Featured Products

Trusted Thin ClientTrusted Thin Client®
An accredited solution that provides users with secure simultaneous access to information on any number of different networks through a single connection point. Trusted Thin Client maintains secure data separation while allowing users appropriate access to networks at different classification levels (e.g., Top Secret/SCI, Secret, and Sensitive But Unclassified) or to networks that hold the same security level in an organization (e.g., the Internet and a financial network).

more...

Trusted Gateway System™Trusted Gateway System™
Provides exceptional built-in manual review and automatic validations, such as virus scanning, file type verification, dirty word search, and deep content inspection, enabling safe and simultaneous data movement between networks at different sensitivity levels.

more...

High Speed GuardHigh Speed Guard
An accredited solution that enables highly complex, bi-directional, automated data transfers between multiple domains. High Speed Guard has demonstrated the fastest bi-directional transfer rates of more than 9 gigabits per second (Gb/s) on dual processor commodity servers.

more...

Trusted Print Delivery™Trusted Print Delivery™
A Commercial-Off-The-Shelf (COTS), highly secure, multi-directional guard solution that allows users to print from existing applications at different security or sensitivity levels to a single printer located on the high side network. Reducing printer hardware at individual security levels reduces capital investment, printer inventory, hardware maintenance/supplies, and administration.

more...

WebShieldWebShield
A data guard that provides secure web search and browse-down capabilities from high side networks to lower level networks. WebShield is a secure mechanism for complete information browsing and discovery.

more...

SimShield™SimShield™
SimShield is an accredited COTS fixed-format data guard with the capability to label, segregate, protect, and exchange data between systems executing at different sensitivity or classification levels. SimShield allows for more effective training activities and more efficient test events resulting in overall cost savings, a better trained warfighter and more thoroughly and quickly tested equipment.

more...

Small Format Guard™Small Format Guard™
Small Format Guard is a small, lightweight guard that provides low-power, high throughput and low latency. Built to operate outside of traditional data centers, Small Format Guard supports robust security protocols and is adaptable to specific mission needs where strict size, weight, power, and cooling (SWaP-C) specifications are required.

more...

Trusted Mail System™Trusted Mail System™
Trusted Mail System is a Commercial-Off-The-Shelf (COTS) highly secure solution that enables the policy-enforced exchange of emails and attachments between users on different networks eliminating the need to switch between email systems at multiple levels. TMS provides a single inbox that consolidates email residing on multiple networks, at the highest level.

more...

SureView™SureView™
Although technology introduces avenues for threats to enter an organization, it is the users, not the technology itself that put organizations' information in jeopardy. SureView™ enables safe and effective use of mission-critical technologies by capturing human behavior technical observables, which include policy violations, compliance incidents or malicious acts that are warning signs leading up to a breach.

more...

CrossView™CrossView™
The Raytheon CrossView Solution provides cross domain transfer capability for Raytheon SureView, enabling SureView agents from multiple networks to operate on one, consolidated, SureView system. This offers a comprehensive picture of user activity across networks with different classification levels within SureView.

more...

Convergence™Convergence™
Convergence aggregates audit data from multiple external data sources, such as HR records, phone logs and physical access into an existing SureView system. The aggregation of this data with existing SureView data provides a broader set of easily searchable data that can produce more insight into an individual’s activities and behaviors.

more...

DataClarity®DataClarity®
The Data Clarity® Platform is a big data search and analytics enterprise application with a low total cost of ownership that reduces the risk and loss fraudulent activities pose to operations.

more...

Trusted Thin Client RemoteTrusted Thin Client Remote
Trusted Thin Client Remote allows users to take the same secure network access provided through Trusted Thin Client and Trusted Thin Client Virtual into the field on an encrypted bootable USB memory stick, SD memory card, embedded hard drive, or solid state drive (SSD).

more...

Trusted Access: MobileTrusted Access: Mobile
Trusted Access: Mobile provides the highest level of security available today for accessing sensitive data from mobile devices (smartphones and tablets). Trusted Access: Mobile utilizes a virtual mobile infrastructure (VMI) and secure redisplay technologies to allow mobile users to access sensitive data without risk of data loss or leakage.

more...

Trusted Thin Client VirtualTrusted Thin Client Virtual
An accredited solution that provides users with secure simultaneous access to information on any number of different networks through a single connection point.Trusted Thin Client Virtual maintains secure data separation while allowing users appropriate access to networks at different classification levels (e.g., Top Secret/SCI, Secret, and Sensitive But Unclassified) or to networks that hold the same security level in an organization (e.g., the Internet and a financial network).

more...

SpotlightSpotlight™
SureView Spotlight is an analytics framework that enables seamless integration with best of breed analytical tools including: risk assessment algorithm, anomaly detection, user trend analysis, role based profiling and threat indicators to mitigate the insider threat.

more...

Trusted Mail System

Enabling the Secure, Policy-Enforced Exchange of Email and Attachments between Networks

Secure information sharing and highly efficient cross-agency collaboration are primary drivers for common IT architectures and infrastructure throughout Departments of Defense/Defence, intelligence communities, and civilian agencies today. There is also an overwhelming need for cost reductions and increased productivity. Studies show that users spend an average of 28% of their work time on email.1 For those with multiple work-related email accounts, on different networks at varying sensitivity levels, that number can increase significantly.

Trusted Mail System™ is a Commercial-Off-The-Shelf (COTS) highly secure solution that enables the policy-enforced exchange of emails and attachments between users on different networks eliminating the need to switch between email systems at multiple levels. Trusted Mail System provides a ‘single inbox’ that consolidates email residing on multiple networks, at the highest level, making it less likely that important and mission-sensitive email communications are overlooked. Users are able to read, forward, and respond to any email message that they receive regardless of the destination security level, but any emails generated will originate from the security level at which the consolidation resides (normally the highest security level).

Trusted Mail System leverages the widely deployed, accredited and Unified Cross Domain Services Management Office (UCDSMO) Baseline listed Trusted Gateway System™ as the cross domain guard component. The guard ensures that malicious data is not transferred between networks and that sensitive data is not inadvertently or intentionally leaked.

Features and Benefits

  • Increases user productivity by providing a ‘single inbox’ capability across multiple email domains
  • Commercial-Off-The-Shelf (COTS) solution
  • Utilizes proven,Unified Cross Domain Services Management Office (UCDSMO) Baseline Listed, certified and accredited Trusted Gateway System™ guard technology for content inspection and security policy enforcement
    • Exceptional built-in reliable two-person manual review and self-release capabilities (as required by organizational policy)
    • Data inspections which include dirty word search, virus scanning, file type verification and deep content inspection
  • Supports inspection of email content, attachments, headers, and nested messages
  • Provides easy administration by integrating with existing email gateways across the enterprise

1"McKinsey Global Institute report titled “The social economy: Unlocking value and productivity through social technologies” dated July 2012 authored by by Michael Chui, James Manyika, Jacques Bughin, Richard Dobbs, Charles Roxburgh, Hugo Sarrazin, Geoffrey Sands and Magdalena Westergren

SUPPORT CONTACT INFORMATION

SUPPORT

Support@TrustedCS.com
Phone: 703.318.7134
Toll Free: 866.230.1307

SALES

Sales@TrustedCS.com
Request more information

Content Update: 4/7/14
© 2014 Raytheon Trusted Computer Solutions 12950 Worldgate Drive, Suite 600 Herndon,VA 20170-6024