The Defense Information Systems Agency (DISA) selected Raytheon‘s [RTN] insider threat management solution as the Insider Threat Focused Observation Tool (InTFOT) for the Department of Defense, the company reported.

Under the contract, Raytheon will provide DoD an enterprise license for its solution.

At the request of the U.S. Strategic Command and in support of the president’s national security goals, the InTFOT provides network administrators and security personnel with technology to effectively counter the threat posed by insiders to the security and integrity of the Global Information Grid and the data it contains, according to Raytheon.

Insider threat management is part of Raytheon’s end-to-end cybersecurity offering, which provides advanced cybersecurity systems to protect customers’ critical information and infrastructures from the most complex threats, the company said.

“Insider threats pose some of the most serious economic and national security challenges of the 21st century,” Steve Hawkins, vice president of Raytheon’s Information Security Solutions business said. “These threats could be a trusted individual who knows internal organizations and could be after classified information, or someone who is not malicious but accidentally leaks vital data. Insiders can have the access to compromise, steal, change or destroy information that could potentially cause disruptions to critical U.S. systems.”

Raytheon’s host-based insider risk management solution proactively identifies and supports investigations of user violations so organizations can proactively manage insider incidents, the company added. The InTFOT leverages Raytheon’s sixth-generation insider-threat innovations which include:

  • Endpoint activity monitoring and control;
  • Integrated endpoint and network protection;
  • Innovative DVR-like video replay technology and forensics;
  • Incident replays that show complete context and user intent;
  • Policy-based user activity monitoring;
  • Monitoring even when the user or laptop is offline or disconnected; and
  • Monitoring files and transmissions before encryption, so malicious acts can’t hide behind it