Raytheon’s Trusted Computer Solutions business unit has released a new version of its remote access implementation solution the company calls Trusted Thin Client (TTC).
TTC will provide those users who require access to information residing on multiple sensitive networks to work from a single endpoint rather than having multiple endpoints connected to each network. Network separation protects classified or sensitive data from being compromised by advanced persistent threats or ending up in the wrong hands. The user’s endpoint can be a thin client device, a virtual machine within a workstation or a virtual machine securely running TTC from a locked-down device such as an encrypted memory stick.
“As civilian, military and intelligence organizations increasingly rely on mobile solutions to fulfill their missions, cross domain technology plays an essential role in our nation’s security,” said Ed Hammersla, chief operating officer for Raytheon Trusted Computer Solutions. “The TTC remote access implementation option ensures the same level of security as when working in the office, helping to protect sensitive and classified information.”
With TTC, data and applications reside at the organization’s network data center and can be accessed, viewed and changed through secure remote connectivity. The solution protects data and ensures that no evidence of what was accessed resides on the system when shut down.
More from SecurityWeek News
- Threat Hunting Summit Virtual Event NOW LIVE
- Video: ESG – CISO’s Guide to an Emerging Risk Cornerstone
- Threat Modeling Firm IriusRisk Raises $29 Million
- SentinelOne Announces $100 Million Venture Fund
- Today: 2022 CISO Forum Virtual Event
- Cymulate Closes $70M Series D Funding Round
- SecurityWeek to Host CISO Forum Virtually September 13-14, 2022: Registration is Open
- Privilege Escalation Flaw Haunts VMware Tools
Latest News
- Sentra Raises $30 Million for DSPM Technology
- Cyber Insights 2023: Cyberinsurance
- Cyber Insights 2023: Attack Surface Management
- Cyber Insights 2023: Artificial Intelligence
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- Guardz Emerges From Stealth Mode With $10 Million in Funding
- How the Atomized Network Changed Enterprise Protection
- Critical QNAP Vulnerability Leads to Code Injection
