Implementing a Zero Trust Framework

The attacks are inevitable; how your system responds is what will determine the outcome. Raytheon Intelligence & Space’s Data Orchestration and Resiliency solutions combine a heritage of mission partnership with advanced technology to ensure persistence and instill confidence and trust in your mission, from the tactical edge to enterprise command.

We offer integrated "system of systems" and component protection that minimizes risks from cyber threats while keeping critical enterprise systems operational. Our unique command and control approach to data protection and resiliency implements a zero trust framework to solve the data protection challenges our partners face.

We specialize in bolstering the resiliency of mission critical systems so that organizations are able to perform essential functions and operations even when an adversary has penetrated its defenses and compromised its network. We support a multi-layered approach to address the unique protection needs across the hardware, software and communications layers of a system in order to provide a comprehensive solution.

Cyber Resiliency Portfolio

Electronic Armor

Electronic Armor

Electronic Armor offers hardware- and software-level protection, increasing cyber resiliency of critical platforms

Learn more
boot shield

Boot Shield

Boot Shield is a small form factor hardware root of trust protecting COTS hardware against persistent boot-level attacks

Learn more
Countervail

Countervail

Countervail is software that protects system integrity from attackers with escalated privileges or bypassed traditional risk management controls

Learn more
cads

CADS

CADS is a real-time cyberattack warning system that provides anomaly and intrusion detection for a variety of communication buses

Learn more
Abstract data cube

DejaVM

DejaVM enables complex systems of systems to be virtualized to support large-scale automated cyber testing

Learn more

Raytheon Intelligence & Space’s data resiliency solutions focus on securing data wherever it may exist, from endpoint to enterprise — all while preventing, correcting and adapting to adverse conditions, stresses, attacks or compromises. We are redefining security by looking at missions and enterprise systems as a whole, then building security controls around data and critical components to deploy a zero trust approach across the environment.

Downloadable Fact Sheet