Cyber Intelligence
Deployed Solutions

cyber-keyboard-680

Palisade™ - Cyber Security Intelligence Management Solution

LM’s PalisadeTM facilitates the management of security intelligence from across your enterprise and its external sources.  It integrates with your existing corporate security environment to deliver wide visibility of IT assets and critical network infrastructure.  It will provide additional alerting capabilities to empower your security operations with actionable solutions to defend and maintain critical operations.  PalisadeTM provides you the ability to generate and manage cyber security intelligence in a centralized, searchable, collaborative database.  Key features of Palisade™ include management of potential threats throughout the intelligence hierarchy, the ability to capture and manage indicators and workflow for integrated Cyber Kill ChainTM analysis techniques.

Security is at the core of all we do.

The Challenge
Businesses today are faced with a number of security challenges, including protecting their intellectual property and maintaining their business operations.:
  • Exposure to new, more advanced cyber security threats
  • Limited resources to address emerging cyber security threats
  • Increased regulation and government oversight
  • Growing customer desire for information and real-time data
  Introducing Palisade™
Lockheed Martin’s Palisade solution is a cyber security solution tailored to the complex needs of commercial industries and customized to each client’s unique environment. Above and beyond basic monitoring software, Palisade integrates with your security environment to deliver enterprise-wide visibility, awareness and alerting capability that provides security operations analysts with actionable security intelligence to defend and maintain critical operations.
Maximize Security Resources
Palisade™ enables organizations to maximize the operation and reliability of critical infrastructure, including security resources. Palisade includes workflow enhancements built in to automate routine cyber security processes.
    Connect the Dots
Palisade™ evaluates enterprise-wide data using complex event analysis to identify and qualify security threats.
    Empower the Security Team
Palisade™ provides advanced tools and capabilities for security professionals to proactively mitigate and respond to cyber security threats.
bar-680
cyber-eye-460

Cyber Threat Intelligence

Cyber Threat Mitigation Requires Diverse Capabilities – CTI Brings Them All Together
Continuous intelligence collection, malware analysis, tailorable analytics, and social network mining—CTI puts them into a single view. The complete solution delivers proactive intelligence to better inform an enterprise’s defenses utilizing an Intelligence, Surveillance & Reconnaissance (ISR) approach in cyberspace.

  • Discover, collect, analyze, characterize and disseminate actionable intelligence to cyber analysts within seconds
  • Maximize cyber tradecraft and analyst’s expertise through enhanced efficiency and effectiveness
  • Flexible deployment options enable local or geographically distributed deployments in both physical and virtual infrastructure
  • Open, extensible architecture enables flexibility and evolution to adapt to a changing cyber threat landscape

Cyber Workforce Awareness: Because the Greatest Risk can be Not Knowing the Risks
Email is an essential business tool, and it’s also one of the most common attack vectors for adversaries. If employees don’t know the warning signs, they run the risk of opening malicious attachments or clicking embedded links to web content containing malicious code. The good news is that email-based attacks often contain visible “red flags” that employees can use to identify the malicious nature of the email and take the right course of action.

Lockheed Martin’s analysis has shown that modifying employee behavior is a critical factor in preventing most, if not all, compromises of computing assets. So we developed our Cyber Workforce Awareness program in response. Not only can we educate employees on risky behavior and individual responsibility, we are able to measure improvements throughout the program.

Threat and Information Sharing

Threat & Information Sharing combines a secure environment for sharing cyber intelligence with in-person and online training sessions to increase the effectiveness and efficiency of communities of security professionals. You and your team learn operational tactics and benefit from lessons security experts have learned over more than a decade of fighting Advanced Threats. You stay informed of the latest cyber threats and the newest tactics in defeating those threats. Technical highlights include:

  • Securely partitioned group structure
  • Intuitive intelligence management
  • Case and Campaign alignment to Advanced Threats
  • Indicator and Mitigation identification
  • Threaded discussions and attachments
  • Customizable secure notification system

Cyber Security Awareness Training

An award-winning security awareness training that baselines risky behavior, educates employees on individual responsibility, and measures improvements throughout.

Suite of Tools and Techniques:

  • Planning
  •  Information Security Web sites
  • Immersive Games
  • Behavior Testing
  • Initiative Support