Electronic Armor
Electronic Armor offers hardware- and software-level protection, increasing cyber resiliency of critical platforms
The attacks are inevitable; how your system responds is what will determine the outcome. Raytheon Intelligence & Space’s Data Orchestration and Resiliency solutions combine a heritage of mission partnership with advanced technology to ensure persistence and instill confidence and trust in your mission, from the tactical edge to enterprise command.
We offer integrated "system of systems" and component protection that minimizes risks from cyber threats while keeping critical enterprise systems operational. Our unique command and control approach to data protection and resiliency implements a zero trust framework to solve the data protection challenges our partners face.
We specialize in bolstering the resiliency of mission critical systems so that organizations are able to perform essential functions and operations even when an adversary has penetrated its defenses and compromised its network. We support a multi-layered approach to address the unique protection needs across the hardware, software and communications layers of a system in order to provide a comprehensive solution.
Electronic Armor offers hardware- and software-level protection, increasing cyber resiliency of critical platforms
Boot Shield is a small form factor hardware root of trust protecting COTS hardware against persistent boot-level attacks
Countervail is software that protects system integrity from attackers with escalated privileges or bypassed traditional risk management controls
CADS is a real-time cyberattack warning system that provides anomaly and intrusion detection for a variety of communication buses
DejaVM enables complex systems of systems to be virtualized to support large-scale automated cyber testing
Raytheon Intelligence & Space’s data resiliency solutions focus on securing data wherever it may exist, from endpoint to enterprise — all while preventing, correcting and adapting to adverse conditions, stresses, attacks or compromises. We are redefining security by looking at missions and enterprise systems as a whole, then building security controls around data and critical components to deploy a zero trust approach across the environment.