- Air and Missile Defense
- Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR)
- Electronic Warfare
- Intelligence, Surveillance and Reconnaissance
- Naval and Maritime Solutions
- Precision Weapons
- Space Solutions
- Training Solutions
- IDIQ Contract Vehicles
- Data Sheets
- White Papers
For additional information:
Getting the right data to the right people at the right time can be challenging especially in mission critical environments. For certain industries - Government, Intelligence, Private Sector, Industrial Control Systems, Law Enforcement, Healthcare, and Financial Services – it is imperative that sensitive data is protected from accidental or intentional exposure. Any breach can be harmful, costly, and potentially catastrophic if personal or sensitive data falls into the wrong hands.
Cross domain solutions enable the secure access and transfer of data between networks at different classification or sensitivity levels. The primary function of a cross domain solution is to protect data at rest or in transit; however, these solutions are also used to achieve infrastructure and personnel efficiencies and cost reductions. In today’s global economy, cost savings and streamlined work environments are key drivers for budgetary decision making.
When data resides (at rest) on an end point device (desktop, laptop, tablet, smartphone, etc.), the risk of exposing that data is very high if the device is penetrated, lost, stolen, or becomes inoperable. By implementing secure read-only end points (thin clients, virtual machines with trusted operating systems, encrypted portable devices, etc.) and moving data to a secure cloud, sensitive data is only available to those authorized to access it, whenever and wherever they need it, without risk of leak or loss.
Sharing or moving data between multiple sensitive networks within an organization or between collaborating trusted organizations is achieved with transfer solutions (commonly referred to as guards). Guards perform stringent review of shared information for viruses, dirty words, and specific unauthorized content according to customer specific security rules and policies before it is delivered to the intended recipients. Guards also enforce diligent user controls to ensure that the right information is delivered to the right people at the right time without compromise.