MIDDLEWARE
DISA Chooses Raytheon's Insider Threat Management Solution
- Written by: Writer
- Category: MIDDLEWARE
Raytheon receives Insider Threat Focused Observation Tool (InTFOT) enterprise contract for Department of Defense
The Defense Information Systems Agency (DISA) selected Raytheon's insider threat management solution as the Insider Threat Focused Observation Tool (InTFOT) for the Department of Defense. Under the contract, Raytheon will provide the DoD an enterprise license for its solution.
At the request of the U.S. Strategic Command and in support of the president's national security goals, the InTFOT provides network administrators and security personnel with technology to effectively counter the threat posed by insiders to the security and integrity of the Global Information Grid and the data it contains.
Insider threat management is part of Raytheon's end-to-end cybersecurity offering, which provides advanced cybersecurity systems to protect customers' critical information and infrastructures from the most complex threats.
"Insider threats pose some of the most serious economic and national security challenges of the 21st century," said Steve Hawkins, vice president of Raytheon's Information Security Solutions business. "These threats could be a trusted individual who knows internal organizations and could be after classified information, or someone who is not malicious but accidentally leaks vital data. Insiders can have the access to compromise, steal, change or destroy information that could potentially cause disruptions to critical U.S. systems."
Raytheon's host-based insider risk management solution proactively identifies and supports investigations of user violations so organizations can proactively manage insider incidents. The InTFOT leverages Raytheon's sixth-generation insider-threat innovations which include:
- Endpoint activity monitoring and control
- Integrated endpoint and network protection
- Innovative DVR-like video replay technology and forensics
- Incident replays that show complete context and user intent
- Policy-based user activity monitoring
- Monitoring even when the user or laptop is offline or disconnected
- Monitoring files and transmissions before encryption, so malicious acts can't hide behind it