Cyber Security

Defending your enterprise against cyber adversaries goes beyond passwords and firewalls. Unrelenting cyber threats require continuous monitoring, robust defense and 360° awareness of network activities.

With a long history of building the technologies that successfully secure the country's most important information, we are poised to deliver the cyber security solutions that protect your enterprise. From protecting data critical to your business to providing secure interoperability for first responders to managing a network in a battlefield environment, we have a cyber security solution to support you.

C

  • Common Hardware Systems - 4 (CHS-4)

    A ten year indefinite delivery/indefinite quantity (ID/IQ) contract that provides commercial and rugged computers, network hardware equipment, power subsystems, peripheral devices and commercial software to U.S. Department of Defense customers worldwide.

G

  • GD Protected™ Mobile Solutions for Classified

    General Dynamics, in partnership with Samsung, provides a secure mobile solution that combines commercial smartphone features with the ability to secure classified voice and data communications.

I

K

  • Key Management Infrastructure

    A secure and reliable cryptographic key generation and distribution infrastructure forms the core of any communications security strategy.

L

  • Last Mile Key Management

    Securely and reliably delivering cryptographic key material from the key management infrastructure to the end devices.

M

  • Multi-Domain and Cross-Domain Solutions

    General Dynamics is the only company that has been developing, certifying, and accrediting a broad line of inter-related multilevel and cross-domain technologies listed on this site.

P

  • Privilege Management

    Privilege Management enables you to provide access to enterprise services and data based on a registered identity.

T

  • TACLANE®-MultiBook™ Secure Laptop

    This complete mobile classified computing solution integrates features such as secure data-in-transit, secure data-at-rest and multilevel computing — remotely accessing, processing, protecting, and communicating information classified Suite B Secret and below using non-secure transport networks.

  • Trusted Embedded Environment (TEE)

    TEE is a Separation Kernel/Hypervisor for high assurance systems. TEE is an enabling technology, providing interfaces for developing applications in a MILS environment. TEE is targeted towards tactical embedded environments and is scalable to workstation and server environments.

  • Trusted Network Environment (TNE)

    TNE is multilevel management for files, e-mail, collaboration, web, database, and auditing capabilities. TNE provides full cross-domain solutions with single-level to multilevel bi-direction transfers. It is NSA and DIA Certified and Accredited IAW DCID 6/3 requirements for Protection Level 4 operations to the desktop.

  • TVE Trusted Multilevel Computing Solution

    TVE is a multilevel computing solution that allows users to simultaneously view and access multiple security levels, operating systems and domains from a single computer, eliminating the need for multiple computers.

Description