RAYTHEON COMPANY in Industrial Control Systems Security Solutions

Are you from this Company?
RAYTHEON COMPANY
Massachusetts, USA
1922
$10BN to $50BN
Enterprise
93 Likes
88 Buyers Negotiating

Summary

Raytheon offers a product, High Speed Guard, which secures, automates, and transfers high performance data. High Speed Guard is a software solution accredited by the Department of Defense (DoD) and Intelligence Community (IC). This solution enables highly complex, uni-directional or bi-directional, automated data transfers between multiple physically segregated networks. This solution supports communication of varied systems with low administration costs.

Features:

  • Serves as a primary barrier in the Electronic Security Perimeter (ESP) Compatible with SCADA protocols
  • Fastest throughput and low latency transfer rates
  • Flexibility for multiple uses
  • Customizable for data flow control

Discussions

Strengths
  • +12
    Diverse System Communications
  • +11
    SCADA designs and current system
  • +9
    Securely data transfer
  • +9
    Network traffic anomaly detection tools
  • +5
    Risk and Threat Assessment
  • +8
    Risk/VaR Simulation
  • +14
    SCADA
  • +9
    Strategy consulting
  • +11
    Outlier analysis tools
  • +13
    Reverse engineering tools
  • +7
    Channel for Delivery of Support Services
  • +14
    Dedicated Account Manager (DAM)
  • +6
    Pre Sales Support
  • +12
    Product Demos
  • +8
    services
  • +9
    Vulnerabilities / customer pain points
  • +7
    HMI panels
  • +12
    IAEA - Computer Security at Nuclear Facilities
  • +7
    General Data Protection Regulation
  • +12
    ISA-99 (Industrial Automation & Control Systems Security)
Cautions
  • -7
    Device Control
  • -6
    Lack of Enterprise Risk Management (ERM) in ICS
  • -9
    Education & Training
  • -5
    Incident Response
  • -11
    Support & Maintenance
  • -7
    Risk Based Asset Classification
  • -9
    Software Enabled Methodology
  • -13
    Cyber attack simulation
  • -7
    Design & Integration
  • -14
    Implementation
  • -12
    Regulatory compliance
  • -14
    Log review tools
  • -8
    Multi-purpose tools
  • -12
    System artifact review tools
  • -13
    Proof of Concept
  • -11
    Software Requirement Specification (SRS)
  • -6
    Distributed Control System (DCS)
  • -6
    Engineering workstations
  • -5
    Intelligent Electronic Devices (IEDs)
  • -9
    Programmable Logic Controllers (PLCs)

RAYTHEON COMPANY Reviews

user-icon

Analyst

5
Apr 11, 2019

“SCADA designs and current system”

The company have expanded their current system conventions into SCADA designs, digital assault vectors. Mechanisms used to share data helps a wide scope of arrangements, for example, the Inter-Control Center Communications Protocol (ICCP), Distributed Network Protocol (DNP3) and International Electrotechnical Commission''''s (IEC) 61850, to guarantee most extreme adaptability for future development and transition
Read less Read more
Useful (0) Not useful (0)
user-icon

Buyer, Energy and Utilities, SME

5
Apr 11, 2019

“Tracking Advanced Threats”

Raytheon Foreground Security model which is V-SOC. The V-SOC model focuses on advanced threats and tracking attacker tactics, techniques, and procedures versus simple alert response. The V-SOC service identifies existing network or host compromises, zero day exploits, data exfiltration, network anomalies, emerging advanced threats, suspicious insider behaviour, use of insecure ports/protocols, and misconfigured devices.
Read less Read more
Useful (0) Not useful (0)
user-icon

Buyer, Transportation and Logistics, SME

2
Apr 11, 2019

“Cyber Threat Information”

The company leverages automated cyber tools, computer network defence solutions and cyber-intelligence to sustain security. It determines new attacks vectors, monitors network behaviour, employing fused multi-source information which is a part of Raytheon''''s effective proactive defence.
Read less Read more
Useful (0) Not useful (0)
user-icon

Buyer, Manufacturing, SME

2
Apr 11, 2019

“Diverse System Communications”

The company’s security monitoring has High Speed Guard in the Department of Defense (DoD) and Intelligence Community (IC) accredited software solution that enables highly complex, uni-directional or bi-directional, automated data transfers between multiple physically segregated networks. High Speed Guard supports diverse systems communication with comparatively low
Read less Read more
Useful (0) Not useful (0)
user-icon

Buyer, Energy and Utilities, SME

4
Apr 11, 2019

“Safety of Information”

Denial-of-service attacks, sometimes called DDoS attacks, take several forms. Some use botnets, or networks of infected devices, to generate surges in traffic; some focus on only the layer of the internet the end-user interacts with, and others target the infrastructure of the server itself. The DreamHost attack appeared to have only a limited effect; the company reported that it restored all services within about three hours.
Read less Read more
Useful (0) Not useful (0)
user-icon

Analyst

5
Apr 07, 2019

“SCADA designs and current system”

The company have expanded their current system conventions into SCADA designs, digital assault vectors. Mechanisms used to share data helps a wide scope of arrangements, for example, the Inter-Control Center Communications Protocol (ICCP), Distributed Network Protocol (DNP3) and International Electrotechnical Commission''s (IEC) 61850, to guarantee most extreme adaptability for future development and transition.
Read less Read more
Useful (0) Not useful (0)
user-icon

Buyer, Power, SME

5
Apr 07, 2019

“Safety of Information”

Denial-of-service attacks, sometimes called DDoS attacks, take several forms. Some use botnets, or networks of infected devices, to generate surges in traffic; some focus on only the layer of the internet the end-user interacts with, and others target the infrastructure of the server itself. The DreamHost attack appeared to have only a limited effect; the company reported that it restored all services within about three hours.
Read less Read more
Useful (0) Not useful (0)
user-icon

Buyer, Transportation and Logistics, SME

2
Apr 07, 2019

“Cyber Threat Information”

The company leverages automated cyber tools, computer network defence solutions and cyber-intelligence to sustain security. It determines new attacks vectors, monitors network behaviour, employing fused multi-source information which is a part of Raytheon''s effective proactive defence.
Read less Read more
Useful (0) Not useful (0)
user-icon

Analyst

4
Apr 07, 2019

“Diverse System Communications”

The company’s security monitoring has High Speed Guard in the Department of Defense (DoD) and Intelligence Community (IC) accredited software solution that enables highly complex, uni-directional or bi-directional, automated data transfers between multiple physically segregated networks. High Speed Guard supports diverse systems communication with comparatively low administration costs, making it the ideal choice for production-critical systems that require rapid, automated data transfer.
Read less Read more
Useful (0) Not useful (0)
user-icon

Buyer, Transportation and Logistics, SME

3
Apr 07, 2019

“Tracking Advanced Threats”

Raytheon Foreground Security model which is V-SOC. The V-SOC model focuses on advanced threats and tracking attacker tactics, techniques, and procedures versus simple alert response. The V-SOC service identifies existing network or host compromises, zero day exploits, data exfiltration, network anomalies, emerging advanced threats, suspicious insider behaviour, use of insecure ports/protocols, and misconfigured devices.
Read less Read more
Useful (0) Not useful (0)
I agree to 360Quadrants Terms of use and privacy policy
Success
info
Error
Company Size :
  Enterprise
  SME
  Startup