of existing federal and commercial cyber audits/antimalware requirements programs, while identifying new, global growth opportunities within the Department of Defense (DoD)/Intelligence Community (IC) and the private sector.

John Pescatore (Director Emerging Security Trends, SANS Institute) is a former vice president and Distinguished Analyst at Gartner. Pescatore has over 30 years of experience in computer, network and information security.
REGISTER: https://www.sans.org/webcasts/fighting-insider-threat-privilege-management-abuse-prevention-strategies-98225

May 27, 2014 - Raytheon’s Managing Director of Cyber Products to Introduce Virginia Governor Terry McAuliffe at DC Metro Cyber Security Summit Company’s Senior Director of Product Strategy & Management to Participate on Enterprise Mobile Security & BYOD Panel

Dulles, Va., – May 27, 2014 -- Raytheon Company (NYSE: RTN), today announced that Ed Hammersla, Managing Director of Cyber Products will introduce Virginia Governor Terry McAuliffe at the June 5 D.C. Metro Cyber Security Summit taking place at the Sheraton Premiere in Tysons Corner, Virginia. At the same event, Raytheon will be represented on the Enterprise Mobile Security & BYOD panel by Ashok Sankar, Sr. Director of Product Strategy & Management. The Cyber Security Summit is an exclusive C-Suite conference that connects senior level executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts.

WHAT: The Governor plans to discuss the State’s wealth of resources that have made it a leader in innovation and technology, and in particular, within the cybersecurity industry. In his introduction of the Governor, Mr. Hammersla will provide remarks on why the State of Virginia’s forward-looking technology policies, highly skilled workforce and cutting-edge technology research offer a platform to help companies like Raytheon succeed in today’s highly competitive cybersecurity industry.

Mr. Sankar will participate as a panelist on the Enterprise Mobile Security & BYOD Panel. This panel will explore the importance of effectively protecting local and remote devices and why mobile security plays a large role in securing critical enterprise infrastructure.
WHEN: Thursday, June 5, 2014
11:45am-12:30pm - Enterprise Mobile Security & BYOD Panel
12:45pm-1:15pm – Governor’s keynote
WHERE: Sheraton Premiere in Tysons Corner, Virginia
8661 Leesburg Pike, Vienna, VA 22182
EVENT REGISTRATION: http://cybersummitusa.com/css_dc/

May 20, 2014 - Insider Threat survey reveals increased awareness but little action Raytheon-commissioned Ponemon Institute Survey: 88 percent believe privileged user abuse will increase

Dulles, Va., – May 20, 2014 -- Despite heightened awareness of insider threats, most organizations continue to grapple with how to mitigate risks to their networks and sensitive information. According to a new report issued today by Raytheon Company (NYSE: RTN), people with access to privileged data – such as health care records, sensitive company information, intellectual property or personal records – frequently put their organization’s sensitive information at risk.

Focusing on ‘the human factor,’ the survey report, “Privileged User Abuse & The Insider Threat”, finds that many individuals with the highest levels of network access in organizations are often granted access to data and areas of the network not necessary for their roles and responsibilities. The report reveals that 65% of survey respondents indicated that curiosity – not job necessity – drives these same individuals to access sensitive or confidential data.

“The results of this survey should serve as a wakeup call to every executive with responsibility for protecting company or customer sensitive data,” said Jack Harrington, vice president of Cybersecurity and Special Missions, Raytheon Intelligence Information and Services. “While the problem is acutely understood, the solutions are not.”

Conducted by information security industry leader Ponemon, the comprehensive survey identified 693 respondents as “privileged users” meaning they are network engineers, database administrators, information-security practitioners and cloud custodians.

Key findings include:

  • Eighty-eight percent, recognize insider threats as a cause for alarm but have difficulty identifying specific threatening actions by insiders.
  • Sixty-nine percent surveyed stated their security tools don’t provide enough contextual information to determine intent behind reported incidents and 59 percent stated their tools yield too many false positives.
  • Forty-seven percent surveyed said it would be likely that malicious insiders would use social engineering or other measures to obtain someone’s access rights – this is up from 21 percent from a 2011 survey.
  • Forty-five percent say it is likely social engineers from outside the organization will target privileged users to obtain their access rights.

“Our goal is to also help organizations understand that good people can make mistakes and put sensitive data at risk,” Harrington continued. “Even a well-intentioned, seasoned, privileged user with wide access to a network poses great risks because they are high-value targets to corporate “hacktivists” and persistent adversaries eager to penetrate a company’s defenses.”

What is most at risk:

  • While 59 percent believe general business information is at risk, 49 percent say customer information is most at risk due to a lack of access controls over privileged users.
  • Fifty-seven percent believe background checks are lacking in most organizations before issuance of privileged credentials.
  • Budget – while 88 percent of those surveyed recognize enhanced security as a top priority, less than half this number (40 percent) have a dedicated budget to invest in enabling technologies to reduce insider threat. Most use existing cybersecurity tools not necessarily designed to combat insider threat; 72 percent stated they use authentication and identity management tools to manage privileged user abuse.

“The goal of this survey is to not only share current insider threat statistics but to educate organizations on their privileged users and the threats and attacks that can happen because of the access they own,” said Harrington. “If a privileged user wants to do bad things, their elevated access to the company network makes it easier for them.”

Further Information
For a full copy of the study, go to Privileged User Abuse & The Insider Threat. A webcast on June 10 hosted by the SANS Institute will feature analysis of the survey findings from Michael Crouse, Raytheon’s Director of Insider Threat Strategies and John Pescatore, Director Emerging Security Trends, SANS Institute. Register for the webcast: Fighting the Insider Threat Privilege Management and Abuse Strategies.

In addition, visit us at the Gartner Security and Risk Management Summit where Michael Crouse will present the findings and offer his analysis.

About the Ponemon Institute
The Ponemon Institute is dedicated to advancing responsible information and privacy management practices in business and government. To achieve this objective, the Institute conducts independent research, educates leaders from the private and public sectors, and verifies the privacy and data protection practices of organizations in a variety of industries. For more information, visit http://www.ponemon.org.

April 25, 2014 - Raytheon enhances malicious insider threat and privileged user abuse detection with new SureView release

Dulles, Va., – April 25, 2014 -- Raytheon Company (NYSE: RTN), today announced the latest developments found in their new SureView™ release, which include new policy support features that enhance product capability for continuous monitoring and network auditing against insider threat and privileged user abuse.

With this release, commercial and federal organizations now have access to a Privileged User Monitoring and Auditing (PUMA) Policy Pack specifically designed to enable SureView to detect malicious acts and policy violations by privileged users that often go undetected. Additionally, this latest release includes SureView Spotlight™, a software development kit that allows integration with best-of-breed analytic solutions.

"For more than a decade, customers have relied on SureView to detect and stop malicious activity inside their networks. SureView is a proven solution specifically built to address human behavior and provide the insight necessary to recognize both malicious and non-malicious insider threats," said Ed Hammersla, managing director of Raytheon Cyber Products at Raytheon Intelligence, Information and Services. "The latest enhancements to SureView are the result of customer inputs and lessons learned from long-term deployment. In fact, the PUMA Policy Pack was developed to meet requirements specifically articulated by our customers to mitigate the privileged user threat."

Additional New features of SureView include:

  • Host-based Network Traffic Monitoring and Collection: Because many network incidents can be attributable to simple negligence, SureView's new network collector monitors and captures the actual network traffic. If connections or ports are found open, leaving them vulnerable to attack, an alert is sent that includes the user who left the connections open.
  • Simplified Policy Creation: Now policies can be created with a simple right click and by leveraging Window's event logs.
  • New Collection Capability: Monitors and collects data published to Windows event log providing easy integration with other technologies such as third party Security Information and Event Management (SIEM) systems.
  • Enterprise Application Suite Enhancements: This release supports large scale deployments with enhanced user, agent and group management. It also provides the ability to generate contextual reports with a simple "right click" and export data to a file that is printer friendly.

About SureView
As a policy-based cyber audit solution, SureView monitors employees' activities, including the accessing of classified networks, while safeguarding privacy and legally protected whistleblower communications. It provides irrefutable and unambiguous attribution of end-user activity, providing context to rapidly discern malicious activity from benign actions. SureView also integrates with best of breed SIEM tools. Visit www.raytheon.com to learn more about SureView's enhancements.

April 24, 2014 - Raytheon's Director of Cross Domain Technology Invited to Speak at Fort Huachuca Technology Expo Presentation Offers Attendees Insights into "Delivering Actionable Intelligence through Secure Information Sharing"

Dulles, Va., – April 24, 2014 -- Raytheon Company (NYSE: RTN), today announced that George Kamis, Director of Cross Domain Technology, Cyber Products will present "Delivering Actionable Intelligence through Secure Information Sharing" at the Fort Huachuca Technology Expo on Thursday, May 1. Fort Huachuca has a population of roughly 6,500 active duty soldiers and 5,000 civilians.

WHAT: Warfighters and analysts must protect classified information that is critical to the nation's safety but still make it available, to the right people, at the right time, in cases of attack or vulnerability. With classified information residing in numerous secured networks throughout the DoD and Intelligence agencies, that becomes a serious challenge. Add to that challenge the fact that the people who need access to highly sensitive data may be granted access at varying classification levels depending on the network on which the data resides. So, how do you keep critical information dispersed across different secure networks safe, yet ensure that it is readily available to the people who need it at the time that they need it? This session will focus on best practices and real-world government implementations for how this problem is being addressed today and what the government is doing to ensure the right balance between information protection and information sharing.
WHEN: Thursday, May 1 at 10:30am
WHO: George Kamis, Director of Cross Domain Technology, Cyber Products, Raytheon
Fort Huachuca, Thunder Mountain Activity Center (TMAC) Sierra Vista, AZ

April 21, 2014 - Raytheon's Director of Insider Threat Strategies to Host Panel on The Privileged User at U.S. Cyber Crime Conference Security Enforcer or Threat? Panel Discussion to Offer Attendees with Best Practices for Building a Privileged User Strategy

Dulles, Va., – April 21, 2014 -- Raytheon Company (NYSE: RTN), today announced that Michael Crouse, Director of Insider Threat Strategies has been selected to address the topic of managing and monitoring privileged users within an organization at the upcoming U.S. Cyber Crime Conference taking place April 29 – May 2, 2014 at the National Convention Center in Leesburg, VA. The conference covers all aspects of computer crime including intrusion investigations, cyber crime law, digital forensics, information assurance, along with research and development, and testing of digital forensic tools.

WHAT: At the core of the privileged user problem is this dichotomy: With greater access to a company's computer assets comes greater security risk. The privileged user can be a company's security enforcer but also its greatest security risk. Put another way, if a privileged user wants to do bad things, their elevated access to the company network, and all the information that entails makes it easier for them. But even a well-intentioned, seasoned, privileged user poses high risks. This interactive panel discussion provides attendees with best practices for building a privileged user strategy, outline who has a privileged user problem, use cases, IT sabotage, fraud, financial gain, etc., as well as share findings from CERT's research on this growing challenge.
WHEN: Wednesday, April 30 at 9am. as part of the Cyber Investigations Track. See Complete agenda here.
WHO: Michael Crouse, Director of Insider Threat Strategies, Raytheon
Larry Knutsen, Retired Senior Executive CIA Insider Threat Detection, Laconia Group
Tom Mahlik, Deputy Chief Security Officer, The MITRE Corporation
WHERE: National Convention Center in Leesburg, VA.
18980 Upper Belmont Place, Leesburg, VA 20176
MORE INFO Click here to obtain Raytheon's whitepaper titled "Privileged Users: Superman or Superthreat? A Privileged User Risk Whitepaper."

April 3, 2014 - Raytheon's Director of Insider Threat Strategies Invited to Present at SOURCE Boston 2014 Presentation Offers Attendees Insights into "The Privileged User Discussion: Security Enforcer or Threat?"

Dulles, Va., – April 3, 2014 -- Raytheon Company (NYSE: RTN), today announced that Michael Crouse, Director of Insider Threat Strategies has been selected to address the topic of managing and monitoring privileged users within an organization at the upcoming SOURCE Boston Conference taking place April 8-10 at the Marriott Tremont in Boston, MA. SOURCE Boston is designed for computer security experts, senior executives (e.g. CIOs, CTOs, CSOs), advanced security professionals, faculty and students, members of management and business communities who are looking to connect with other security and technology experts.

WHAT: At the core of the privileged user problem is this dichotomy: With greater access to a company's computer assets comes greater security risk. The privileged user can be a company's security enforcer but also its greatest security risk. Put another way, if a privileged user wants to do bad things, their elevated access to the company network – and all the information that entails -- makes it easier for them. Further, because of the access they maintain to their organization's most confidential information, they become high value targets to corporate "hacktivists" and persistent adversaries that are eager to penetrate a company's defenses. The privileged user risk is often swept under the rug because of the perceived complexity of securing it or because organizations don't want to admit they have a risk. Michael will not only shed light on this risk, but he will offer a unique perspective having spent more than a decade securing some of the Nation's most sensitive networks.
WHEN: Wednesday, April 9 at 4pm. See complete agenda here.
WHO: Michael Crouse, Director of Insider Threat Strategies, Raytheon
WHERE: Marriott Tremont in Boston, MA
MORE INFO Click here to obtain Raytheon's whitepaper titled "Privileged Users: Superman or Superthreat? A Privileged User Risk Whitepaper."
March 24, 2014 - Raytheon and SANS Institute Host Webcast to Unveil Survey Findings on Financial Services Security Practices Michael Crouse, Raytheon's Director of Insider Threat Strategies to Provide Analysis Based on Survey Results

Herndon, Va., – March 24, 2014 -- Raytheon Company's (NYSE: RTN), today announced that it is sponsoring a webcast on March 27 at 1:00 p.m. ET with the SANS Institute to share the findings from a new survey titled, "SANS Survey on Financial Services Security Practices II." In this webcast, Michael Crouse, Raytheon's Director of Insider Threat Strategies will join John Pescatore, SANS Director and several other industry experts to discuss the results of this survey. All attendees will get a copy of the final survey and results.

Webcast Focus:
The financial industry has been a front runner in adapting to the electronic frontier. Learn the results of this SANS survey, in which IT professionals dealing with financial information systems tell us about "lessons" learned for reducing risk and securing their customer information. Participants of this webcast will learn:

  • What type of organizations are transacting financial information subject to regulation
  • The effectiveness of regulations on risk reduction
  • The industry's most critical risks and survey takers' biggest concerns
  • Security practices and policies in an ever-expanding ecosystem that includes networks, mobile, cloud and customers

Date:
Wednesday, March 27, 2014 @ 1:00 p.m ET

Webcast Registration:
For more information and to register go to:
https://www.sans.org/webcasts/survey-financial-services-security-practices-ii-97710

March 14, 2014 - Raytheon cross domain product awarded top honors at Info Security’s Global Excellence Awards Trusted Thin Client® recognized as a gold winner in “Security Products and Solutions for Government”

Herndon, Va., – March 14, 2014 -- Raytheon Company's (NYSE: RTN), Trusted Thin Client® product was selected as the gold winner in the category “Security Products and Solutions for Government” at the Info Security Products Guide Global Excellence Awards. The security industry celebrated the 10th annual awards in San Francisco, Calif. during the RSA Conference USA 2014 by honoring excellence in every facet of the cyber security industry including products, people behind the successes, and best companies.

With more than 95,000 applications worldwide, Raytheon Trusted Thin Client was recognized as an innovative, commercial off-the-shelf product. Hosted on the back end of a customer's network system, TTC uses virtualization technologies to provide users access to multiple networks of varying classifications via one wire to the desktop rather than multiple desktop machines accessing each network. This approach eliminates unnecessary hardware, enhances user productivity and simplifies IT administration across the enterprise.

“Clearly the problem of sharing classified information across multiple secure domains at various classification levels is a primary concern for both the intelligence and defense communities,” said Ed Hammersla, managing director, Raytheon Cyber Products at Raytheon Intelligence, Information and Services. “Critical infrastructure and commercial companies with highly sensitive data also see the value in efficiently sharing secure information. Our technology is being recognized by the Info Security Products Guide for its ability to help protect and share mission-critical information while bringing cost savings to our customer.”

More than 50 judges across a broad spectrum of industry voices from around the world participated in the awards process, and their average scores determined the 2014 Global Excellence Awards Winners announced during a dinner presentation February 24, 2014. For a complete listing of award winners please visit: http://www.infosecurityproductsguide.com/world/ .

March 13, 2014 - Raytheon to Participate in AFEI Coalition Information Sharing Workshop “Industry Challenges” Panel Panelists to Focus on how to Reduce U.S.-Only Stovepipes and Increase Interoperability with Coalition Partners

Herndon, Va., – March 13, 2014 -- Raytheon Company (NYSE: RTN), today announced that Jason Ostermann, Raytheon Cyber Products, Chief Engineer, Transfer Solutions, Office of the CTO, is participating on a panel entitled “Industry Challenges” at the Association for Enterprise Information (AFEI) Coalition Information Sharing Workshop on March 13, 2014. The panel will discuss operating realities in trying to meet the government needs in supporting and resolving coalition information sharing, as well as Industry views on DI2E/JIE alignment with coalition and multinational capabilities.

This workshop brings industry and government together to focus on the policies and programs for establishing interoperability amongst coalition partners that allows timely sharing of information. The workshop looks at the lessons we have learned from years of coalition operations, and addresses the gaps that remain in our abilities to easily interoperate with coalition partners. It also looks at these challenges from the perspective of an international partner that must contend with the large and often non-interconnected systems that can be present in a joint U.S. military operation. Finally it addresses how we will generate the requirements for continued evolution of information sharing capabilities, and the establishment of a standards-based enduring capability.

WHO: “Industry Challenges” Panel Session Participants:
  • Moderator: Rajeev Parekh, MITRE
  • Jason Ostermann, Chief Engineer, Transfer Solutions, Office of the CTO, Raytheon Cyber Products
  • Bill Ross, Vice President, Information Security Solutions, General Dynamics C4 Systems
  • Ed Bush, VP, Restricted Space Systems, Northrop Grumman
WHERE: The Multi-agency Collaboration Environment (MACE), Herndon, Va.
3076 Centreville Rd, Suite 212, Herndon VA, 20171
WHEN: Monday, March 13, 2014 @ 11:00 a.m. ET
MORE INFO Additional Information on the AFEI Coalition Information Sharing Workshop:
http://www.afei.org/events/4A05/Pages/default.aspx

February 17, 2014 - Raytheon Executive Invited to Speak at Nellis Air Force Base Technology & Cyber Security Expo Presentation Offers Attendees Insights into “Delivering Actionable Intelligence through Secure Information Sharing”

Herndon, Va., – February 17, 2014 -- Raytheon Company (NYSE: RTN), today announced that George Kamis, Director of Cross Domain Technology, Cyber Products will present “Delivering Actionable Intelligence through Secure Information Sharing” at the Nellis AFB – Technology & Cyber Security Expo on Wednesday, February 26 at Nellis Air Force Base in Las Vegas, Nevada. This event offers attendees an opportunity to view some of the latest cyber security & emerging technologies from over 30 of today’s leading vendors. The event is hosted by the Armed Forces Communications & Electronics Association (AFCEA) - Las Vegas Chapter.

WHAT: Warfighters and analysts must protect classified information that is critical to the nation’s safety but still make it available, to the right people, at the right time, in cases of attack or vulnerability. With classified information residing in numerous secured networks throughout the DoD and Intelligence agencies, that becomes a serious challenge. Add to that challenge the fact that the people who need access to highly sensitive data may be granted access at varying classification levels depending on the network on which the data resides. So, how do you keep critical information dispersed across different secure networks safe, yet ensure that it is readily available to the people who need it at the time that they need it? This session will focus on best practices and real-world government implementations for how this problem is being addressed today and what the government is doing to ensure the right balance between information protection and information sharing.
WHO: Mr. George Kamis, George Kamis, Director of Cross Domain Technology, Cyber Products, Raytheon
WHERE: The Club – Nellis AFB, Las Vegas, Nevada
WHEN: Wednesday, February 26, 2014
MORE INFO https://www.fbcinc.com/event.aspx/Q6UJ9A00XURY

February 6, 2014 - Raytheon to Exhibit at RSA Conference USA 2014; Executives Selected to Speak on Insider Threat Issues Presentations Address how to Mitigate the Privileged User Risk and how to Build an Effective Information Protection Program

Herndon, Va., – February 6, 2014 -- Raytheon Company(NYSE: RTN), today today announced that it will have a significant presence at the upcoming RSA Conference USA 2014. Executives will speak at the conference and lead a peer-to-peer discussion as well as provide attendees with demonstrations of the company’s latest portfolio of security products in booth #1539, South Expo Floor.

Speaking Sessions

> Let go of the Status Quo: Build an effective Information Protection Program
Raytheon’s Dan Velez, Senior Program Manager for Insider Threat will discuss the status quo of virus scans and dirty word searches and how they no longer make an effective information protection program. Policies, procedures and solutions must integrate and evolve as moving parts of the same system. It requires a better grasp of the people and the technical solutions. Dan shares lessons learned from developing information protection programs across the U.S. Government and the private sector. From this session attendees will learn how to build an information protection program using sound risk management principles; how to incorporate technologies to support a program; and how to refine your organization's auditing and monitoring requirements to get it done right the first time.

Details: Wednesday, February 26, 2014 | 8:00am – 9:00am | West | Room: 2006
Session Code: DSP-W01
> Peer-to-Peer Privileged User Discussion: Security Enforcer or Threat?
Raytheon’s Roger Bache, Deputy Director, Cyber Products will lead this discussion focused on the privileged user and how companies can mitigate this risk. Privileged Users are one of the greatest risks an organization faces today. Because of the access they maintain to their organization’s most confidential information, they become high value targets to corporate “hacktivists” and persistent adversaries eager to penetrate a company’s defenses. This discussion will offer a forum to discuss how companies can mitigate this threat.

Details: Thursday, February 27, 2014 | 8:00am – 9:00am | West | Room: 2021
Discussion Code: P2P-R01C
> Flash Talk on Privileged User Management
Raytheon’s Michael Crouse, Director of Insider Threat Strategies will lead this talk on the challenges of managing privileged users within an organization. The presentation format is based on a simple idea: 20 images x 20 seconds (total presentation length – 6 minutes, 40 seconds). Flash Talkss are fast-paced to keep interest levels high. Witness high-energy presentations, like you've never seen before, from some of the biggest names in the industry.

Details: Thursday, February 27, 2014 | 5:30 PM – 6:50 PM | South | Room: Viewing Point at Gateway

Raytheon will be in booth #1539, South Expo Floor. Attendees will get the opportunity to see product demonstrations of the company’s insider threat, cross domain and visual analytics solutions.

January 16, 2014 - Raytheon Executives to Present at Critical Infrastructure Protection Challenge and Cybersecurity Innovation Forum Presentations to Address How Cross Domain Secure Information Sharing Solutions Can Help Protect the Nation’s Critical Infrastructure

Herndon, Va., – January 16, 2014 -- Raytheon Cyber Products Company (RCPC), a wholly owned subsidiary of Raytheon Company (NYSE: RTN), today announced that it will present at the January 21 Innovative Solutions Consortium (ISC) Critical Infrastructure Protection (CIP) challenge event and speak at the January 28 Cybersecurity Innovation Forum sponsored by the National Cybersecurity Center of Excellence (NCCoE). At both events, Raytheon executives will provide attendees with insights into how cross domain solutions can help fortify critical infrastructure by enabling secure, fast, and reliable information sharing, striking the right balance between information availability, sharing and protection.

> Innovative Solutions Consortium (ISC) - Critical Infrastructure Protection - Collaboration with DHS, Academia and Industry – January 21, 2014, Founders Hall Auditorium - 3351 Fairfax Dr, Arlington VA - George Mason University Arlington VA Campus

Raytheon’s Jason Ostermann, Chief Engineer – Transfer Solutions will present their High Speed Guard solution as part of the CIP Challenge category titled, “Share Cyber Threat Information in Real Time Among Trusted Entities.” High Speed Guard allows Supervisory Control and Data Acquisition (SCADA) systems -- which oversee all of the vital data and information that monitors and controls CIP resources -- to exchange information freely and securely with internal and authorized external parties. Most SCADA systems are linked to Internet Protocol addresses, leaving them open to compromise. High Speed Guard dramatically reduces the potential for attackers to exploit IP-related "openings" as SCADA operators communicate.

> The 2014 Cybersecurity Innovation Forum - The Power Grid Conundrum: The Vulnerabilities of Information Sharing in the Modern Age – January 28, 2014, Baltimore Convention Center, Baltimore MD

In this session, Ed Hammersla, President of RCPC will shed insight on the growing problem, as grid network vulnerability disclosures have increased in excess of 600 percent since only 2010. Attendees will learn about escalating concerns over the cyber protection of what are called Supervisory Control and Data Acquisition (SCADA) systems, which serve as the cerebral cortex of power grids. Once operating like sealed “fortresses,” SCADA systems remained comparatively protected in the 1970s because their entire IT operations were separated from all other networks. Today, this level of isolation is no longer feasible, not when power grid operators must remain in constant contact with SCADA personnel to get the latest on power usage, outages, etc. Attendees will find out about emerging technologies – specifically cross domain solutions that are successfully supporting the most sensitive DoD/Intelligence Community communications – which promise to enable real time, two-way SCADA engagement in a fully secured manner.

December 9, 2013 - Raytheon Congratulates Defense Intelligence Agency’s Multi-Domain Dissemination System (MDDS) on Winning Government Security News Award for the Most Notable Federal Government Security Program

Herndon, Va. –Dec. 9, 2013 Raytheon Trusted Computer Solutions (RTCS), a wholly owned subsidiary of Raytheon Company (NYSE: RTN), congratulates the Defense Intelligence Agency (DIA) for receiving the Government Security News (GSN) Award for its Multi-Domain Dissemination System (MDDS). The GSN 2013 Homeland Security Awards Program was organized to honor the distinguished vendors of IT Security and Physical Security products and solutions and the dedicated federal, state, county and municipal government agencies, whose combined efforts keep our nation secure.

Integrating two completely separate Internets, the MDDS program enables users to securely share information across multiple clearance levels with one browser. Warfighters can now share documents with lower classification levels and not wait for the approval from personnel. Documents and other items are also made available on demand, circumventing the traditionally slow turnaround time of the manual approved channels. Hundreds of thousands of users connected to Joint Worldwide Intelligence Communications Systems (JWICS) depend upon this service including 130 other agencies and departments.

MDDS is driven essentially by two cross domain solutions from RTCS – WebShield and Trusted Gateway System™ (TGS). WebShield provides agencies with HTTP traffic monitoring for multilevel network access and data retrieval. This provides complete browsing and discovery across networks of varying sensitivity levels and ensures that agencies are able to obtain any information that is cleared within their security level. TGS establishes manual review and automatic validations such as virus scanning, file type verification and deep content inspection. MDDS enables documents to be available on demand and can send users’ search queries simultaneously to multiple networks. In addition, users can select up to 30 different search engines on four distinct classified networks and receive the aggregated results in one results page.

“The DIA’s continued push toward innovation with MDDS has greatly impacted collaboration and mission-critical efficiencies with an estimated 200,000 users/applications now associated with this service,” said Ed Hammersla, Chief Operating Officer, Raytheon Trusted Computer Solutions. “Thanks to advancements in cross domain solutions, MDDS serves as the central point for lawmakers, warfighters, commanders, intelligence officers and other agency users to operate within their own online universe while not compromising any sensitive information/data. We congratulate the DIA for receiving this honor from GSN.”

For more information on the 2013 GSN Agency Awards visit: http://www.gsnmagazine.com/node/39332?c=federal_agencies_legislative

October 18, 2013 - Raytheon Trusted Computer Solutions CTO to Speak at Military Communications and Information Systems Conference (MilCIS) George Kamis to Discuss Enabling Secure Information Sharing – Ensuring the Right Data is Delivered to the Right People at the Right Time

Herndon, Va., – October 18, 2013 -- Raytheon Trusted Computer Solutions (RTCS), a wholly owned subsidiary of Raytheon Company (NYSE: RTN), today announced that George Kamis, Chief Technology Officer, will speak at MilCIS 2013 (12-14 November) in Canberra, Australia.

WHAT: Information is the best proactive and reactive defense Australia has against breaches in national security. Agencies must protect classified information that is critical to the Nation’s safety but also make that information available to the right people, at the right time, especially in cases of attack or vulnerability. With classified information residing in numerous secured networks throughout Defence and other agencies, that becomes a serious challenge. Add to that challenge the fact that the people who need access to highly sensitive data may be granted access at varying classification levels depending on the network on which the data resides. So, how do you keep critical information dispersed across different secure networks safe, yet ensure that it is readily available to the people who need it at the time that they need it? This session will provide attendees with an introduction to cross domain solutions and how this technology can improve security and operational efficiencies while ensuring that the necessary information gets to the right people in a timely manner.
WHO: Mr. George Kamis, Chief Technology Officer, Raytheon Trusted Computer Solutions
WHERE: MilCIS 2013; National Convention Centre, Canberra, Australia
WHEN: Tuesday, 12 November 2013; Session 1.6a; 1:30pm
REGISTER: http://www.milcis.com.au/

October 18, 2013 - Raytheon Trusted Computer Solutions Executive Selected to Speak at SecureTech 2013 Attendees will Learn how Cross Domain Information Sharing Solutions Improve Operational Efficiencies at the SecureTech Innovation Stage

Herndon, Va., – October 18, 2013 -- Raytheon Trusted Computer Solutions (RTCS), a wholly owned subsidiary of Raytheon Company (NYSE: RTN), today announced that it has invited to speak on the SecureTech Innovation Stage during SecureTech 2013 (29-30 October) – Canada’s Public Safety, Emergency Management and Security Showcase – hosted by the Canadian Association of Defence and Security Industries (CADSI).

WHAT: With the increasing need to access data from multiple devices, locations and sources, understanding what the data is, where it should be stored, and the rules governing its access are of paramount importance. Information sharing solutions are built with strict security controls to ensure that the right data is shared with the right people and across systems to efficiently and effectively protect personal and public interests. This session will focus on RTCS solutions that streamline multilevel print environments (Trusted Print Delivery™) and provide secure mobile access to the enterprise.
WHO: Mrs. Jamie Hall, Director International Business, Raytheon Trusted Computer Solutions
WHERE: SecureTech 2013; Ottawa Convention Centre; Ottawa, Ontario, Canada

The SecureTech Innovation Stage is located on the tradeshow floor and features a variety of speakers who will define market innovations and future vision, providing insight into industrial solutions for current and future public safety, emergency management, and national security solutions. RTCS will also offer demonstrations at booth #717.
WHEN: Wednesday, 30 October 2013; 11:00-11:25
REGISTER: https://www.securetechcanada.ca/index.php?action=login.login&

September 24, 2013 - Raytheon announces Suite B cryptography for cross domain access solution Trusted Thin Client solution incorporates Suite B cryptographic algorithms for protecting national security information

Herndon, Va. –Sept. 24, 2013 Raytheon Trusted Computer Solutions (RTCS), a wholly owned subsidiary of Raytheon Company (NYSE: RTN), today announced that Trusted Thin Client™, a commercial-off-the-shelf, enterprise-class, cross domain access solution, now utilizes Suite B cryptographic algorithms, providing the ability to meet the widest range of government information protection requirements. Trusted Thin Client is a cross domain access solution that enables access to multiple classified or sensitive networks, at various classification levels, from a single device.

“Suite B was developed as a common set of algorithms for commercial software vendors to use in developing products that meet the highest security standards,” stated Ed Hammersla, chief operating officer for Raytheon Trusted Computer Solutions. “It was designed to protect foreign releasable, U.S.-Only and Sensitive Compartmented Information, all of which are accessed by our Trusted Thin Client customers.”

In addition to Suite B cryptography, Trusted Thin Client now supports Red Hat® Enterprise Linux® 6, which was designed to provide enterprise longevity and growth potential for software applications. “Support for Red Hat Enterprise Linux 6 was the next step in our enterprise management strategy for Trusted Thin Client,” Hammersla stated. “It is our ability to implement and manage enterprise deployments of Trusted Thin Client that differentiates us from other cross domain vendors.”

RTCS products are designed to enable secure access and transfer of sensitive information for government, intelligence community, civilian and corporate entities in the United States and around the globe, including 5 Eyes nations and NATO. With more than a decade-and-a-half of proven success, RTCS is the global leader in cross domain solutions. RTCS products continue to strike the right balance between information protection and information sharing.

Note to Editors
“5 Eyes” is the common way to refer to the community comprised of Australia, Canada, New Zealand, United Kingdom and United States; also referred to as AUCANNZUKUS.

September 17, 2013 - March of Dimes and AFCEA NOVA Announce 2013 Heroines in Technology Finalists

Arlington, Va. – September 17, 2013 The March of Dimes and AFCEA NOVA today announced finalists for the 13th Annual Heroines in Technology® Awards Gala. The awards program will honor the significant contributions of women in the technology industry who exemplify leadership in volunteer community service. Heroines In Technology 2013 Finalists Announcement (pdf)

July 1, 2013 - Raytheon awarded NAVAIR contract to build and deploy cross-domain surveillance system Game-changing technology provides an effective solution to protect warfighters from impending threats

Dulles, Va. –July 1, 2013 /PRNewswire/ Raytheon Company (NYSE: RTN) was awarded a contract with the U.S. Naval Air Systems Command (NAVAIR) to build an integrated multi-INT system to safeguard forward deployed forces. The Persistent Surveillance System Cross Domain Solution (PSS CDS) gives warfighters an advantage by providing a complete picture of impending threats, from both classified and unclassified sources. The contract was awarded in Raytheon's second quarter of 2013.

"The PSS CDS is a proven solution and one that offers protection to our warfighters in hostile, remote environments by granting them real-time access to secure, multi-domain intelligence, surveillance and reconnaissance data," said Mark Kipphut, Tactical Intelligence Systems director for Raytheon's Intelligence, Information and Services business. "What makes this system unique is its game-changing capability to quickly share data between classified and unclassified environments."

The PSS CDS, a software package small enough to mount onboard an aircraft, transfers sensor data, high-definition surveillance video, and traditional and non-traditional ISR imagery, as well as situational awareness data, to give warfighters a complete picture of impending local threats, including an improvised explosive device or a group of insurgents. Additionally, the system protects U.S. forces by gathering intelligence from hundreds of miles away using sensors on aerostats, towers and unmanned aerial vehicles, allowing warfighters to make confident and informed decisions in real-time.

Background
In August 2012, NAVAIR and the U.S. Army Aviation and Missile Research Development and Engineering Center (AMRDEC)'s Precision Fires Management (PFM) program completed a test of Raytheon's PSS CDS, with the successful live fire of two Raytheon Griffin missiles.

June 10, 2013 - Raytheon announces availability of Trusted Mail System cross domain solution New information sharing software allows secure exchange of emails and attachments between users on different networks

Herndon, Va. –June 10, 2013 Raytheon Trusted Computer Solutions (RTCS), a wholly owned subsidiary of Raytheon Company (NYSE: RTN), today announced the general availability of its Trusted Mail System™ cross domain solution. This commercial-off-the-shelf, enterprise-class, multi-directional software enables the secure, policy-enforced exchange of emails and attachments between users on different networks, eliminating the need to switch between systems at multiple levels.

Agencies across the Department of Defense and federal government are looking for ways to increase cost efficiencies and improve productivity. Trusted Mail System improves user productivity and saves money by eliminating the need for multiple email clients for the same user. In addition, it improves security by prescreening and enforcing security policy on all email content including the size, type and number of attachments. The software requires no change to the user’s desktop, making it easy to implement.

“We developed this product based on our cross domain customer’s request for a ‘single inbox,’” said Ed Hammersla, chief operating officer for Raytheon Trusted Computer Solutions. “Not only does Trusted Mail System enhance productivity by eliminating the need for users to switch between email clients, users experience intangible benefits such as faster response, improved decision making and fewer errors. Our Trusted Mail System increases user productivity, enables cost savings and improves collaboration.”

Trusted Mail System uses the widely deployed, accredited and Unified Cross Domain Management Office Baseline-listed Trusted Gateway System (TGS) as the Protection Level 4 cross domain guard component. TGS ensures that malicious data is not transferred from the low side to the high side network and that sensitive data is not inadvertently or intentionally transferred from high to low.

RTCS products are designed to enable secure access and transfer of sensitive information for government, intelligence community, civilian and corporate entities in the United States and around the globe, including 5 Eyes nations and NATO. With more than a decade-and-a-half of proven success, RTCS is the global leader in cross domain solutions. RTCS products continue to strike the right balance between information protection and information sharing.

Note to Editors
“5 Eyes” is the common way to refer to the community comprised of Australia, Canada, New Zealand, United Kingdom and United States; also referred to as AUCANNZUKUS.

May 7, 2013 - Raytheon Trusted Computer Solutions Chief Operating Officer to Present at NLIT Summit 2013Ed Hammersla to Discuss Secure Information Sharing Among Disparate User Communities

Dulles, Va., – May 7, 2013 -- Raytheon Trusted Computer Solutions (RTCS), a wholly owned subsidiary of Raytheon Company (NYSE:RTN), today announced that its Chief Operating Officer (COO), Ed Hammersla, will present “Secure Information Sharing Among Disparate User Communities” at the NLIT Summit on Thursday, May 16, 2013 in Santa Fe, New Mexico. The NLIT Summit is run by the NLIT Society founded to facilitate the exchange of information between IT professionals within the DOE Complex. The NLIT Summit allows weapon, energy and science lab IT professionals to present operational and cyber security lessons learned.

WHAT: This session will investigate the challenges that the DoE laboratories face in securely sharing information. The DoE operates sixteen laboratories, four technology centers, and numerous scientific user facilities nationwide. A critical component of DoE's mission is to collect information and be able to share it in a collaborative fashion across these labs, technology centers, and scientific user facilities as well as with other government agencies. Ed Hammersla will demonstrate how to make information sharing a reality by presenting case studies representing customized information sharing, information integration and investigative services for a law enforcement agency, military weather services, and the Intelligence Community. Each system is unique, but addresses three common obstacles faced by cyber security information sharing systems to include: Legal and Policy Misalignment, Volume and Velocity, and Value vs. Risk. To view the entire abstract visit: http://www.fbcinc.com/e/nlit/agendagrid.aspx
WHO: Ed Hammersla, Chief Operating Officer, Raytheon Trusted Computer Solutions
WHERE: NLIT Summit 2013; Hilton Santa Fe Buffalo Thunder Hotel
20 Buffalo Thunder Trail, Santa Fe, New Mexico 87506
WHEN: Thursday, May 16, 2013; 2:45 p.m. MT
  For more information on the NLIT Summit 2013 visit: http://www.fbcinc.com/e/nlit/default.aspx

April 23, 2013 - Raytheon Trusted Computer Solutions Chief Operating Officer Invited to Present at CYBERInnovation Briefings on May 7 Ed Hammersla to Discuss The President’s Cybersecurity Executive Order and its Role in Secure Information Sharing with Private Industry

Dulles, Va., – April 23, 2013 -- Raytheon Trusted Computer Solutions (RTCS), a wholly owned subsidiary of Raytheon Company (NYSE:RTN), today announced that its Chief Operating Officer (COO), Ed Hammersla, will participate on the upcoming CYBERInnovation Briefings panel, “The President’s Cybersecurity Executive Order Directs the Government to Share Threat Information with Private Industry – ‘Are They Ready and Able? Does Industry See the Value?’”

WHAT: As advanced and persistent cyber attacks threaten our nation’s critical infrastructure, government and industry share a common interest in partnering to stay ahead and protect their assets. However, while they share a common goal, due to the nature of their missions and organizational drivers, their motivations are not always aligned. Earlier this year, President Obama issued an Executive Order focused on cybersecurity that requires the Department of Homeland Security (DHS) to share cyber threat information with private industry. This directive, while soundly based, generates many questions. This panel session will address questions such as: Why isn’t this already happening? Is DHS the proper entity? Will the unclassified nature of these reports provide value? How will this information be disseminated? What technology is needed to deliver threat information sharing? Will industry be receptive and is it a two-way street, will industry reciprocate? Who will benefit from this information sharing? Full event description: http://my.umbc.edu/groups/bwtech/events/17566
WHO: Panelists include:
  • Donna Dodson, Deputy Cyber Security Advisor, National Institute of Standards and Technology
  • Greg Garcia, Advisor to the Financial Services Information Sharing and Analysis Center, and former Assistant Secretary for Cyber Security and Communications at the U.S. Department of Homeland Security
  • Ed Hammersla, Chief Operating Officer, Raytheon Trusted Computer Solutions (RTCS)
  • Ron Ritchey, Chief Scientist Information Security, Bank of America
  • Steve Sullivan, Vice President, T. Rowe Price Group
  • Keith Moulsdale, Partner, Whiteford, Taylor, & Preston LLP (Moderator)
WHERE: bwtech@UMBC North, 5520 Research Park Drive Suite 110, Baltimore, MD 21228
WHEN: Tuesday, May 7, 2013; Registration and Networking: 8:30 a.m. – 9:00 a.m. ET; Panel Discussion: 9:00 a.m. –10:30 a.m. ET
REGISTER: http://www.pingg.com/rsvp/fqyai65k86a43w4t2

April 22, 2013 - Raytheon announces availability of Trusted Print Delivery™ cross domain solution Secure multilevel printing solution enables hardware reduction and cost savings with increased security

Herndon, Va. – April 22, 2013 Raytheon Trusted Computer Solutions (RTCS), a wholly owned subsidiary of Raytheon Company (NYSE:RTN), today announced the general availability of itsTrusted Print Delivery™ cross domain solution. This commercial-off-the-shelf, highly secure solution enables users to print from existing applications at different security or sensitivity levels to a single printer located on the high side network.

“By reducing the amount of hardware, space, power, support and supplies needed in environments that currently require separate printers for each sensitivity level, a great cost and administrative savings can be achieved,” stated Ed Hammersla, chief operating officer for Raytheon Trusted Computer Solutions. “When you factor in the robust security provided by the certified and accredited Trusted Gateway System guard, customers also reduce their risk exposure.”

DoD and other federal government customers are looking for ways to increase cost efficiencies and reduce their energy consumption. “Trusted Print Delivery (TPD) enables printer consolidation, which in turn enables space and energy reduction,” stated Hammersla. “This product can be instrumental in helping agencies across the DoD and federal government meet consolidation goals.”

TPD uses the widely deployed and accredited Unified Cross Domain Management Office (UCDMO) Baseline listed Trusted Gateway System (TGS) as the Protection Level 4 (PL4) cross domain guard component. TGS ensures that malicious data is not transferred from the low side to the high side network and that sensitive data is not inadvertently or intentionally transferred from a high side network to a lower level network.

RTCS products are designed to enable secure access and transfer of sensitive information for government, intelligence community, civilian and corporate entities in the U.S. and around the globe, including 5 Eyes nations and NATO. With over a decade-and-a-half of proven success, RTCS is the global leader in cross domain solutions. RTCS products continue to strike the right balance between information protection and information sharing.

Note to Editors
“5 Eyes” is the common way to refer to the community comprised of Australia, Canada, New Zealand, United Kingdom and United States; also referred to as AUCANNZUKUS.

April 2, 2013 - Raytheon Trusted Computer Solutions Chief Operating Officer Invited to Present at 25th Annual Software Technology Conference Ed Hammersla to Discuss Cross Domain Technologies and the Benefits They Bring to the Combined Air and Space Operations Center (CAOC)

Dulles, Va., – April 2, 2013 -- Raytheon Trusted Computer Solutions (RTCS), a wholly owned subsidiary of Raytheon Company (NYSE:RTN), today announced that its Chief Operating Officer (COO), Ed Hammersla, will present “Using Cross Domain Technology to Improve Access, Security and Operations” at the 25th Annual Software Technology Conference (STC) on Wednesday, April 10 in Salt Lake City, Utah. The conference brings together professionals to discuss advancements in software technology strategies, tools, techniques and lessons learned.

WHAT: The U.S. Air Force Central Command (AFCENT) supports air operations conducted in Southwest Asia, providing enhanced capabilities to the warfighters. The 350th Electronic Systems Group (ESG) established a new combined air and space operations center (CAOC).The CAOC had to provide robust systems to accommodate users and improve interoperability and make the best possible use of physical space and reduce power consumption. The switch from the old facility to the new one had to be seamless to not interrupt mission operations since it was controlling air operations in two live theaters at transition time. AFCENT selected RTCS’ cross domain technology, TTC, as the multilevel security component and technologies from Citrix, NetApp and Avocent. By implementing TTC, multiple desktop systems at each user’s workstation were replaced by a single Hewlett Packard (HP) thin client device. Users can now view multiple networks, even at different classification levels, from a single monitor. This session will outline the benefits cross domain technologies brought to CAOC. Attendees will learn to improve efficiencies with which authorized personnel are able to access mission-critical information for analysis, operational capabilities, resources, readiness and sustainability.
WHO: Ed Hammersla, Chief Operating Officer, Raytheon Trusted Computer Solutions
WHERE: 25th Annual Software Technology Conference (STC); Salt Lake Marriott Downtown at City Creek, Salt Lake City, Utah
WHEN: Wednesday, April 10, 2013; 4:45 p.m. MT

For more information on the 25th Annual Software Technology Conference (STC) visit: http://sstc-online.org/

March 1, 2013 - Raytheon collaborates with DHS to bolster cyber resiliency for nation's most critical infrastructure

Washington, D.C. – March 1, 2013 /PRNewswire/ -- Raytheon (NYSE: RTN) is collaborating with the Department of Homeland Security (DHS) to operate as a commercial service provider under the recently expanded Enhanced Cybersecurity Services (ECS) program outlined in President Obama's Executive Order on Improving Critical Infrastructure Cybersecurity. ECS is a voluntary information sharing program that assists critical infrastructure owners and operators as they improve the protection of their systems from unauthorized access, exploitation or data exfiltration.

Under a Memorandum of Agreement, Raytheon will receive active, malicious cybersecurity threat information furnished by DHS. As a commercial service provider, Raytheon will be able to use these indicators to protect the defense industrial base and other sectors of critical infrastructure. Raytheon, through its broader managed security service offerings, will be able to quickly analyze threats and defend against them, bolstering mission assurance.

"Information sharing and collaboration between government and industry partners is critical to defending our nation against the cyber threat," said Steven K. Hawkins, vice president of the Information Security Solutions product line for Raytheon's Intelligence and Information Systems business. "The Enhanced Cybersecurity Services program adds another layer of cyber resiliency for our nation's most critical resources."

For 30 years, Raytheon has delivered information assurance through innovative strategies and responsive solutions to government and industry customers. With a far-reaching set of critical cybersecurity skills and comprehensive, resilient end-to-end solutions, Raytheon provides a multi-layered approach to help anticipate and withstand cyber attacks without compromise to mission.

February 25, 2013 - NATO School Oberammergau selects Raytheon’s Trusted Thin Client to streamline multilevel training environments Cross domain solution to provide students simultaneous secure network access

Herndon, Va. – February 25, 2013Raytheon Trusted Computer Solutions (RTCS), a wholly owned subsidiary of Raytheon Company (NYSE: RTN), today announced that its Trusted Thin Client® (TTC) cross domain solution has been selected by the North Atlantic Treaty Organization (NATO) School Oberammergau Expeditionary Intelligence Training Program (EITP) to provide full access to their classroom training networks.

NATO School Oberammergau students access course work at varying network classification levels – one level at a time. Currently, classes are required to take breaks when the course work requires access to a different classification level. During the breaks, system administrators must manually switch the network connections. When Trusted Thin Client is deployed, the students will have secure access to multiple networks at the same time, improving training efficiency and removing class disruptions.

“The NATO School Oberammergau prides itself on being cutting edge, providing the best available training to its students across the 28 members of the Alliance and our partners,” said Mr. Robert Beckwith, EITP Deputy Director, NATO School Oberammergau. “Moving to the Trusted Thin Client multilevel solution will provide the most secure and seamless access to classroom networks, allowing for a more efficient and real-world experience.”

NATO School Oberammergau conducts multinational military education and individual training in support of current and developing NATO operations, strategy, policy, doctrine and procedures. Annually, about 10,000 students and conference attendees visit the school. NATO School Oberammergau provides courses of instruction in six main disciplines, mostly one week in duration, in the fields of Intelligence, Cooperative Security, Joint Operations, Joint Plans, Protection and Non-Commissioned Officer Programs.

Trusted Thin Client is the cross domain access solution of choice for the “5 Eyes” community, including Australia, Canada and the United States. TTC provides a secure means to access domains at multiple classification levels (with multiple data owners) from a single thin client -- leveraging virtual desktop infrastructure back end solutions and capitalizing on space, power and administrative costs, while increasing security.

Note to Editors
“5 Eyes” is the common way to refer to the community comprised of Australia, Canada, New Zealand, United Kingdom and United States; also referred to as AUCANNZUKUS.

November 16, 2012 - Lisa Brown Earns Washington Business Journal’s “Women Who Mean Business” Award Raytheon Trusted Computer Solutions President Recognized for Leadership, Innovation and Community Involvement in the Washington, D.C. Area

Dulles, Va. – November 16, 2012Raytheon Trusted Computer Solutions (RTCS), a wholly owned subsidiary of Raytheon Company (NYSE:RTN) today announced that the company’s President, Lisa Brown, was named to the Washington Business Journal’s prestigious “Women Who Mean Business” list. This year’s class, comprised of 25 recipients, honors influential business women with a strong record of innovation in their field, outstanding performance in business and involvement in the Washington, D.C. metropolitan community.

Ms. Brown joined what was then called Trusted Computer Solutions (TCS) in 2003 as Chief Financial Officer (CFO) and quickly elevated beyond the traditional duties of this role to a high-level technology industry leader. She played a vital role in positioning the company for acquisition in 2010, working to build buyer interest and providing insightful, detailed analysis of each prospect. Ms. Brown stayed fully involved at every stage of the transaction, overseeing legal and financial documentation creation and seeing the sale through the final negotiations. Raytheon acquired TCS in 2010 and because of Ms. Brown’s highly professional approach and immense skills, the company changed her title to President of the new, wholly-owned subsidiary. As President, she has led the company as it expanded into civilian government and commercial sectors, as well as global markets such as Australia and Canada, with a constant, steady eye toward future growth.

“The Washington D.C. area is full of talented and smart business women and I am honored to be recognized alongside them,” said Lisa Brown, President, Raytheon Trusted Computer Solutions. “Throughout my career, I’ve worked to build a solid infrastructure for companies to succeed. I share this award with the talented team of employees and leadership executives at RTCS who are committed to excellence.”

Ms. Brown serves on the Advisory Committee of The CFO Alliance, an exclusive community for finance leaders and decision makers, and is a member of the American Institute of Certified Public Accountants, Financial Executives International, Association for Corporate Growth and Women in Technology. In addition, she launched the “9Lenses” program from George Mason University, which fosters business education/communications excellence via an online, social-media platform.

November 7, 2012 - Raytheon Trusted Computer Solutions Attracts Over 250 Attendees to Cross Domain Technology Exchange Event Provides Exclusive Forum for Government Attendees to Gather Latest Information on Cross Domain Technologies and Solutions

Herndon, Va. – November 7, 2012Raytheon Trusted Computer Solutions (RTCS), a leading provider of cross domain and cyber security solutions, today announced that the third annual Cross Domain Technology Exchange (CDTE) grew to over 250 attendees in spite of Hurricane Sandy hitting the area earlier in the week (over 300 registrants). Now the largest event dedicated to cross domain technologies, it offers an intimate forum where government end users and technology partners gather to discuss real world implementations and how to advance and build next-generation solutions. The event took place November 1-2 at the Westfields Marriott in Chantilly, Virginia.

The two-day event kicked off with a keynote from Mike Mestrovich, Senior Technology Officer for Innovation, Defense Intelligence Agency (DIA) titled, “Cross Domain and Beyond.” Following the keynote, there were a variety of sessions delivered by end users, partners and RTCS executives, including:

  • The Future of Cross Domain Computing
  • Transforming Government Through Multi-level Secure Virtualization, Collaboration and Mobility
  • Cross Domain Enterprise Management
  • Cross Domain Mobility Vision
  • The Future of Guard Technology
  • Guard Customer Panel
  • Government Only Session (closed door peer-to-peer discussion)

Attendees gained insight into the company’s current and planned product roadmap and were the first to learn about the new RTCS Small Format Guard (SFG). SFG supports robust security protocols and is adaptable to specific mission needs where strict size, weight, power, and cooling (SWaP-C) specifications are required. On the lighter side, attendees participated in a reception with food and a live band that evening.

“The strong turnout and positive feedback from attendees underscores the demand for hosting such a forum to educate current and potential customers on the latest cross domain innovations and trends,” said Ed Hammersla, Chief Operating Officer, Raytheon Trusted Computer Solutions. “All Federal Agencies should be investigating how cross domain solutions can improve their operational efficiencies and this event offers an intense, two-day forum for obtaining this information. We look forward to holding this successful event again in 2013.”

Technology partners supporting the event included Cisco, Citrix Public Sector, Convergence Technology Consulting, Dell, HP, and NetApp.

RTCS develops and deploys a suite of cross domain solutions that enable government agencies to share and access information securely across multiple classified networks at different classification levels. The Company’s certified and accredited solutions help customers protect sensitive and classified information, while ensuring that the right information gets to the right people at the right time.

Click here to review the 2012 program agenda in its entirety.

November 6, 2012 - Raytheon announces Small Format Guard to secure data transfer for mobile and tactical forces Small, lightweight, low-power, and high throughput for operation outside traditional data centers

Washington, – November 6, 2012Raytheon Trusted Computer Solutions (RTCS), a wholly owned subsidiary of Raytheon Company (NYSE: RTN), today announced the addition of Small Format Guard™ (SFG) to their cross domain product portfolio.

RTCS Small Format Guard is a software-based multilevel data transfer solution built specifically for mobile and tactical forces with strict size, weight, power, and cooling (SWaP-C) requirements. Based on the widely deployed High Speed Guard solution, Small Format Guard supports robust security protocols and is adaptable to specific mission needs. Small Format Guard can operate on a single board computer, Advanced Telecommunications Computing Architecture (ATCA) processor board or other x86, 64 bit ruggedized platforms providing hardware flexibility.

“Small Format Guard enables Raytheon to deliver their premiere guard technology to a wider variety of customers such as manned and unmanned aircraft with strict operational requirements to highly mobile land vehicle configurations,” stated John Havermann, Director of Secure Processing Initiatives at Raytheon SAS. Small Format Guard delivers the flexibility and security to match the mission.

All RTCS products are backed by a seasoned Professional Services team for installation and customer configuration.

October 8, 2012 - Raytheon Trusted Computer Solutions Executive to Present at Washingtonian 2013: An Economic Outlook Company COO Ed Hammersla to Discuss the Political and Economical Landscape in the Washington, D.C. Metropolitan Region

DULLES, Va., – October 8, 2012Raytheon Trusted Computer Solutions (RTCS), a wholly owned subsidiary of Raytheon Company (NYSE:RTN), today announced that its Chief Operating Officer (COO), Ed Hammersla, will participate in the “Washingtonian 2013: An Economic Outlook” panel discussion hosted by Bisnow on Tuesday, October 16, 2012 in Falls Church, Va. During this panel, business executives will learn insights on the pending political and economic landscape in the region and how they can prepare for it.

WHAT:
The panel will feature the brightest and most influential business and government leaders in the area as they discuss the important political and economic decisions that the Washington, D.C. metropolitan region will face in the next decade. Business executives in this area will learn how to prepare their business to deal with changes to the local economy and how they can find opportunities in a challenging environment.

WHO:
Ed Hammersla, Chief Operating Officer, Raytheon Trusted Computer Solutions

WHERE:
Washingtonian 2013: An Economic Outlook; Fairview Park Marriott;
3111 Fairview Park Drive Falls Church, VA 22042

WHEN:
Tuesday, October 16; 7:00 a.m. EST

REGISTER:
http://www.cvent.com/events/dc-economic-outlook/event-summary-8e7a7eb79d364de59fc3a784d114c3b8.aspx.

October 1, 2012 - Raytheon Trusted Computer Solutions’ Ed Hammersla Appears on Government Contracting Weekly

DULLES, Va., – October 1, 2012Raytheon Trusted Computer Solutions (RTCS), a wholly owned subsidiary of Raytheon Company (NYSE:RTN), today announced that Ed Hammersla, Chief Operating Officer, appeared on the most recent episode of Government Contracting Weekly to discuss cyber security, cloud, virtualization, mobility and other technology trends. Hosted by Hilary Fordwich, the episode originally aired on Sunday, September 30, 2012 at 7:00 a.m. ET.

Link to Government Contracting Weekly’s YouTube video featuring Ed Hammersla:
http://www.youtube.com/watch?v=KlHteMKoQRw&list=PL92AC03F9F6F5D0E9&index=1&feature=plcp.

September 24, 2012 - Raytheon’s High Speed Guard achieves approval for Secret and Below Interoperability environments HSG now available to support big data transfer needs for all environments

WASHINGTON – September 24, 2012Raytheon Trusted Computer Solutions (RTCS), a wholly owned subsidiary of Raytheon Company (NYSE: RTN), today announced that its High Speed Guard cross domain solution has received formal approval for Secret and Below Interoperability (SABI) environments. This approval indicates that High Speed Guard has successfully completed the formal Certification Test & Evaluation (CT&E) process conducted by the National Security Agency (NSA). With this approval, customers are now permitted to purchase High Speed Guard and start the SABI process of Site Test & Evaluation (ST&E) on the road to a full accreditation Cross Domain Solutions Authorization (CDSA).

High Speed Guard provides extensive support for highly complex automated data transfers between multiple sensitive networks. With the industry’s highest sustained transfer rates of 9Gb/s on a 2 CPU platform, High Speed Guard supports large computer systems and demanding performance requirements with comparatively low administration costs, making it the leading choice for deployments where large quantities of data must be transferred.

RTCS HSG has been enabling big data transfer throughout the Intelligence Community for the last 15 years in support of large-scale programs. High Speed Guard has been approved to move data between the nation’s most sensitive networks at a Protection Level 4 for Top Secret and Below Interoperability (TSABI) since 2001. This SABI approval is the next step in the product evolution allowing High Speed Guard and RTCS to support an even larger range of customers.

“Completing the SABI CT&E process for HSG is like clearing the second leg of a relay race. The first leg was completed with HSG transferring production data within TSABI environments and being included on the Unified Cross Domain Management Office baseline list of approved solutions,” said Ed Hammersla, Chief Operating Officer for RTCS. “Now our SABI customers can benefit from the market’s fastest cross domain transfer solution with even greater assurance.”

September 24, 2012 - Raytheon and PACAF expand the reach of realistic training environments ‘Authorization to Connect’ renewal includes access to the Distributed Missions Operations Network

WASHINGTON – September 24, 2012Raytheon Trusted Computer Solutions (RTCS), a wholly owned subsidiary of Raytheon Company (NYSE: RTN), today announced that its SimShield™ customer, U.S. Pacific Air Forces (PACAF) and its 353d Combat Training Squadron, has been granted a Secret and Below Interoperability (SABI) renewal Authorization to Connect from the Defense Information Assurance Security Accreditation Working Group.

PACAF currently uses the SimShield multilevel transfer guard solution during tactical live range exercises at the Joint Pacific Alaska Range Complex at Eielson Air Force Base. The use of SimShield in these exercises enables training assets that operate under different security classification levels to fully communicate and securely interact, creating the most realistic training exercises possible.

Included with this SABI Authorization to Connect renewal, RTCS will also support the separate Distributed Missions Operations Network (DMON), which allows PACAF training partners to train warfighters in geographically separate locations.

“PACAF’s use of SimShield to provide secure interoperability across networks at multiple classification levels allows for more realistic and beneficial training exercises for U.S. and coalition troops,” said Ed Hammersla, chief operating officer for RTCS. “The ability to connect to DMON means that we can train forces in Australia and the U.S. during the same exercise, for example, greatly enhancing their overall preparedness to combat our global adversaries.”

August 13, 2012 - Raytheon Trusted Computer Solutions and Cisco Executives to Co-Present at 8th Annual GFIRST National Conference Industry Experts to Discuss “Transforming Government through Virtualization, Collaboration, and Secure Mobility”

DULLES, Virginia – August 13, 2012Raytheon Trusted Computer Solutions (RTCS), a wholly owned subsidiary of Raytheon Company (NYSE: RTN), today announced that Michelle Youngers, Account Executive at RTCS, and Gary Hall, Technology Solutions Planning & Architecture at Cisco Intelligence Community, will present “Transforming Government through Virtualization, Collaboration, and Secure Mobility” at the 8th Annual GFIRST National Conference on Thursday, August 23, 2012 in Atlanta, Ga. This conference brings together public and private sector leaders to discuss the latest trends and issues in cyber security and incident response.

WHAT:
Government missions require ongoing and un-tethered interactions between agencies and their partners, contractors, and customers. Over the last few years, government agencies have begun to integrate voice, video, and data collaboration networks to foster collaboration. The next step is to extend multi-network secure delivery of applications, data, and collaborative tools to mobile devices and to optimize access to information from anywhere, at any time, from any device. This is the foundation for next-generation desktop and mobile solutions. Attendees will learn:

  • how the environment is changing with the need for un-tethered interactions and the unification of all types of data
  • how secure mobile computing is delivering the next-generation user experience
  • how seamlessly interconnected physical and virtual environments can improve productivity and information sharing

WHO:
Michelle Youngers, Account Executive, Raytheon Trusted Computer Solutions (RTCS) Gary Hall, Technology Solutions Planning & Architecture, Cisco Intelligence Community

WHERE:
8th Annual GFIRST National Conference, Atlanta, Georgia

WHEN:
Thursday, August 23 at 10:30 AM EDT

REGISTER:
http://www.us-cert.gov/GFIRST/

August 8, 2012 - Raytheon unveils cross domain strategy to securely access information via mobile devices Strategy supports flexibility for a variety of mobile options

DULLES, Virginia – August 8, 2012Raytheon Trusted Computer Solutions (RTCS), a wholly owned subsidiary of Raytheon Company (NYSE: RTN), today announced that it has broadened its leading cross domain solutions strategy to include the government’s growing need to access classified cloud and terrestrial networks from a mobile phone or tablet device.

From soldiers in theater to government executives who are teleworking, the requirements for seamless collaboration have resulted in a need to access an increasing number of disparate classified or sensitive networks simultaneously from mobile devices.

“Our team is carefully watching industry developments and working with the best and most advanced technologies to ensure it continues to be the leader in providing cross domain users with the access they require, regardless of the device they use,” said Ed Hammersla, chief operating officer for RTCS.

“We are developing our mobile strategy based on direct user feedback,” he said. “There is no ‘one size fits all’ solution. The level of security required for cross domain mobile computing varies from customer to customer; thus we are building sufficient flexibility into our mobile solution to enable us to meet a variety of needs.”

To address these requirements, RTCS is introducing a secure redisplay client for its Trusted Thin Client® (TTC) system, an accredited commercial-off-the-shelf solution that provides users with secure simultaneous access to information on any number of different networks through a single connection point. This Bring Your Own Device solution will be released initially to enable mobile access to existing TTC infrastructure from personal or agency-issued devices. A demo of this solution is currently available.

Using this multi-level security solution as the foundation for its mobile offerings, RTCS is currently developing other cross domain access technologies to address security postures ranging from TTC in the cloud to agency-issued trusted mobile platforms.

RTCS also offers cross domain mobility with TTC Remote Access Implementation to enable remote authorized users to access multiple classified or sensitive networks from a laptop in the field. TTC Remote Access Implementation (RAI) boots from an encrypted USB memory stick or SD card. No sensitive data is stored on the device and the software leaves no trace once the memory stick is removed. TTC RAI is the company’s first mobile cross domain solution used by government agencies.

July 9, 2012 - Raytheon announces secure transparent access to worldwide classified networks via the cloud “DC Spanning” enables cross domain access to geographically dispersed networks

DULLES, Virginia – July 9, 2012Raytheon Trusted Computer Solutions (RTCS), a wholly owned subsidiary of Raytheon Company (NYSE:RTN), today announced that Trusted Thin Client® (TTC), is now being used by the Intelligence Community to access classified networks at remote locations throughout the cloud. TTC is a cross domain solution that enables secure access to multiple classified networks and Virtual Desktop Infrastructure (VDI) environments from a thin client and single network connection.

TTC consists of client and server software. The server component, or Distribution Console (DC), runs on a server at the data center and allows the TTC clients to securely access user desktops, data and applications from a VDI environment at each network security level (Secret, Top Secret, etc.). DC Spanning enables TTC client access across the wide area network to other DCs in the cloud. This provides immediate access to distant VDI environments at security levels not available locally.

“Placing a DC at each network’s physical point of presence, and connecting all of the DCs through the TTC network, provides users with the ability to connect to remote networks and VDI sessions. This gives them secure transparent access to previously unreachable classified networks worldwide,” stated George Kamis, Chief Technology Officer for Raytheon Trusted Computer Solutions.

DC Spanning can also be used to expand the number of network connections provided by a single DC. “If the physical limitation of DC hardware is 12 network interface cards or networks, DC Spanning can increase that to 25 or more while still maintaining the benefits of load distribution and local/regional failover capabilities. Low bandwidth networks, such as tactical and satellite communications are also supported.”

January 24, 2012 - Raytheon WebShield Added to UCDMO Baseline List - Company offers government agencies most accredited cross domain solutions to access and transfer data between networks

HERNDON, Virginia – January 24, 2012/PRNewswire/ -- Raytheon Company's (NYSE: RTN) WebShield product has been approved by the Unified Cross Domain Management Office (UCDMO) for inclusion on the version 4.1 baseline list. The UCDMO baseline is a validated products list of cross domain technologies and solutions available to agencies in the Department of Defense and intelligence community.

WebShield provides agencies with secure HTTP traffic monitoring for multi-level network access and data retrieval, which promotes more complete information browsing and discovery across networks of varying sensitivity levels. The solution enables secure Web search and browse down from high-side networks to lower-level networks.

"No other organization has been dedicated to developing cross domain solutions as long as Raytheon Trusted Computer Solutions (RTCS), nor can they match our past performance in solving government information sharing requirements," said Ed Hammersla, chief operating officer of RTCS. "The addition of WebShield to the UCDMO baseline list further extends the number of RTCS accredited solutions that are readily available to government agencies."

For a product to be included on the UCDMO baseline list, the technology must be operational, have a government sponsor and, at minimum, a three-year lifecycle support agreement. Additional Raytheon Trusted Computer Solutions products on the UCDMO baseline include Trusted Thin Client®, High Speed Guard, Trusted Gateway System™ and SimShield™. For more information visit: http://www.trustedcs.com/products/.

January 9, 2012 - Raytheon Trusted Computer Solutions Names Neil Rothberg Vice President of Finance

HERNDON, Virginia – January 9, 2012Raytheon Trusted Computer Solutions (RTCS), a leading developer of cross domain and cyber security solutions, today named Neil Rothberg as vice president of finance. In this role, Rothberg will use his leadership and financial experience to direct the company's overall financial operations, including financial planning and analysis, as well as actively participate in the company’s overall strategic planning process. He will work to assure compliance with corporate pricing and business practices and maximize billing, cash flow and revenue recognition objectives.

Bringing more than 25 years of experience to the position, Rothberg most recently served as Director of Financial Operations for Appian Corporation, an enterprise and cloud-based business process management (BPM) software provider. In this role he provided detailed management reporting including financial planning and budgeting, project-level profitability, staff utilization and staffing requirements. Previously he served in numerous financial-related positions at organizations including BearingPoint, Quadramed and Software AG (formerly SAGA Software).

“This is a critical position within any organization so it is important to hire someone with a proven track record of financial success. Rothberg’s resume speaks for itself as he has worked with both small and large technology organizations to ensure financial sustainability both short and long term,” said Lisa Brown, President of Raytheon Trusted Computer Solutions. “We look forward to his addition to the management team and his insights into supporting the company’s growth and profitability.”

Rothberg holds a Bachelor of Science degree and an MBA in Finance from American University’s Kogod School of Business.

January 5, 2012 - Raytheon and Thales Australia deliver next generation desktop to Australia’s Department of Defence
Australia’s Department of Defence to streamline IT requirements and optimize efficiency by implementing thin client technology

Herndon, VA – January 5, 2012 / Raytheon Trusted Computer Solutions (RTCS), a wholly owned subsidiary of Raytheon Company, has announced a partnership with Thales Australia to deliver an innovative next generation desktop (NGD) environment to Australia’s Department of Defence. Using the RTCS Trusted Thin Client® (TTC) software and thin client hardware, NGD seeks to generate significant Strategic Reform Program (SRP) savings by provisioning desktop environments that are simpler and less expensive to acquire and operate.

Once the TTC is in place end users will no longer require a separate desktop configuration for each network accessed. TTC provides simultaneous, yet separate, access to the Defence Restricted Network and the Defence Secret Network using one desktop configuration. With this reduction, hardware can be reallocated, reducing the need to purchase new assets. Additionally, end user workspaces are less cluttered and more energy efficient, requiring less wiring, cooling and power to operate.

RTCS develops and deploys a suite of cross domain solutions that enable government agencies to share and access information securely across multiple classified networks at different classification levels. Its certified and accredited solutions help customers protect sensitive and classified information, while ensuring that the right information gets to the right people at the right time. For more information visit: http://www.trustedcs.com/products/.

December 14, 2011 - Raytheon announces commercial availability of High Speed Guard
Company now offers secure, rapid, bi-directional data transfers in a COTS solution

Herndon, VA – December 14, 2011 / PRNewswire / — Raytheon Company’s (NYSE: RTN) High Speed Guard cross domain technology is now commercially available as on off-the-shelf product. High Speed Guard, previously offered as a service, has been on the U.S. Department of Defense’s Unified Cross Domain Management Office baseline list of approved solutions since May of 2010.

“The commercialization of HSG provides significant advantages to customers,” stated Ed Hammersla, chief operating officer for Raytheon Trusted Computer Solutions. “Now they can purchase a product license and maintenance contract and will receive all new product enhancements as well as customer support.”

The new HSG 3.0.3 release lowers data center maintenance cost and improves monitoring by enabling consolidated network management. Previously, customers would pay for each additional feature that was added to the product. Now, through commercialization of HSG, customers can benefit from product enhancements at no charge as part of a standard maintenance agreement. Another advantage of commercialization is that HSG will no longer be sold as an appliance. This allows customer’s freedom of choice in selecting a hardware platform on which to run HSG.

High Speed Guard enables complex, bi-directional, automated data transfer from one network to another. HSG has demonstrated transfer rates of more than 9 gigabits per second on dual processor commodity servers, running a hardened Red Hat® Enterprise Linux® operating system with a strict Security Enhanced Linux (SE Linux) policy.

Other cross domain solutions from Raytheon Trusted Computer Solutions include:

  • Trusted Thin Client® -- which eliminates the need for separate workstations or laptops to access multiple networks at various classification levels.
  • Trusted Gateway System™ -- which provides built-in manual review and automatic validations, enabling safe, simultaneous data movement between networks.
  • WebShield -- which enables secure web search and browse-down capabilities from high side networks to lower level networks.
  • SimShield™ -- which provides the ability to label, segregate, protect and exchange data between training and testing entities executing at different sensitivity or classification levels.

For more information visit: http://www.trustedcs.com/products/.

November 17, 2011 - Raytheon Trusted Gateway System™ added to UCDMO Baseline List
Company offers government multiple accredited information assurance solutions to access and transfer data between networks

HERNDON, Va., (Nov. 17, 2011) - / Raytheon Company’s (NYSE: RTN) Trusted Gateway System™ has been approved by the Unified Cross Domain Management Office (UCDMO) to be on the Version 4.1 Baseline list, a validated products list of cross domain technologies and solutions that are available to agencies in the Department of Defense and intelligence community.

TGS provides built-in manual review and automatic validations, such as virus scanning, file type verification, offensive word search and deep content inspection, enabling safe, simultaneous data movement between networks at different sensitivity levels. It is currently in use by a variety of government organizations. In addition to the TGS guard product, Raytheon also offers a UCDMO-approved High Speed Guard™ product, a solution to rapidly move large quantities of complex data, such as imagery and full-motion video, from one network to another.

“Effective and secure information sharing across government entities remains a top priority in intelligence and defense organizations worldwide,” said Ed Hammersla, chief operating officer, Raytheon Trusted Computer Solutions. “Raytheon’s certified and accredited solutions like TGS help customers transfer critical data across networks, keeping it secure and protecting against the unintended release of sensitive information into the wrong hands.”

For a product to be included on the UCDMO Baseline list the technology must be operational, have a government sponsor and, at minimum, a three-year life-cycle support agreement. TGS is one of several Raytheon “guard” solutions that enable secure movement of data across multiple government networks.

Other Raytheon products on the Unified Cross Domain Management Office Baseline include Trusted Thin Client®, High Speed Guard™ and SimShield™. For more information visit: http://www.trustedcs.com/products/.

July 27, 2011 - Raytheon Trusted Computer Solutions Executives Selected to Speak at 2011 Unified Cross Domain Management Office (UCDMO) Conference

HERNDON, Virginia – July 27, 2011Raytheon Trusted Computer Solutions (RTCS), a leading developer of cross domain and cyber security solutions, today announced that several executives have been invited to speak at the upcoming 2011 Unified Cross Domain Management Office (UCDMO) Conference taking place August 1-4, 2011 in Chicago, Illinois. In addition to the multiple speaking engagements, RTCS will also have a booth (booth # 106) in the exhibit hall to demonstrate its latest cross domain solutions.

The conference theme is "Keeping Pace with Cyber – A Cross Domain Perspective." Keeping up with the rapidly changing information sharing environment that cyber-aware customers demand is a tremendous challenge for everyone in the Department of Defense (DoD) and Intelligence Community (IC). During the conference attendees will be presented with information on how the cross domain community is addressing the challenge.

RTCS speaking slots include:

  • "Challenges in Providing Cross Domain Solutions – an Industry Perspective Panel" Wednesday, August 3 (9:00 a.m. – 9:45 a.m.) Ed Hammersla, Chief Operating Officer
  • "High Speed Guard – Overview & Way Ahead" Wednesday, August 3 (10:30 a.m. - 12:00 p.m.) Jason Ostermann, Chief Engineer The RTCS High Speed Guard (HSG) enables highly complex, bi-directional, automated transfers between multiple domains. Mr. Ostermann will present an overview of the solution as well as the developmental roadmap.
  • "Trusted Thin Client® – Overview & Way Ahead" Thursday, August 4 (2:00 p.m. – 2:30 p.m.) George Kamis, Chief Technology Officer The RTCS Trusted Thin Client® (TTC) provides users with unparalleled visibility to the nation's most valuable information assets and delivers flexible, simultaneous multilevel access while maintaining the highest degree of security. Mr. Kamis will provide an architecture and security feature overview as well as deployment examples.
  • "SimShield – Overview & Way Ahead" Thursday, August 4 (2:30 p.m. – 3:00 p.m.) Romil Sharma, Manager of Professional Services The RTCS' SimShield provides near real-time bi-directional fixed format data filtering and disguise. SimShield provides the mechanism that allows warfighters to participate in realistic simulation training exercises across classification levels. Mr. Sharma will discuss RTCS' SimShield's architecture, security features and current operational examples.

For more information on the conference go to: http://www.ncsi.com/ucdmo11/index.html

July 27, 2011 - Raytheon Trusted Computer Solutions Names Christopher Sciortino Vice President of Professional Services
Sciortino to head Professional Services organization for expanding Implementation and Certification & Accreditation teams

HERNDON, Virginia – July 27, 2011Raytheon Trusted Computer Solutions (RTCS), a leading developer of cross domain and cyber security solutions, today announced the addition of Christopher Sciortino as Vice President, Professional Services. In this role, Sciortino will lead an experienced Professional Services organization focused on architecting and implementing complex high assurance and cross domain solutions for Government and industry. Chris will also oversee a highly skilled Certification and Accreditation (C&A) team for ensuring solutions meet or exceed government information assurance (IA) requirements while meeting mission objectives.

Sciortino has over 22 years experience leading large-scale system implementation teams, with a strong background in strategic planning, process implementation and improvement. He has held Professional Services leadership positions with several large solutions companies including BMC Software, Computer Associates, and HandySoft Global Corporation. "Adding Sciortino to our leadership team will further strengthen RTCS' ability to deliver enterprise level cross domain implementations in North America and around the world," said Ed Hammersla, Chief Operations Officer, RTCS. "Professional Services is a critical component of RTCS' success and we are very pleased to have someone of Chris' caliber on our team."

July 25, 2011 - Raytheon Trusted Computer Solutions' Lisa Brown Receives Washington Business Journal's CFO of the Year Award
Lisa Brown Recognized for Outstanding Performance as a Financial Professional in the Business Services Category

HERNDON, Virginia – July 25, 2011 / Raytheon Trusted Computer Solutions Inc. (RTCS), a leading developer of cross domain and cyber security solutions, today announced that Lisa Brown has been named Washington Business Journal's Chief Financial Officer (CFO) of the Year. This award honors professionals in the Greater Washington area who demonstrate financial growth for their company, success in overcoming significant business challenges or barriers and establish team leadership and superior management. Ms. Brown began her role as Chief Financial Officer of Trusted Computer Solutions (TCS) in 2003 and was an instrumental advisor when Raytheon acquired the company in 2010 – so much so that post-acquisition she was promoted and currently serves as President. During the acquisition she managed the review process, reaching well beyond the expectations of the traditional CFO role.

Ms. Brown was responsible for analyzing each potential buying company and provided strategic input in gauging their interest in purchasing TCS. When Raytheon expressed interest in acquiring TCS, she was involved in every aspect of the transaction, including selecting BB&T Capital Markets as the company's representative, overseeing legal and financial documentation creation and managing the sale through the final negotiations.

The CFO of the Year judges noted, "As the role of the CFO continues to increase in scope, visibility and responsibility, CFOs like Lisa Brown are leading this transformation. Lisa's ability to lead people, performance and ultimately, results, during times of change and transition are what sets her apart from other finance leaders."

July 13, 2011 - Raytheon Trusted Computer Solutions appoints Marc Hocking as Senior Director of Technology
Hocking to represent expanding cross domain business interests in the United Kingdom and other international countries

HERNDON, Virginia – July 13, 2011Raytheon Trusted Computer Solutions (RTCS), a leading developer of cross domain and cyber security solutions, today announced the addition of Marc Hocking as Senior Director of Technology in support of the company's international growth. In this role, Hocking, who is located in London, will work closely with the company's Chief Technology Officer to expand RTCS' current international presence by promoting the benefits of their cross domain access and transfer capabilities throughout the United Kingdom (UK) and other countries outside of North America.

For the last 12 years Hocking has created and delivered architectural design and operational deployments of cross domain, e-security and Web-based systems for PwC, Becrypt, LTD, and served in several Cabinet Office positions in the UK government working on security and infrastructure architecture initiatives. Hocking brings over 20 years of experience in the IT industry to RTCS with roles encompassing senior architecture design, security architecture, application integration incorporating n-tier architecture, messaging/middleware, and application development.

"Hocking's global experience in architectural design and operational deployment of cross domain solutions both in commercial and public sector roles strengthens our market position as we expand our international presence," said Ed Hammersla, Chief Operations Officer, RTCS. "Our proven track record of implementing some of the largest cross domain implementations coupled with Hocking's leadership will enable RTCS to increase its international footprint. We are pleased to have Marc join our team."

June 21, 2011 - U.S. Joint Forces Command Deploys Raytheon's CENTAUR System at Empire Challenge
First system awarded under IDIQ contract delivered to U.S. Central Command

PARIS, France – June 21, 2011 / PRNewswire / -- U.S. Joint Forces Command sponsored the use of a Raytheon (NYSE: RTN) cross-domain and multi-national data sharing capability at this year's Empire Challenge exercise, May 23 to June 3, at Fort Huachuca, Ariz.

The Cross-Domain Enterprise All-Source User Repository (CENTAUR) capability was formally evaluated during the last two Empire Challenge exercises. Since last year's exercise, Raytheon was awarded an indefinite delivery-indefinite quantity contract with a ceiling of $68 million by the U.S. Air Force Distributed Common Ground System (DCGS) Multi-Service Execution Team Office for CENTAUR. The first order was awarded for delivery to U.S. Central Command. Under the terms of the IDIQ, Raytheon will procure, deliver, install and sustain CENTAUR components throughout a two-year contract ordering period with an additional year for sustainment activities.

"With CENTAUR, U.S. and multi-national forces can operate in a near-real-time, common environment," said Todd Trapp, director of Tactical Intelligence Solutions for Raytheon Intelligence and Information Systems. "It can save mission-essential hours and sometimes days depending on the scenario, allowing multi-national forces to securely share valuable intelligence data."

CENTAUR is a suite of products for machine-to-machine, intelligence, surveillance and reconnaissance information sharing between U.S. security domains and multi-national partners' security domains.

Before CENTAUR, if intelligence officials wanted to share information, an analyst had to submit a request via phone to another analyst to create a CD and manually push its content to another domain. Pushing intelligence from one domain to another, between classified and unclassified systems, also means working through a guard that validates whether the transfer can take place by enforcing defined releasability policy. CENTAUR automates this process and enables Web-based queries to electronically transfer information. The Raytheon High-Speed Guard CENTAUR component validates security, ISR information markings and data structure prior to transferring the information between security domains.

A CENTAUR system is currently being used at Fort Gordon, Ga., and other systems are being tested at various domestic and international locations.

For more on Raytheon's presence at the 2011 Paris Air Show please visit http://www.raytheon.com/media/parisair2011/ for multimedia downloads, features, technology spotlights and company news. Journalists may also follow Raytheon Company updates from the show on Twitter @raytheoncompany.

April 18, 2011 - Raytheon Trusted Computer Solutions Launches Mobile Cross Domain Access Solution to Support Remote Government Workers
Trusted Thin Client® Multilevel Access Solution Now Available to Remote Government Workers

HERNDON, Virginia – April 18, 2011Raytheon Trusted Computer Solutions (RTCS), a leading developer of cross domain and cyber security solutions, today announced a new implementation of its Trusted Thin Client® (TTC) solution to support remote government workers who require secure access to multiple sensitive networks while outside of a traditional office environment. The TTC Remote Access Implementation (RAI) provides field agents and other remote workers a means of securely connecting to back-end networks with no risk of data loss or compromise, while performing their job responsibilities.

The RTCS Trusted Thin Client enables users who require access to information residing on multiple sensitive networks, to work from a single endpoint versus having multiple endpoints connected to each network. Network separation ensures that classified or sensitive data is not compromised by advanced persistent threats or ends up in the wrong hands. The user's endpoint can be a thin client device, a virtual machine within a workstation, and now, with RAI, a virtual machine securely running TTC from a locked down device such as an encrypted memory stick. Data and applications reside solely at the organization's network data center and are accessed, viewed and changed through secure remote connectivity. The solution protects the data and ensures that no evidence of data resides on the system when shut down.

"As government organizations and our military require mobility to fulfill their missions, cross domain solutions are increasingly important to our nation's security," stated Ed Hammersla, Chief Operating Officer for Raytheon Trusted Computer Solutions. "Workers are no longer confined to a desk, but are doing their jobs from home or completing a mission in the field. RTCS' Remote Access Implementation option ensures the same level of security as if one was working from their offices, therefore protecting sensitive and classified information. The desktop image has been demonstrated to fully boot and be useable within 90 seconds so there is no delay in enablement."

April 6, 2011 - Raytheon Trusted Computer Solutions and Convergence Technology Consulting to Host Security from the Desktop to the Data Center Webinar April 13

HERNDON, Virginia – April 6, 2011Raytheon Trusted Computer Solutions (RTCS), a leading developer of cross domain and cyber security solutions, and Convergence Technology Consulting, LLC, a top provider of enterprise infrastructure, virtualization and access solutions, are partnering with the Armed Forces Communications and Electronics Association's (AFCEA) SIGNAL Magazine to present a webinar titled, "Security from the Desktop to the Data Center."

The Department of Defense and the Intelligence Community require real time access to highly sensitive data and the ability to securely share that data with other agencies and communities of interest. The webinar presenter's will discuss how multilevel access solutions, in combination with data center virtualization, provide users with unparalleled visibility to the data critical in protecting our nation's most valuable information assets without compromising security.

WHEN: April 13, 2011 at 1:00 PM Eastern Daylight Time
SPEAKERS: George Kamis, Chief Technology Officer at Raytheon Trusted Computer Solutions (RTCS) will discuss cutting edge and proven cross domain solutions built on over 16 years of industry experience. We will discover how today agencies are using Commercial-Off-The-Shelf (COTS) access and transfer solutions to address the most stringent government security requirements.
  Phil Ernst, Chief Executive Officer/Chief Technology Officer at Convergence Technology Consulting (CTC) will discuss virtualization and data center infrastructure solutions. He will also deliver best practice information on planning, design and implementation of server, desktop, I/O, application and storage virtualization and services for business continuity and disaster recovery planning.
REGISTER: Security from the Desktop to the Data Center
March 22, 2011 - Raytheon to host Virginia governor, local technology leaders at new Herndon offices

HERNDON, Virginia – March 22, 2011Raytheon Company (NYSE: RTN) will formally dedicate new offices for its Herndon, Va.-based Raytheon Trusted Computer Solutions unit with a ribbon-cutting ceremony March 29 featuring remarks by Virginia Gov. Bob McDonnell. In his address, McDonnell will highlight how the technology sector is contributing to Virginia's job growth and economic prosperity. Other scheduled speakers include Bobbie Kilberg, president and CEO of the Northern Virginia Technology Council; Gerald L. Gordon, Ph.D., president and CEO of the Fairfax County Economic Development Authority; Steve Hawkins, vice president of Raytheon Information Security Solutions; and Ed Hammersla, chief operating officer, Raytheon Trusted Computer Solutions.

"Job creation is the top priority of my administration, and we are working closely with companies in Virginia to assist them in creating more jobs every day to help put the Commonwealth on the fast track to economic recovery," said McDonnell. "Virginia is an attractive place for companies such as Raytheon to expand operations, especially given the large pool of technology talent in the area and our pro-business policies. That's why the Commonwealth enjoys standing as one of the best places to do business in the nation."

Raytheon Trusted Computer Solutions is part of Raytheon's Intelligence and Information Systems business. The company re-located recently to its new 45,000-square-foot Herndon location to accommodate future growth, which includes capacity for an additional 200 employees. In addition to the Herndon RTCS office, Raytheon has approximately 1,200 employees using more than 600,000 square feet near Dulles International Airport. Overall, Raytheon employs more than 4,200 professionals in 19 Virginia cities. Trusted Computer Solutions became part of Raytheon in November 2010 and is one of eight companies Raytheon has acquired since 2007 to support the delivery of end-to-end cybersecurity solutions.

"We are honored that Gov. McDonnell and other local elected officials and technology leaders will help us officially dedicate our new headquarters," said Ed Hammersla, chief operating officer, Raytheon Trusted Computer Solutions. "For 17 years we've had exceptional employees who've helped us grow and become a recognized company for delivering quality cross domain solutions and security offerings to both government organizations and the commercial sector."

February 10, 2011 - Government Adoption of Cross Domain Solutions Helps Raytheon Trusted Computer Solutions Set Record Revenue Growth in Fourth Quarter 2010

HERNDON, Virginia – February 10, 2011Raytheon Trusted Computer Solutions (RTCS), a leading developer of cross domain and cybersecurity software and services, today announced it has achieved the largest revenue-generating quarter in the company's history ending December 31, 2010. The fourth quarter results are based on a string of successes for the company, including significant government contract wins with the Defense Intelligence Agency, Missile Defense Agency, and the Canadian Navy. RTCS achieved a 92% increase in Q4 revenues in 2010 over the same time period last year, with year-end revenues exceeding those of 2009 by 32%.

RTCS develops and deploys the company's SecureOffice® suite of cross domain solutions that enable government and civilian agencies to share and access information securely across multiple classified networks at different classification levels. The Company's certified and accredited cross domain solutions help customers protect sensitive and classified information, while ensuring that the right information gets to the right people at the right time.

"We saw increased revenue growth as a result of more decision makers within the Department of Defense and Intelligence Communities recognizing the value of implementing cross domain solutions in their organizations," stated Ed Hammersla, Chief Operating Officer, RTCS. "The need for solutions that enable secure information sharing and collaboration between classified networks, without the cumbersome and costly aspects of multiple computers at each desktop, is what is driving this growth. We are very proud that our 2010 success includes the addition of twenty-six new customers, further demonstrating the growing adoption and need for cross domain solutions."

RTCS, formerly Trusted Computer Solutions, was acquired as a wholly-owned subsidiary of Raytheon Company on November 4, 2010, and was Raytheon's seventh acquisition since 2007 to support the delivery of end-to-end cybersecurity solutions. RTCS is part of Raytheon's Intelligence and Information Systems (IIS) division, which is headquartered in Garland, Texas.

December 1, 2010 - Raytheon cross domain transfer solution achieves Top Secret/SCI and Below Interoperability Authority to Operate
Distributed Common Ground System-Army implements Linux-based SecureOffice® Trusted Gateway System as part of accredited system

HERNDON, Virginia – December 1, 2010 – A Raytheon Company (NYSE: RTN) system has been authorized to operate at the Top Secret/SCI and Below Interoperability (TSABI) level. Known as SecureOffice® Trusted Gateway SystemSecureOffice® Trusted Gateway System, TGS supports organizations whose missions require rapid, multidirectional transfer of any data type between numerous security levels.

The Distributed Common Ground System-Army (DCGS-A) worked with Raytheon to bring its system through the TSABI certification and accreditation process, which will allow the military to take advantage of the newest innovations in transfer solutions and realize significant cost savings.

DCGS-A is the premier platform program for enterprise enablement of intelligence, surveillance and reconnaissance (ISR) information technology assets. It is the Army's ground portion of a joint intelligence, network-centric enterprise that unifies collection, processing, analysis, extraction, query and visualization of ISR capabilities for the tactical environment.

"Providing our warfighters with a unified operational picture is essential in evaluating events in real time so they can execute their missions effectively," said Ed Hammersla, chief operating officer, Raytheon Trusted Computer Solutions. "For nearly two decades, we've been working with our military customer to provide cross domain solutions that enable users to access and distribute mission-critical information. The DCGS-A's implementation of TGS, which provides valuable tactical information to the warfighter, was a key element in obtaining TSABI certification."

Raytheon Company, with 2009 sales of $25 billion, is a technology and innovation leader specializing in defense, homeland security and other government markets throughout the world. With a history of innovation spanning 88 years, Raytheon provides state-of-the-art electronics, mission systems integration and other capabilities in the areas of sensing; effects; and command, control, communications and intelligence systems, as well as a broad range of mission support services. With headquarters in Waltham, Mass., Raytheon employs 75,000 people worldwide.

Media Contacts:
Jared Adams, Raytheon, 571.250.2422, iicommunications@raytheon.com
Evan Weisel, Welz & Weisel Communications, 703.218.3555, evan@w2comm.com

November 2, 2010 - Trusted Computer Solutions Signs First Asia Pacific Reseller for Security Blanket®
eB2Bcom to Offer Industry's Only Automated Operating System Lock Down Tool for Linux® and Solaris to its Customers

HERNDON, Va. – November 2, 2010Trusted Computer Solutions (TCS), a leading developer of cross domain, operating system and network security solutions, today announced that the company's award-winning, automated, operating system lock down tool, Security Blanket®, is now available to organizations and government agencies throughout the Asia Pacific region. TCS has signed an agreement with eB2Bcom, a leading independent master reseller of IT security technologies in the Asia Pacific region, to resell TCS' Security Blanket to its customers located in Australia and New Zealand, as well as throughout South East Asia.

Security Blanket offers a cost-effective way to consistently and predictably secure an organization's systems in a fraction of the time that it takes to lock them down manually. The solution enables system administrators to configure and enhance the security level of operating systems including Red Hat® Enterprise Linux® versions 4 and 5, CentOS versions 4 and 5, Solaris™ 10, Oracle® Enterprise Linux 4 and 5, Novell® SUSE® 11 and openSUSE® 11, as well as Fedora™ 10, 11, 12 and 13. Security Blanket also supports Linux on IBM® System z®.

"eB2Bcom has a 14 year track record in the Asia Pacific region of introducing, marketing and supporting the products of innovative IT security suppliers," said Bob White, Founder and CEO of eB2Bcom. "Security Blanket is an ideal fit for our business as organizations clearly can benefit from an automated solution for locking down their Linux and Solaris operating systems. In many cases, systems are left unsecured due to the manual process required to keep them up to date. We now deliver the industry's only solution for ensuring these systems meet internal and external security and compliance guidelines."

This announcement broadens the organizations' existing long-term relationship, as eB2Bcom is currently a reseller of TCS' secure information sharing cross domain solutions.

"Security Blanket enables organizations and government agencies a way to simplify the process of locking down an operating system to improve operational efficiencies and ensure adherence to internal and external security policies," said Ed Hammersla, Chief Operating Officer, Trusted Computer Solutions. "We already have a strong relationship with eB2Bcom and are confident in their abilities to demonstrate the ROI of Security Blanket to their current and prospective customers."

For more information on Security Blanket, visit http://www.trustedcs.com/SecurityBlanket/SecurityBlanket.html

About eB2Bcom
Founded in 1996, with Regional HQs in Melbourne Australia and Singapore, eB2Bcom is a leading value-added Master Reseller of IT Security technologies for specialist Suppliers from USA, Europe, Asia and Australia. eB2Bcom has a sales-orientated business model and has a large bluechip and government customer base in the Region. www.eb2bcom.com

November 1, 2010 - Thales Australia and Trusted Computer Solutions to Present Product Briefing at MilCIS 2010

CANBERRA, Austrailia – November 1, 2010Trusted Computer Solutions (TCS), a leading developer of cross domain, operating system and network security solutions, and Thales Australia, a TCS Certified Integrator and global technology leader for defence, security, aerospace and transport markets, announced today that the companies will jointly host a product brief titled "Enabling Mission Readiness through Cross Domain Solutions" during MilCIS 2010 at the National Convention Centre on 11 November from 3:30 – 4:30 p.m.

The product brief will look at how cross domain solutions (CDS) enable the secure access to information on multiple enclaves at dissimilar classification or sensitivity levels and the transfer of information between networks. In addition, the presenters will discuss how TCS' SecureOffice® Trusted Thin Client® and other products within the SecureOffice Suite provide access to reliable, accurate and timely intelligence that ultimately results in a high degree of mission readiness. Real world customer success stories will be presented during the discussion.

WHO: Product Brief: Enabling Mission Readiness through Cross Domain Solutions
WHAT: Thursday, 11 November
WHEN: George Kamis, Chief Technology Officer, Trusted Computer Solutions
Paul Feighan, General Manager – Sales and Strategy Development, National Security & C4I, Thales Australia
WHERE: Nicholls Theatre
National Convention Centre
Canberra, Australia

About Thales Australia
Thales is a global technology leader for the Defence & Security and the Aerospace & Transport markets. In 2009, the company generated revenues of €12.9 billion (equivalent of AUD 22.7 billion) with 68,000 employees in 50 countries. With its 22,500 engineers and researchers, Thales has a unique capability to design, develop and deploy equipment, systems and services that meet the most complex security requirements. Thales has an exceptional international footprint, with operations around the world working with customers as local partners. www.thalesgroup.com.

Thales Australia is a trusted partner of the Australian Defence Force and is also present in commercial sectors ranging from air traffic management to security systems and services. Employing around 3,500 people in over 35 sites across the country, Thales Australia recorded revenues of more than AUD 1 billion in 2009.

October 25, 2010 - Trusted Computer Solutions Hosts First Annual Cross Domain User Group Conference
Defense Intelligence Agency's Next Generation Desktop Environment Contract Underscores Interest in Cross Domain Technology Implementations

HERNDON, Va. – October 25, 2010Trusted Computer Solutions (TCS), a leading provider of cross domain and cyber security solutions, today announced the success of its inaugural Cross Domain User's Group Conference held from October 20 – 21 at the Dulles Hilton located in Dulles, Va. Over the course of two days, cross domain customers and partners came from all over the world to attend the event that included an overview of TCS' product roadmap, presentations on successful customer implementations and best practices.

The event was highlighted by two keynote addresses that included Alan Wade, former Central Intelligence Agency CIO and a member of TCS' Board of Advisors, and Frank Abagnale, whose story was the basis for the book and motion picture, "Catch Me If You Can," as well as a presentation from Dan Nichols, the Unified Cross Domain Management Office's (UCDMO), Technical Director.

"We were very pleased with such a strong turnout," commented Ed Hammersla, Chief Operating Officer, Trusted Computer Solutions. "The feedback we received from our customers and partners was excellent and everyone encouraged us to continue with this annual event which we definitely will do. We hope that word-of-mouth promotion will ensure even larger attendance next year."

October 25, 2010 - Trusted Computer Solutions SimShield™ Included on Unified Cross Domain Management Office's (UCDMO) Baseline Re-Use List
Company Offers Federal Agencies the Most Accredited Information Assurance Solutions to Access and Transfer Information between Networks

HERNDON, Va. – October 25, 2010Trusted Computer Solutions (TCS), a leading developer of cross domain, operating system and network security solutions, today announced that SimShield™ has been accredited and added to the Unified Cross-Domain Management Office (UCDMO) Baseline Re-Use List Version 3.5, a listing of technologies and solutions that are available to agencies in the Department of Defense and the Intelligence Community. SimShield is the Company's fixed format cross domain solution that allows distributed simulation networks, operating under different security classifications, to communicate.

SimShield is a Secret and Below Interoperability (SABI) level certified product that provides the capability to label, segregate, protect and exchange data between training ranges executing at different sensitivity or classification levels. In addition, the solution allows customers such as the Pacific Air Force and the 353 Combat Training Squadron, the United States Air Forces in Europe (USAFE) Warrior Preparation Center (WPC) and the Georgia Air National Guard (GAANG) Combat Readiness Training Center (CRTC), the option to select the simulation protocol best suited for their needs. These customers use SimShield's Test and Training Enabling Architecture (TENA) protocol, which is a standard for conducting live, virtual and constructive exercises. In addition, the product also supports both the Distributive Interactive Simulation (DIS) and High Level Architecture (HLA) environments.

"The UCDMO is an important coordination and oversight agency that oversees all cross domain initiatives across the Department of Defense and Intelligence Community to ensure the vetted solutions fully support an integrated approach to information sharing," said Ed Hammersla, Chief Operating Officer, Trusted Computer Solutions. "Since the establishment of the UCDMO in 2006, TCS has worked directly with the organization, providing knowledge and understanding of commercial off-the-shelf cross domain solutions that protect the most sensitive, classified information."

For a product to be included on the UCDMOs Re-Use Baseline list the technology must be operational, have a government sponsor and at least a three year lifecycle support agreement. Currently, TCS has four products on the UCDMOs Re-Use Baseline list in addition to SimShield:

October 18, 2010 - Trusted Computer Solutions' Client Executive Wins AFCEA NOVA's SuperNOVA Award

HERNDON, Va. – October 18, 2010Trusted Computer Solutions (TCS), a leading developer of cross domain, operating system and network security solutions, today announced that Michelle Youngers, Client Executive, has received AFCEA NOVA's, SuperNOVA award. This award is given to the volunteer who has made the most significant contributions to the association. Michelle was selected for the outstanding job she has done this year as Chair of the AFCEA Luncheon Committee. Michelle received the award at the AFCEA NOVA luncheon on October 15 at the Sheraton Premiere in Tysons Corner, where she was seated at the head table with guest speaker, MG Steve Smith of the Army Cyber Command.

"We are very proud of the voluntary contribution that Michelle has made to AFCEA NOVA," stated Chris Sortzi, Vice President of Sales for Trusted Computer Solutions. "We encourage our employees to get involved in industry organizations but we also recognize the amount of personal time that such involvement demands. Michelle has done an outstanding job in supporting AFCEA and we commend and support her efforts."

August 17, 2010 - Trusted Computer Solutions to Present at Air Force Information Technology Conference 2010

HERNDON, Va. – August 17, 2010Trusted Computer Solutions (TCS), a leading developer of cross domain, operating system and network security solutions, today announced that Steve Welke, Principal Consultant, will present during the upcoming Air Force Information Technology Conference 2010 (AFITC) taking place in Montgomery, Ala. from August 30 – September 2. Mr. Welke's session, "Working toward Synergy Between the Two Cross Domain Solution Certification and Accreditation Processes," will occur on Monday, August 30 from 12:30 – 1:15 p.m. ET.

Mr. Welke's presentation will look at the Department of Defense (DoD) and Intelligence Community's (IC) use of two different cross domain solution (CDS) certification and accreditation (C&A) processes. He will address the differences between the two CDS C&A processes as well as the successes and challenges in working to foster synergy between them both.

Mr. Welke will provide insights obtained during his 24 years of industry experience in the information assurance field, with a specific focus on trusted operating systems and CDS requirements, analysis and implementation. Steve specializes in C&A of computer systems, especially as they relate to cross domain C&A efforts.

WHO: Steve Welke, Principal Consultant, Assurance Policy & Standards, Trusted Computer Solutions
WHAT: Working toward Synergy Between the Two Cross Domain Solution Certification and Accreditation Processes
WHEN: River Room 4, Renaissance Montgomery Hotel & Spa at the Convention Center, Montgomery, Alabama
WHERE: Monday, August 30; 12:30 – 1:15 p.m.
August 9, 2010 - Raytheon High-Speed Guard now on U.S. GSA Schedule

BOSTON, Ma. – August 9, 2010 – /PRNewswire/ -- Raytheon Company's (NYSE: RTN) High-Speed Guard information-sharing solution has been added to the U.S. General Services Administration (GSA) schedule of products and services available to the government.

Raytheon High-Speed Guard provides the ability to transfer information between security domains at the industry's fastest transfer speeds. GSA is America's only source solely dedicated to procuring goods and services for the government.

Raytheon High-Speed Guard was also recently added to the Unified Cross Domain Management Office Baseline list of cross-domain technologies. The UCDMO is a joint Department of Defense (DoD) and Intelligence Community (IC) organization that provides centralized coordination and oversight of cross-domain initiatives across these communities. Inclusion on the UCDMO Baseline provides DoD and IC customers a list of proven technologies and solutions.

The industry's fastest cross-domain information-sharing solution, High-Speed Guard boasts information transfer speeds up to 9 gigabits per second. High-Speed Guard provides customers a wide array of bidirectional capabilities for enforcing complex and dynamic security policies while maintaining a strict security posture.

With a proven track record of more than 190 installations, Raytheon High-Speed Guard is able to sustain full transfer rates on dual-processor commercial off-the-shelf servers running Red Hat Enterprise Linux 5 with a strict Security Enhanced Linux policy.

Raytheon will be demonstrating High-Speed Guard at the fourth annual UCDMO Conference Aug. 9-12, 2010, in Boston.

Raytheon Company, with 2009 sales of $25 billion, is a technology and innovation leader specializing in defense, homeland security and other government markets throughout the world. With a history of innovation spanning 88 years, Raytheon provides state-of-the-art electronics, mission systems integration and other capabilities in the areas of sensing; effects; and command, control, communications and intelligence systems, as well as a broad range of mission support services. With headquarters in Waltham, Mass., Raytheon employs 75,000 people worldwide.

July 1, 2010 - Trusted Computer Solutions Receives Patent for SELinux Policy Translation Methodology
Cross Domain Solutions from Trusted Computer Solutions Now Patent Protected in Linux Environments

HERNDON, Va. – July 1, 2010Trusted Computer Solutions (TCS), a leading developer of cross domain, operating system and network security solutions, today announced their official receipt of a patent for Security Enhanced (SE) Linux® Sensitivity Label Translation from the US Patent and Trademark Office. The patent application was filed on 29 June 2005 and was issued as US Patent No. 7,657,834 on 2 February 2010. "This five year process has now culminated in a grant of patent rights by the PTO. We are very proud of our excellent researchers and developers who created this significant innovation," stated Ed Hammersla, Chief Operating Officer for TCS. Use this link to access the complete patent.

In order to address the needs of the Department of Defense (DoD) and Intelligence Community (IC) for workstations that could process highly classified data from multiple classified networks, the Defense Intelligence Agency (DIA) and The MITRE® Corporation, a federally funded research and development organization founded in 1958, created the Compartmented Mode Workstation (CMW) Labeling: Encoding Format. This software handles encodings for sensitivity labels, information labels, clearances, channels, print banners, and accreditation ranges. CMW systems, such as Trusted Solaris™, use the internal CMW representation for security decisions. As a result, early cross domain solutions, including many from TCS, and other multi-level applications were built using these platforms.

TCS invested a great deal of time and resources into the open development efforts of a trusted version of Linux, known today as SELinux to provide cross domain users with platform choice and the ability to run on a mainstream, open source operating system. SELinux is embedded in the commercially available mainstream operating system known as Red Hat® Enterprise Linux® version 5.

Before the SELinux Sensitivity Label Translation technique was developed, no means existed to readily translate from the internal CMW label representation to an SELinux policy representation, which greatly limited system interactivity. The Sensitivity Label Translation system provides the method to perform this translation, thereby addressing a significant need.

"The receipt of this patent is a result of innovative thinking and technical leadership," stated Hammersla. "All of which contribute to further strengthen our leadership position in cross domain solutions."

June 10, 2010 - Trusted Computer Solutions Announces June 24 Webcast:
"Implementing the Department of Defense Information Assurance Certification and Accreditation Process"

HERNDON, Va. – June 10, 2010Trusted Computer Solutions (TCS), a leading developer of cross domain, operating system and network security solutions, today announced it will host a complimentary webcast titled "Implementing the Department of Defense Information Assurance Certification and Accreditation Process" (DIACAP) taking place on Thursday, June 24 at 11:00 a.m. ET.

As part of TCS' certification and accreditation white paper and webcast series, this event will address the future changes to DIACAP by comparing them to the Department of Defense Information Technology Security Certification and Accreditation Process (DITSCAP) and provide recommendations on implementing the best methods. The webcast will address the following:

  • How to make the switch from DITSCAP to DIACAP
  • The differences between DITSCAP and DIACAP
  • Developments surrounding the National Institute of Standards & Technology (NIST) and DIACAP

TCS' Principal Consultant, Steve Welke, will lead the webcast and provide attendees with insights obtained during his 24 years of industry experience in the information assurance field, with a specific focus on trusted operating system (TOS) and cross domain solution (CDS) requirements, analysis and implementation. Steve specializes in certification and accreditation (C&A) of computer systems, especially as they relate to cross domain C&A efforts.

WHO: Steve Welke, Principal Consultant, Assurance Policy & Standards, Trusted Computer Solutions
WHAT: Implementing the Department of Defense Information Assurance Certification and Accreditation Process
WHEN: Thursday, June 24; 11:00 a.m. – 12:00 p.m. ET
WHERE: Webcast; Registration for the event can be accessed at TCS Webcast Registration.
May 11, 2010 - Trusted Computer Solutions Announces May 20 Webcast
"Expanding the Reach of Cross Domain Thin Client Computing">

HERNDON, Va. – May 11, 2010 Trusted Computer Solutions leading developer of cross domain, operating system and network security solutions, today announced it will host a complimentary webcast titled "Expanding the Reach of Cross Domain Thin Client Computing" taking place on Thursday, May 20 at 11 a.m. ET. Attendees of the webcast will walk away with a better understanding of various SecureOffice® Trusted Thin Client® (SOTTC) implementation options and supported back end configurations, as well as advancements in secure multilevel transfer technology.

The webcast will highlight the following:

  • SOTTC flexible implementation options:
    • Traditional thin client hardware access
    • Virtual access
    • Remote access
  • Various data center/back end virtual desktop infrastructure (VDI) architectures leveraged by SOTTC:
    • Citrix® XenDesktop™
    • Quest® vWorkspace™
    • VMware® View™
  • New developments in PC-over-IP support
  • Exciting advancements in secure multilevel transfer – SecureOffice® Trusted Gateway System™ can now support Quick Release

TCS' Chief Technology Officer (CTO) George Kamis will lead the webcast and provide attendees with insights obtained during his 25 years of operational and management expertise in secure systems engineering. Before assuming his role as CTO in the fall of 2006, Mr. Kamis served as Vice President of Engineering at TCS for the past ten years. Prior to joining Trusted Computer Solutions, he served at the U.S. Naval Research Laboratory for the Center for High Assurance Computer Systems where he was the principal investigator for multiple Information and Communication Security related programs. Kamis holds active memberships in both the Institute of Electrical and Electronics Engineers (IEEE) and Armed Forces Communications and Electronics Association (AFCEA).

WHO: George Kamis, Chief Technology Officer, Trusted Computer Solutions
WHAT: Expanding the Reach of Cross Domain Thin Client Computing
WHEN: Thursday, May 20; 11:00 a.m. - Noon ET
WHERE: Webcast; Registration for the event can be accessed at TCS Webinar Registration
May 10, 2010 - Trusted Computer Solutions Congratulates Air Force Key Management Program Office
Air Force Receives "Office of the Secretary of Defense Certificate of Excellence" for Development of a Net-Centric, Wireless Key Distribution System

HERNDON, Va. – May 10, 2010Trusted Computer Solutions (TCS), a leading developer of cross domain, operating system and network security solutions, congratulates the U.S. Air Force's Key Management Program Office for receiving the prestigious Certificate of Excellence award from the Office of the Secretary of Defense (OSD). The Air Force Key Management Program Office is responsible for the enablement of secure, mission-driven access to information and services. Utilizing crypto key management expertise, and incorporating TCS technology, the Key Management Program Office developed a net-centric, key distribution system that saves time and improves operational readiness.

TCS' SecureOffice® Trusted Gateway System™ (TGS) is included as part of the system to securely transfer the key data via the network. The uni-directional TGS (for Trusted Solaris™) is listed on the Unified Cross-Domain Management Office (UCDMO) Baseline Re-Use list and is widely implemented throughout the Department of Defense (DoD). This older platform is quickly being replaced with the bi-directional TGS (for Red Hat® Enterprise Linux®), which, through a different U.S. Government customer, received a Top Secret/SCI and Below Interoperability Interim Authority to Test (TSABI IATT) for a Protection Level 4 system in February 2010. "We congratulate the Air Force Key Management Program Office for the work they have done to build this innovative system and for the recognition that OSD has bestowed on them," stated Ed Hammersla, Chief Operating Officer, Trusted Computer Solutions. "TCS continues to collaborate with the government and the military to develop innovation use-case scenarios, such as this one, for secure access and transfer of classified information. It is very satisfying to know that a TCS product is playing a role in improving processes for these mission critical operations."

May 3, 2010 - Trusted Computer Solutions Announces May 18 Webcast
"Automated Operating System Security for Consistent Enterprise Compliance"

HERNDON, Va. – May 3, 2010Trusted Computer Solutions (TCS), a leading developer of cross domain, operating system and network security solutions, today announced it will host a complimentary webcast titled "Automated Operating System Security for Consistent Enterprise Compliance" taking place on Tuesday, May 18 at 11:00 a.m. ET. The webcast will provide IT professionals with best practices for planning, implementing and maintaining effective operating system (OS) lock down.

Leading the webinar is TCS' Jamie Adams who has over 20 years experience as a software developer and systems engineer for classified and unclassified systems. Throughout his career, he has been involved in the design, deployment, operation and accreditation of large scale, highly available mission critical systems in both the public and private sectors.

The webinar will address the following:

  • Why locking down an OS should be on every system administrators list of priorities for 2010
  • How to effectively reduce time spent on locking down an OS
  • The security risks involved by not locking down an OS
WHO: Jamie Adams, Senior Secure Systems Engineer, Trusted Computer Solutions
WHAT: Automated Operating System Security for Consistent Enterprise Compliance
WHEN: Tuesday, May 18; 11:00 a.m. – Noon ET
WHERE: Webcast; Registration for the event can be accessed at TCS Webcast Registration
April 27, 2010 - Trusted Computer Solutions Names Brian L. Piccioni Vice President of Finance and Chris C. Sortzi Vice President of Sales
Executives Strengthen Management Team and Position Company for Continued Growth

HERNDON, Va. – April 27, 2010Trusted Computer Solutions (TCS), a leading developer of cross domain, operating system and network security solutions, today announced the appointment of Brian L. Piccioni as Vice President of Finance and Christopher C. Sortzi as Vice President of Sales for Cross Domain Solutions. These new hires are in direct support of the aggressive growth TCS expects as organizations continue to make security a top priority and increase spending on solutions.

Piccioni brings over 15 years of financial management experience to TCS with a track record of implementing innovative strategies that fulfill financial, operational and quality objectives. In his role as Vice President of Finance he oversees the Company's financial planning and analysis, specifically on revenue and profit growth. Most recently, Piccioni served as the Director of Financial Planning & Analysis at GEOEYE, Inc.

As Vice President of Sales for Cross Domain Solutions, Sortzi provides leadership for the sales and sales engineering team by developing and implementing strategies to generate high-volume sales. Sortzi brings TCS 22 years of proven, successful sales management experience for public and private companies. Most recently, he served as Senior Director of Department of Defense Sales at Intelligent Decisions. Sortzi has also successfully led sales organizations at RightNow Technologies and Computer Associates.

"During the past 24 months TCS has broadened its solution set and is well positioned for substantial growth based on its ability to address multiple security concerns," said Ed Hammersla, COO, Trusted Computer Solutions. "Both Brian and Chris bring TCS experience and expertise that support the Company's ability to execute against its aggressive growth plan. Clearly having individuals at the top of their game when it comes to finance and sales are required to ensure corporate success."

April 12, 2010 - Trusted Computer Solutions Partners with Government Computer News to Host Free eSeminar: "The National Security Challenge: Cross-Domain Information Sharing"
Director of the Unified Cross Domain Management Office to Discuss How Agencies are Working to Share Information Across Multiple Secure Networks

HERNDON, Va. – April 12, 2010Trusted Computer Solutions (TCS), a leading developer of cross domain and cyber security solutions, today announced that the company has partnered with Government Computer News (GCN) to host a complimentary eSeminar titled "The National Security Challenge: Cross-Domain Information Sharing" featuring Marianne Bailey, Director of the Unified Cross Domain Management Office (UCDMO). The event will take place on Wednesday, April 14 at 2:00 p.m. ET and will be moderated by GCN's Senior Technology Editor, Rutrell Yasin. During this session, Ms. Bailey will discuss the unique challenges facing government agencies as they work together to share critical, but not necessarily classified, national security information.

As recent events such as Northwest Airlines Flight 253 have highlighted, some of the most critical components of the intelligence enterprise lie not in the gathering of information, but in its dissemination. The intelligence community has built numerous models for sharing classified information, including the use of wikis and working groups, but it's now apparent that unclassified information from across the government is also critical in connecting the dots. This eSeminar will outline how agencies are working together to cross the divide and meet the national security challenge. Specifically, the presentation will address:

  • How the UCDMO is standing at the nexus of information sharing across the intelligence community
  • What processes and best-practices can be established to streamline the flow of information
  • The need for real-time information exchanges during critical operations
  • How information gathering and information analysis functions can be bridged during a crisis
  • Lessons learned for agencies across the government

To register: http://gcn.com/webcasts/2010/04/fcw-cross-domain-info-sharing.aspx?sc_lang=en

March 29, 2010 - Secure Information Sharing Solutions Drive Trusted Computer Solutions International Growth
U.S. Allies Embrace Cross Domain Solutions to Gain Access to Intelligence Information between Secure Domains of Varying Classification Levels

HERNDON, Va. – March 29, 2010Trusted Computer Solutions (TCS), a leading developer of cross domain and cyber security solutions, today announced it is experiencing significant growth within the international community for its suite of cross domain software products that enable organizations to securely share information, a vital component to national security. To gain global market traction, TCS has recently begun working with several integrators, partners, and resellers including Becrypt, a leading provider of information assurance solutions; Thales Australia, a primary defense contractor for the Australian Defense Force; and Lockheed Martin Canada, ranked Canada's number-one defense company in 2009.

To support national security, agencies must access highly sensitive information on different secure networks that may be unclassified, classified, secret, or top secret. Access to intelligence information between secure domains of varying classification levels is provided by cross domain solutions, which are vital to developing a common operational picture.

SecureOffice Trusted Thin Client (SOTTC) from TCS is a cross domain solution that provides users with easy and secure simultaneous access to an unlimited number of networks at varying classification levels from a single thin client device or virtual thin client at the desktop. With the virtual configuration, cross domain functionality is available to the desktop user with no need for additional thin client hardware, changes to existing desktop hardware, the native environment, or applications that run in that environment. The user has access to networks at the same or lower classification levels through individual windows running within the thin client image. The multiple network connections are securely accessed through a Distribution Console, which acts as a trusted router and maintains network separation on the back end.

TCS is working with:

  • Becrypt to leverage their deep understanding of the information sharing requirements throughout the United Kingdom. Becrypt has a strategic relationship with the Communications Electronic Security Group (CESG), which provides Information Assurance and Certification Services (IACS) for products and systems claiming to have security capabilities. Becrypt will offer customers the SOTTC cross domain solution from TCS.
  • Thales Australia to be the exclusive integration partner for TCS in Australia and New Zealand. Thales also has TCS certified engineers on-staff to provide SOTTC implementation services for defense and intelligence agencies.
  • Lockheed Martin Canada to serve as the integrator for the SOTTC solution in the Halifax Class Modernization/FELIX project for the Canadian Navy. The Halifax Class modernization project will bring enhanced capability to Canadian ships, enabling them to effectively function in a wider range of situations and environments. The TCS SOTTC solution will enable these ships to share information among different classification levels.

"TCS has over 16 years experience in developing and implementing cross domain solutions to government organizations around the world and we stand committed to ensure that our allies have the best technology in place to share mission-critical information," said Ed Hammersla, Chief Operating Officer, TCS. "These recent partnerships are a clear indication that our allies recognize the need and see the value in cross domain solutions."

February 4, 2010 - Trusted Computer Solutions Announces February 18 Webinar "Certification and Accreditation Basics"

HERNDON, Va. – February 4, 2010 – Trusted Computer Solutions, Inc. (TCS), a leading developer of cross domain and cyber security solutions, today announced it will host a complimentary webcast titled "Certification and Accreditation Basics" taking place on Thursday, February 18 at 11 a.m. EST. Attendees of the webcast will walk away with a better understanding of the certification and accreditation (C&A) process and the differences between each approach.

The webinar will address the following:

  • Updated overview of the ins and outs surrounding the C&A process
  • Provide useful approaches used today
  • Discuss cross domain C&A
  • Provide an introduction to the industry's latest consolidation efforts

TCS' Principal Consultant Steve Welke will lead the webcast and provide attendees with insights obtained during his 24 years of industry experience in the information assurance field, with a specific focus on trusted operating system (TOS) and cross domain solution (CDS) requirements, analysis and implementation. Steve specializes in certification and accreditation (C&A) of computer systems, especially as they relate to cross domain C&A efforts.

WHO: Steve Welke, Principal Consultant – Assurance & Policy Standards, Trusted Computer Solutions
WHAT: Certification and Accreditation Basics
WHEN: Thursday, February 18; 11:00 a.m. – Noon EST
WHERE: Webcast; Registration for the event can be accessed at TCS Webinar Registration
Press Releases Archive

About Raytheon Cyber Products
Raytheon Cyber Products, the global leader in cross domain solutions, provides software and services that enable federal and civilian government agencies, 5 Eyes, NATO, and high risk industries such as Financial Services, the ability to share and access information securely across multiple networks (including the most sensitive and classified networks). RCP' certified and accredited cross domain solutions protect information while ensuring that the necessary information gets to the right people in a timely manner. This is a critical component of both national and private industry security.

Raytheon Cyber Products is part of Raytheon's Intelligence and Information Systems business. Trusted Computer Solutions (previous name) became part of Raytheon in November 2010 to support the Company's objective of delivering world class, end-to-end cyber security solutions. With 18 years of experience in building cross domain solutions, Raytheon Cyber Products is the leading provider of access and transfer solutions with the largest operational deployments in the world.


About Raytheon
Raytheon Company, with 2013 sales of $24 billion and 63,000 employees worldwide, is a technology and innovation leader specializing in defense, security and civil markets throughout the world. With a history of innovation spanning 92 years, Raytheon provides state-of-the-art electronics, mission systems integration and other capabilities in the areas of sensing; effects; and command, control, communications and intelligence systems, as well as cyber security and a broad range of mission support services. Raytheon is headquartered in Waltham, Mass.

###
Content Update: 11/10/14
© 2014 Raytheon Trusted Computer Solutions 12950 Worldgate Drive, Suite 600 Herndon,VA 20170-6024