Raytheon delivers end-to-end visibility to address cyber threats
At the RSA Conference 2015 today, Raytheon announced a new suite of solutions that can change the way companies address cybersecurity by helping enterprises operate in the face of sophisticated cyber threats.
The SureView product suite combines human and machine learning to prevent insider threats, reduce the amount of time an external threat remains in an organization’s network, and provide actionable intelligence that helps eliminate future attacks.
“Raytheon has thirty years of experience defending the most sophisticated, national security networks from cyber threats,” said Dave Wajsgras, President of Raytheon Intelligence, Information and Services. “Today’s launch reflects our firm belief the time has come for commercial customers to have the same caliber of protection that helps our traditional customers remain resilient in the cyber domain.”
“The SureView portfolio evolved through a combination of capabilities Raytheon acquired and unique technologies developed in-house to protect its traditional customer set and the company’s own systems and data,” stated Ed Hammersla, president of Raytheon Cyber Products. “By delivering proven technologies that scale to meet the most demanding requirements, Raytheon’s SureView products bridge the gap between defense-grade and enterprise cybersecurity.”
The suite is built on the premise that establishing an impenetrable perimeter is impossible and organizations must be prepared to operate through and emerge from cybersecurity breaches. The products within the SureView suite were developed to operate independently or can be integrated to provide enterprise security.
Raytheon’s SureView product portfolio delivers end-to-end visibility across the enterprise that surpasses traditional dashboards and security alerts, enabling analysts to make decisions and take action. This broad spectrum of integrated solutions addresses a complex set of cybersecurity challenges, such as protecting against insider threats and advanced threats; verifying the integrity of system memory; and applying an analytics platform to enable contextual awareness and cyber intelligence for real-time remediation.