Cybersecurity on a Global Scale
Time-tested Leadership A global leader for more than a century with customers in 80 nations supported by offices in 19 countries worldwide, Raytheon recognizes that shared problems often require shared solutions. This philosophy has fostered a collaborative spirit of enterprise, allowing the company to build strong local partnerships with industry and governments around the globe. Whether your cybersecurity needs are the most advanced products to augment cur rent operations or a full range of capabilities, services and training, Raytheon can meet your requirements. Reflecting such strengths as innovative technology, situational awareness, operational agility and best-in-class management, Raytheon s industry-leading products in cross-domain and multi-domain access, insider threat prevention, and behavior-based malware detection provide exceptional defense against the ever-changing advanced persistent threat.
ANTICIPATE WITHSTAND RECOVER EVOLVE cy-ber re-sil-ien-cy [n.] The ability of a nation, organization, mission or business process to anticipate, withstand, recover from, and evolve to improve capabilities in the face of adverse conditions, stresses or attacks on the supporting cyber resources it needs to function.
Radical Change in Cyberspace: New Way to Meet the Threat So far, the 21st century is defined as much by the societal impact of cyberspace as by anything else. The benefits are tremendous and appear to be virtually unlimited. Unfortunately, they come with a steep price. Attacks and crime in cyberspace are increasing dramatically. In recent years, as the size of the Internet has grown by 28 percent, the number of attacks has burgeoned by 300 percent. Estimates of cumulative losses exceed $1 trillion. To best combat cyber threats in this evolving environment, governments and industries are changing their primary objective from prevention to resiliency. Trying to stop all forms of cyber-attack is no longer considered realistic. The attackers always seem ahead of the defenders. Successful attacks are all but inevitable regardless of how many resources can be deployed. Instead, organizations now seek ways to withstand attacks while continuing to operate effectively. Over the past several years, Raytheon has emerged as the clear industry leader in developing resiliency for its own technologies, people and operations, then leveraging its expertise and experience to help many other organizations in government and industry do the same. Cyber resiliency is not something finite that an organization achieves once and then its work is done. Rather, it s more of a state that an organization continually pursues and evolves toward in an effort to stay ahead of any potential adversary. Combining internal development with external acquisitions, Raytheon offers the best cyber tools to support a full spectrum of operations. Featured in this arsenal is an automated cyber testing lab whose 5,000 nodes rank it as the industry s largest. With more than 2,500 cybersecurity professionals, Raytheon has developed proven management processes for some of the largest cyber programs in the industry. Vital Statistics» 5 first-place positions in recent global cyber competitions» #1 company in finding zero-day vulnerabilities» 5,000 nodes in automated cyber testing lab (one of the industry s largest)» Led computer emergency response team for 18,000 seats across 3 classified networks average 15 million blocked attacks/year
Supporting the Integrated Cyber Mission Area Cyber Security Operations Center (SOC) Raytheon delivers turnkey SOC solutions and improves the performance of an existing center with equal assurance. We re experts in malware reverse engineering, and our forensic analysis and indicator extraction tools and processes are unsurpassed. Our strength in open-source intelligence collection will help customers identify threats and suspicious activity with much greater efficiency. Highly qualified Raytheon personnel sit beside the customer to train staff and assist in operations. Cyber Learning and Exercise Support Raytheon provides training solutions in several formats across the cyber domain. Our customizable offering, which includes executivelevel training, supervisor and specialist training for cyber practitioners, and broad-based training for the overall workforce, meets any organization s cyber training needs. Embedded Information Assurance Physical systems with embedded electronics face a variety of cyber threats leading to economic loss and mission failure. Raytheon s protective measures range from traditional defenses such as boundary monitors and controls to secure, encrypted communications. We also have the expertise, tools and methodology to design security into the architecture of a system, allowing it to operate effectively throughout a cyber attack. Network Operations and Security Services Preventing data loss and business disruption after a security breach requires an array of technical support. Raytheon s deployable team of security experts uses penetration testing and gap analysis to assess the effectiveness of our customers enterprise defenses and to provide incident response, network monitoring capabilities, malware analysis, and technical support. Supply Chain Assurance Network and weapon system components are becoming increasingly popular among attackers looking for a vulnerable point of entry. The purpose of Raytheon s supply chain risk management function is to provide assurance that parts and components acquired from vendors are free of exploitable vulnerabilities, either intentionally placed or resulting from poor manufacturing or software coding processes. Advanced Persistent Threat Solutions Sophisticated enough to jeopardize critical systems and even threaten access to staples such as electricity and water, today s cyber threats have outpaced perimeter safeguards. Consequently, most large-scale organizations are already under cyber attack, and many don t even know it. Raytheon employs the most effective technologies available today to address system and software vulnerabilities, defeat malware, and repel zero-day and socially engineered attacks.
Building cyber resiliency depends as much on an organization s cyber processes and people as on technology. By itself, technology cannot deliver true cyber resiliency, which Raytheon views holistically in the triangular terms of a tripod. If the three legs (people, processes and technology) are sturdy, the tripod stands, and cyber resiliency is achieved. PEOPLE TECHNOLOGIES OPERATIONS
Cybersecurity Services Critical Asset Protection Weapon systems and their support equipment demand protection. If compromised, mission effectiveness could suffer, system life expectancy and combat effectiveness could shrink, and reverse engineering and intellectual property theft could occur. Our extensive experience in systems hardening, coupled with our recognized expertise in cybersecurity architecture and solutions, means Raytheon can offer proven, customizable solutions to protect your most critical assets. Cyber Situational Awareness and Control Considering all elements of the cyber threat is essential to sound decisions. Raytheon s cyber information system provides next-generation situational awareness tailored specifically for the user. The system helps users quickly identify and grasp the significance of interrelated threads across the physical, logical and social layers of an enterprise to pinpoint system degradations or threat activity. Information Assurance Services Raytheon s proven multi-domain and cross-domain information-sharing solutions ensure secure access to or transfer of data among authorized users or applications. These measures bridge the security gap between and inside domains, resulting in a high-speed, efficient, cost-effective sharing process for the most challenging data environments. Insider Threat and Counterintelligence Solutions Threats infiltrate organizations in many ways, but the most common path is human behavior. Raytheon solutions constantly guard against the insider threat. We can detect malware before signatures, definitions and other indicators appear, saving precious time. Data aggregation capabilities permit a whole person view of an individual, as well as enterprise-wide visibility of end-user behavior across networks at various levels of classification. Vulnerability and Security Assessments Critical infrastructures and facilities are vulnerable to violence and terrorism. Identifying and assessing these weaknesses help eliminate likely threats, securing intellectual property and protecting personnel. Using a combination of tools, techniques and certified personnel, Raytheon provides customized assessments for government agencies, businesses, airports and seaports, water and power utilities, natural gas systems, nuclear plants, and more.
Raytheon Regional Offices Australia 4 Brindabella Circuit Canberra 2609 +61 2 6122 0231 phone Asia Pacific 600 North Bridge Road #09-06 Parkview Square Singapore 188778 +6567349271 phone Canada 360 Albert Street Ottawa, Ontario K1R 7X7 +1 613 233 4121 phone Europe Avenue Ariane, 5 1200 Brussels Belgium +32 2 778 49 00 phone Middle East P.O. Box 28225 Abu Dhabi, UAE +971 50 616 5697 phone Raytheon Company Global Headquarters 870 Winter Street Waltham, MA 02451 USA +1 781 522 3000 www.raytheon.com United Kingdom 1 George Street UB8 1QQ Uxbridge, London +44 1895 816307 phone Approved for public release. Copyright 2013 Raytheon Company. All rights reserved. Approved June 26, 2013: IIS2013-172 AMEast 4312196 Printed in the U.S.A. The word Raytheon and the Raytheon logo mark are trademarks of Raytheon Company and the subject of U.S. and foreign trademark registrations.