Lockheed Martin has also launched an intelligence sharing solution called Trusted Sentinel

Oct 31, 2013 19:11 GMT  ·  By

Lockheed Martin’s Cyber Security Alliance has three new partners: Red Hat, FireEye and Splunk. The companies have agreed to work together on developing intelligence-driven defense solutions.

“The addition of three market-leading companies in the cyber security and data analytics marketplace will help us meet the challenges of today's constantly evolving cyber threats using an intelligence-driven approach,” noted Charlie Croom, vice president of Cyber Security Solutions at Lockheed Martin Information Systems & Global Solutions.

The Cyber Security Alliance integrates the strong points of market leading companies within the NexGen Cyber Innovation and Technology Center, a research, development and collaboration center.

In addition to FireEye, Red Hat and Splunk, the list of partners includes APC by Schneider Electric, Cisco, CA, ArcSight, Dell, Citrix, EMC and RSA, Intel, HP, McAfee, Juniper Networks, NetApp, Microsoft, Symantec, VMWare, Verizon and Trustwave.

On Wednesday, Lockheed Martin also unveiled Trusted Sentinel, a cyber security solution that enables organizations to securely share intelligence.

“In today's complex cyber threat environment, protecting and securing our data is critical,” said Jim Quinn, vice president of C4ISR Systems for Lockheed Martin Information Systems & Global Solutions.

“Trusted Sentinel addresses the difficult challenge of sharing relevant information across security domains and between organizational echelons.”

Trusted Sentinel’s capabilities are based on two of the company’s Cross Domain Solutions approved by the Unified Cross Domain Management Office (UCDMO). The UCDMO is an organization that provides coordination and oversight of cross-domain initiatives across the Department of Defense and the Intelligence Community.

The new data sharing solution can be used by organizations to securely share data between all clearance levels.

Trusted Sentinel ensures that data coming from the highest levels doesn’t contain any sensitive information, and that the data going up from the lower levels doesn’t contain any malicious code.