2. Raytheon Cyber Products Group
Part of Raytheon Intelligence, Information and Services (IIS)
group
Support Departments of Defense, Intelligence, Law
Enforcement, Civilian, and Industrial Control Systems
worldwide
One of two approved providers for the Department of
Homeland Security (DHS) in the area of cyber defense
Specialization in Cross Domain Information Assurance, Visual
Analytics, Insider Threat and Cyber Security
Premier mobility solution for sensitive information access
–
Data and apps run in the back-end of the enterprise in the Virtual
Mobile Infrastructure (VMI)
–
Only replication of data and apps are presented to the device
Page 2
3. Securing Sensitive Data in a Mobile Environment
Key concern
– Accidental or malicious leaks and loss of sensitive information
Solution
– Focus on securing data, not just device
– Eliminate application and data residency on device
Virtualization and secure redisplay technologies ensure data protection
at the source
Data security is assured at most sensitive
levels, regardless of device
Page 3
4. Raytheon TITAN (code name only)
Protected domains host virtualized mobile and web apps
Secure redisplay client on commodity device to access virtual
mobile devices, desktop and cloud apps
Identity management through existing PKI
Support for commercially available devices including dual-persona
with no modifications
Virtual Mobile Apps
•
Native Mobile Apps
•
Web Apps
•
Cloud Apps
•
Desktop Apps
Page 4
6. Government Use Case
Sample use case #1:
– Access to sensitive information at or near SCIF
– Geofencing capability ensures perimeter definition for
access
Sample use case #2:
– Access to classified component and equipment
specifications or records
• (e.g.) Aircraft maintenance
– No data is stored on the device preventing theft or
data loss
12/6/2013
Page 6
7. Value Propositions
Confident and cost effective
collaboration
Co-exist with any MDM and MAM
Data leakage and loss prevention
Access to native, desktop and
web apps
Ideal for BYOD scenarios
Streamlined registration
and management
12/6/2013
Page 7
8. Key Differentiators
Implementation based
on NSA guidance
High level of information
assurance and security for
sensitive and classified data
No modifications or
extraneous components
necessary on device
Non-reliance on device specific
containers and encryption solutions
Suite B and nested tunnels
Cost savings with ‘build once
run twice’ environment
12/6/2013
Page 8
9. Contact Us
Feel free to reach out to us at Sales@TrustedCS.com
or by calling 866.230.1307
www.TrustedCS.com
Page 9