Raytheon Cyber

Menu Dropdown

Eliminating the Blind Spots

'Converged Cyber' fuses intel and ops to better understand system activity

Converged Cyber helps eliminate cyber blind spots by fusing all-source intelligence with operations.

Computer systems are tools, used by people to achieve goals in the real world. 

Similarly, cyber attacks are used by people with their own motivations and behaviors. And yet, even in today’s modern Internet-connected landscape, much intelligence-gathering is conducted through stovepiped systems with blind spots that create security gaps.

Converged Cyber™, a term coined by Raytheon, helps to eliminate blind spots in the cyber domain through all-source intelligence capabilities.

“It’s a costly endeavor to build and maintain stovepipes within a government,” said Ward Heinke, director, Cyber Strategy and Defense Solutions at Raytheon. “It’s not always easy to share information where required, and that creates an operational hindrance. Converged Cyber standardizes data collection and eases the timely sharing of pertinent data, without oversharing.”

Converged Cyber allows governments and organizations to easily add functionality to their cyber operations without the burden of adding another stovepiped system to their existing infrastructure. This added functionality provides needed information to address intelligence blind spots, and it allows more complete analysis of events in the cyber domain, so organizations can better protect their networks. 

“I believe there's an economic cyber cold war playing out right now,” Lt. Gen. Alan Lynn, director of the Defense Information Systems Agency, said at the CyberCon 2015 forum in November. “Imagine an adversary whose goal is to, over time, erode global consumer confidence in … goods and businesses.”

For example, a group intent on civil unrest might unleash an attack aiming to create government dissatisfaction and public confusion. The cybersecurity operations center is alerted and mitigation is rapidly selected, then deployed, limiting its effects. Advanced analytics trace the full attack chain back to its source, turning seemingly unrelated data points into actionable intelligence.

Combining this knowledge with open-source intelligence capabilities, lawful interception of telecommunications, video streams and transportation sensors helps predict the malicious group’s activities and prevent future attacks.

“There’s a growing appreciation that nations have an obligation to secure their cyberspace as they do their other domains,” said Michael Daly, chief technology officer of Raytheon Cyber Security and Special Missions. “More than that, they can now see how activity in cyberspace is connected to activity in the other domains, and the reverse. Cyberspace is a reflection of the real world, and the real world is influenced by cyberspace. Converged Cyber is an acknowledgement of that. It helps governments gain national security with efficiency.”

This document does not contain technology or technical data controlled under either the U.S. International Traffic in Arms Regulations or the U.S. Export Administration Regulations. IIS2016-141.

Last Updated: 04/06/2016

Back to Top