Raytheon [RTN] is developing an unnamed secure redisplay client as part of a strategy to satisfy the government’s growing need to securely access classified networks from mobile phones or tablet devices.

The secure redisplay client is for Raytheon’s Trusted Thin Client (TTC) system, an accredited, commercial-off-the-shelf (COTS) solution that provides users with secure simultaneous access to information on any number of different networks through a single connection point, according to a company statement.

A secure redisplay client is a piece of software that runs on a remote device, such as a smartphone or tablet computer, and provides a graphical user interface to applications or entire operating systems that are running on a back end network, Raytheon Senior Product Development Manager for Raytheon Trusted Computer Solutions Michael Miller told Defense Daily in a phone interview yesterday.

Miller said secure redisplay clients are often seen in enterprise applications or at Defense Department, intelligence agencies or other government agencies that need to provide access to data on cloud infrastructure.

“The redisplay client then gives you access, so once the connection to the back end is broken, the data, the application space, all that stuff is gone and there is no trail of that left on the device,” Miller said.

Raytheon spokeswoman Sherryl Dorch said yesterday the company has a prototype of the secure redisplay client and it will be available in the first quarter of 2013.

Miller said the secure redisplay client is device agnostic and will run on Android operating systems, Apple’s iOS and, eventually, Windows 8.

The secure redisplay client is also a multi-level security solution, which allows different people in an organization different access rights to certain levels of information based on sensitivity, according to Miller. Miller said multi-level security solutions are also needed to prevent leakage of more sensitive information to lower sensitivity levels and inspire confidence that there is no way to infiltrate higher security levels from the lower levels.

“Multi-level access is the ability to come in from a single client at a single location and access those disparate network resources while maintaining segregation of the resources and network infrastructures and protecting everybody’s information,” Miller said. “This can be networks at different levels, but they can be networks at the same level across multiple agencies.”