secure access to sensitive data on mobile devices - afcea mobile symposium 2013 presentation
DESCRIPTION
An innovative solution to access sensitive and classified data on mobile devices using virtualization and secure redisplay technologies.TRANSCRIPT
Copyright © 2013 Raytheon Company. All rights reserved.
Customer Success Is Our Mission is a registered trademark of Raytheon Company.
Raytheon Mobile Solution
AFCEA Mobile Tech
Symposium
Ashok Sankar
Senior Director, Product Strategy
November 22, 2013
Page 2
Part of Raytheon Intelligence, Information and Services (IIS)
group
Support Departments of Defense, Intelligence, Law
Enforcement, Civilian, and Industrial Control Systems
worldwide
One of two approved providers for the Department of
Homeland Security (DHS) in the area of cyber defense
Specialization in Cross Domain Information Assurance, Visual
Analytics, Insider Threat and Cyber Security
Premier mobility solution for sensitive information access
– Data and apps run in the back-end of the enterprise in the Virtual
Mobile Infrastructure (VMI)
– Only replication of data and apps are presented to the device
Raytheon Cyber Products Group
Page 3
Securing Sensitive Data in a Mobile Environment
Key concern
– Accidental or malicious leaks and loss of sensitive information
Solution
– Focus on securing data, not just device
– Eliminate application and data residency on device
Virtualization and secure redisplay technologies ensure data protection
at the source
Data security is assured at most sensitive
levels, regardless of device
Page 4
Raytheon TITAN (code name only)
Protected domains host virtualized mobile and web apps
Secure redisplay client on commodity device to access virtual
mobile devices, desktop and cloud apps
Identity management through existing PKI
Support for commercially available devices including dual-persona
with no modifications
Virtual Mobile Apps
• Native Mobile Apps
• Web Apps
• Cloud Apps
• Desktop Apps
Page 5
TITAN Multilevel Security (MLS)
12/6/2013
Page 6
Government Use Case
Sample use case #1:
– Access to sensitive information at or near SCIF
– Geofencing capability ensures perimeter definition for
access
12/6/2013
Sample use case #2:
– Access to classified component and equipment
specifications or records
• (e.g.) Aircraft maintenance
– No data is stored on the device preventing theft or
data loss
Page 7
Value Propositions
12/6/2013
Confident and cost effective
collaboration
Data leakage and loss prevention
Co-exist with any MDM and MAM
Access to native, desktop and
web apps
Ideal for BYOD scenarios Streamlined registration
and management
Page 8
Key Differentiators
12/6/2013
Implementation based
on NSA guidance
High level of information
assurance and security for
sensitive and classified data
No modifications or
extraneous components
necessary on device
Non-reliance on device specific
containers and encryption solutions
Suite B and nested tunnels Cost savings with ‘build once
run twice’ environment
Page 9
Contact Us
Feel free to reach out to us at [email protected]
or by calling 866.230.1307
www.TrustedCS.com