Featured Products

Trusted Thin ClientTrusted Thin Client®
An accredited solution that provides users with secure simultaneous access to information on any number of different networks through a single connection point. Trusted Thin Client maintains secure data separation while allowing users appropriate access to networks at different classification levels (e.g., Top Secret/SCI, Secret, and Sensitive But Unclassified) or to networks that hold the same security level in an organization (e.g., the Internet and a financial network).

more...

Trusted Gateway System™Trusted Gateway System™
Provides exceptional built-in manual review and automatic validations, such as virus scanning, file type verification, dirty word search, and deep content inspection, enabling safe and simultaneous data movement between networks at different sensitivity levels.

more...

High Speed GuardHigh Speed Guard
An accredited solution that enables highly complex, bi-directional, automated data transfers between multiple domains. High Speed Guard has demonstrated the fastest bi-directional transfer rates of more than 9 gigabits per second (Gb/s) on dual processor commodity servers.

more...

Trusted Print Delivery™Trusted Print Delivery™
A Commercial-Off-The-Shelf (COTS), highly secure, multi-directional guard solution that allows users to print from existing applications at different security or sensitivity levels to a single printer located on the high side network. Reducing printer hardware at individual security levels reduces capital investment, printer inventory, hardware maintenance/supplies, and administration.

more...

WebShieldWebShield
A data guard that provides secure web search and browse-down capabilities from high side networks to lower level networks. WebShield is a secure mechanism for complete information browsing and discovery.

more...

SimShield™SimShield™
SimShield is an accredited COTS fixed-format data guard with the capability to label, segregate, protect, and exchange data between systems executing at different sensitivity or classification levels. SimShield allows for more effective training activities and more efficient test events resulting in overall cost savings, a better trained warfighter and more thoroughly and quickly tested equipment.

more...

Small Format Guard™Small Format Guard™
Small Format Guard is a small, lightweight guard that provides low-power, high throughput and low latency. Built to operate outside of traditional data centers, Small Format Guard supports robust security protocols and is adaptable to specific mission needs where strict size, weight, power, and cooling (SWaP-C) specifications are required.

more...

Trusted Mail System™Trusted Mail System™
Trusted Mail System is a Commercial-Off-The-Shelf (COTS) highly secure solution that enables the policy-enforced exchange of emails and attachments between users on different networks eliminating the need to switch between email systems at multiple levels. TMS provides a single inbox that consolidates email residing on multiple networks, at the highest level.

more...

SureView™SureView™
Although technology introduces avenues for threats to enter an organization, it is the users, not the technology itself that put organizations' information in jeopardy. SureView™ enables safe and effective use of mission-critical technologies by capturing human behavior technical observables, which include policy violations, compliance incidents or malicious acts that are warning signs leading up to a breach.

more...

CrossView™CrossView™
The Raytheon CrossView Solution provides cross domain transfer capability for Raytheon SureView, enabling SureView agents from multiple networks to operate on one, consolidated, SureView system. This offers a comprehensive picture of user activity across networks with different classification levels within SureView.

more...

Convergence™Convergence™
Convergence aggregates audit data from multiple external data sources, such as HR records, phone logs and physical access into an existing SureView system. The aggregation of this data with existing SureView data provides a broader set of easily searchable data that can produce more insight into an individual’s activities and behaviors.

more...

DataClarity®DataClarity®
The Data Clarity® Platform is a big data search and analytics enterprise application with a low total cost of ownership that reduces the risk and loss fraudulent activities pose to operations.

more...

Trusted Thin Client RemoteTrusted Thin Client Remote
Trusted Thin Client Remote allows users to take the same secure network access provided through Trusted Thin Client and Trusted Thin Client Virtual into the field on an encrypted bootable USB memory stick, SD memory card, embedded hard drive, or solid state drive (SSD).

more...

Trusted Access: MobileTrusted Access: Mobile
Trusted Access: Mobile provides the highest level of security available today for accessing sensitive data from mobile devices (smartphones and tablets). Trusted Access: Mobile utilizes a virtual mobile infrastructure (VMI) and secure redisplay technologies to allow mobile users to access sensitive data without risk of data loss or leakage.

more...

Trusted Thin Client VirtualTrusted Thin Client Virtual
An accredited solution that provides users with secure simultaneous access to information on any number of different networks through a single connection point.Trusted Thin Client Virtual maintains secure data separation while allowing users appropriate access to networks at different classification levels (e.g., Top Secret/SCI, Secret, and Sensitive But Unclassified) or to networks that hold the same security level in an organization (e.g., the Internet and a financial network).

more...

SpotlightSpotlight™
SureView Spotlight is an analytics framework that enables seamless integration with best of breed analytical tools including: risk assessment algorithm, anomaly detection, user trend analysis, role based profiling and threat indicators to mitigate the insider threat.

more...

Webcasts & Podcasts


Enabling Mission Success with Mobility - Webcast December 10th at 2:00 PM (ET) Register Now
Enabling Mission Success with Mobility - Webcast December 10th at 2:00 PM (ET) Webcast Link

Security in the New Mobile Ecosystem, Dr. Larry Ponemon - Webcast October 14th Recording Available
Security in the New Mobile Ecosystem, Dr. Larry Ponemon - Webcast October 14th Recording Available Webcast Link

Big Data Marries End User Behavior: Mitigate the Insider Threat Webcast October 9th at 2:00 PM EDT (18:00:00 UTC) Recording Available
 Big Data Marries End User Behavior: Mitigate the Insider Threat Webcast October 9th at 2:00 PM EDT (18:00:00 UTC) Register Now Webcast Link

Increase Data Security through Your Print Solution Webcast 10/2/14 at 2:00 pm ET. Recording Available
 Increase Data Security through Your Print Solution Webcast 10/2/14 at 2:00 pm ET. Register Now Webcast Link

BrianMadden.com Podcast (Special Edition): Security vs.User Experience and Virtual Mobile Infrastructure 9/11/14 by Ashok Sankar and Brian and Jack Madden Recording Available
 Security vs.User Experience and Virtual Mobile Infrastructure Podcast 9/11/14 Recording Available Podcast Link

SC Magazine eSymposium: How Current Mobile Security Options Fall Short, presented by Ashok Sankar, VP Product Strategy and Management 9/10/14 Recording Available
SC Magazine eSymposium (9/10/14): How Current Mobile Security Options Fall Short, presented by Ashok Sankar, VP Product Strategy and Management Recording Available Podcast Link

One DoD, One IT Environment: The Critical Role of Secure Information Sharing and Virtualization Solutions for JIE Webcast 8/7/14 Register Now for Recording
One DoD, One IT Environment: The Critical Role of Secure Information Sharing and Virtualization Solutions for JIE Webcast 8/7/14 Register Now for Recording Webcast Link

SANS Webcast Focused on How to Address Insider Threats in Law Enforcement The Internal Data Thief, the Privileged User is Increasingly Growing as a Serious Problem Webcast 9/5/14 Recording Available
 Nine Steps Towards a Successful Insider Threat Program. Webcast 8/26/14 at 1:00 pm EST. Register Now Webcast Link

Nine Steps Towards a Successful Insider Threat Program. Webcast 8/26/14 Recording Available
 Nine Steps Towards a Successful Insider Threat Program. Webcast 8/26/14 at 1:00 pm EST. Register Now Webcast Link

Navigating Certification & Accreditation (C&A): A Primer Webcast 6/26/14 Recording Available
 Navigating Certification & Accreditation (C&A): A Primer Webcast 6/26/14 Webcast Link

Securing the Mobile Workforce: Device Security is Not Enough Webcast 6/11/14
Securing the Mobile Workforce: Device Security is Not Enough Webcast 6/11/14 Webcast Link

“Fighting the Insider Threat: Privilege Management and Abuse Prevention Strategies.” Recorded SANS Webcast 6/10/14
Ensuring Secure Data Transfer: Guards vs Diodes Webcast 6/4/14 Podcast Link

Ensuring Secure Data Transfer: Guards vs Diodes Webcast 6/4/14
Ensuring Secure Data Transfer: Guards vs Diodes Webcast 6/4/14 Podcast Link

Ashok Sankar, Raytheon - Recorded Podcast with Brian and Jack Madden 5/13/14
Ashok Sankar, Raytheon - Recorded Podcast witth Brian and Jack Madden Podcast Link

SC Magazine eSymposium on Mobility Security Webcast 4/10/14
SC Magazine eSymposium on Mobility Security Webcast Webcast Link

SANS Survey Results on Control Systems Security Webcast 4/1/14
Results of Webcast PDF

Security Program Drivers and Wish Lists: SANS Financial Services Survey Results Part II Webcast 3/27/14
Results of Webcast PDF

Risks, Threats and Preparedness: Part I of the SANS Financial Services Survey Webcast 3/26/14
Results of Webcast PDF

High Speed Guard - Understanding the Business Case for Cross Domain Information Sharing Solutions Webcast 2/26/14
High Speed Guard - Understanding the Business Case for Cross Domain Information Sharing Solutions Webcast Webcast PDF
Navigating Certification and Accreditation - A Primer Webcast 09/18/13 C&A Primer  Webcast recording Webcast PDF
Meet Cost Reduction Mandates With Printer Consolidation Trusted Print Delivery Webcast 08/21/13 TPD ROI Webcast recording Webcast PDF
Update on C&A Processes for CDS Webcast  06/19/13 Update on C&A Processes for CDS Webcast recording   Webcast PDF 
Trusted Mail System™ Webcast  06/05/13 Trusted Mail System Webcast recording   Webcast PDF 
Announcing New Trusted Print Delivery™ Webcast 05/08/13 Trusted Print Delivery Webcast recording   Webcast PDF 
High Speed Guard - Secure Messaging for Mission Critical Systems Webcast 03/20/13  High Speed Guard Webcast recording   Webcast PDF 
Small Format Guard Webcast 02/27/13  Small Format Guard Webcast recording  Webcast PDF 
Certification and Accreditation (C&A) Basics 02/19/13  C&A Basics Webcast recording available  C&A Basics Webcast PDF 
Expanding the Reach of Live, Virtual and Constructive Training Environments SimShield Webcast SIGNAL Archived Event 10/10/12  SimShield Webcast recording post event  SimShield Webcast PDF 
Transforming Mission Support Through Multilevel Secure Virualization, Collaboration, and Mobility Webcast 09/12/12  Transforming Mission Support Through Multilevel Secure Virualization, Collaboration, and Mobility Webcast recording post event  Transforming Mission Support Through Multilevel Secure Virualization, Collaboration, and Mobility Webcast Webcast PDF 
Cross Domain Solutions C&A Processes: SABI, TSABI, and FedRAMP Webcast 07/12/12  Cross Domain Solutions C&A Processes:  SABI, TSABI, and FedRAMP recording post event  Cross Domain Solutions C&A Processes:  SABI, TSABI, and FedRAMP Webcast PDF 
High Speed Guard Webcast 06/2/12  High Speed Guard Webcast  High Speed Guard Webcast PDF 
Navigating Certification and Accreditation 03/20/11 Navigating C&A Webcast Recording  Navigating Certification and Accreditation Webcast PDF

Content Update: 11/20/14
© 2014 Raytheon Trusted Computer Solutions 12950 Worldgate Drive, Suite 600 Herndon,VA 20170-6024