Defending your enterprise against cyber adversaries goes beyond passwords and firewalls. Unrelenting cyber threats require continuous monitoring, robust defense and 360° awareness of network activities.
With a long history of building the technologies that successfully secure the country's most important information, we are poised to deliver the cyber security solutions that protect your enterprise. From protecting data critical to your business to providing secure interoperability for first responders to managing a network in a battlefield environment, we have a cyber security solution to support you.
- Common Hardware Systems - 4 (CHS-4)
A ten year indefinite delivery/indefinite quantity (ID/IQ) contract that provides commercial and rugged computers, network hardware equipment, power subsystems, peripheral devices and commercial software to U.S. Department of Defense customers worldwide.
- GD Protected™ Mobile Solutions for Classified
General Dynamics, in partnership with Samsung, provides a secure mobile solution that combines commercial smartphone features with the ability to secure classified voice and data communications.
- Identity Management/Public Key Infrastructure (PKI)
Strong authentication of users and devices is critical to the security of your network and the success of your mission.
- Key Management Infrastructure
A secure and reliable cryptographic key generation and distribution infrastructure forms the core of any communications security strategy.
- Last Mile Key Management
Securely and reliably delivering cryptographic key material from the key management infrastructure to the end devices.
- Multi-Domain and Cross-Domain Solutions
General Dynamics is the only company that has been developing, certifying, and accrediting a broad line of inter-related multilevel and cross-domain technologies listed on this site.
- Privilege Management
Privilege Management enables you to provide access to enterprise services and data based on a registered identity.
- TACLANE®-MultiBook™ Secure Laptop
This complete mobile classified computing solution integrates features such as secure data-in-transit, secure data-at-rest and multilevel computing — remotely accessing, processing, protecting, and communicating information classified Suite B Secret and below using non-secure transport networks.
- Trusted Embedded Environment (TEE)
TEE is a Separation Kernel/Hypervisor for high assurance systems. TEE is an enabling technology, providing interfaces for developing applications in a MILS environment. TEE is targeted towards tactical embedded environments and is scalable to workstation and server environments.
- Trusted Network Environment (TNE)
TNE is multilevel management for files, e-mail, collaboration, web, database, and auditing capabilities. TNE provides full cross-domain solutions with single-level to multilevel bi-direction transfers. It is NSA and DIA Certified and Accredited IAW DCID 6/3 requirements for Protection Level 4 operations to the desktop.
- TVE Trusted Multilevel Computing Solution
TVE is a multilevel computing solution that allows users to simultaneously view and access multiple security levels, operating systems and domains from a single computer, eliminating the need for multiple computers.