Advanced Cyber Resiliency Solution

Countervail is a software- and data-authentication solution that increases the cyber resiliency of mission-critical and support systems by assuring the integrity of operating systems, applications and data. Its feature set can be customized to address a wide range of deployment use cases.

Countervail’s threat model assumes the attacker already has privileged access to the system.

Attack Surface

Integrated public/private critical infrastructure and Department of Defense weapons systems are increasingly reliant on software-powered control and support systems, making them prime targets for cyber adversaries. And because a system with multiple endpoints is only as secure as its weakest link, hackers may find indirect paths to compromise their targets by exploiting support systems with weaker cyber protections.

The increasing use of commercial off-the-shelf (COTS) systems worsens this problem. All the upsides of using COTS solutions in the enterprise – fast technical advancement, easy acquisition, and low costs – are also enjoyed by adversaries who can easily acquire and exploit identical hardware and software. When a poorly-protected COTS support system is compromised, an adversary can penetrate even heavily-secured primary systems much more easily.

And while risk management framework controls, commercial information assurance tools and vendor security mechanisms can prevent some basic attacks, they’re not effective as a singular line of defense.

Securing the mission

Countervail is off-the-shelf cyber resiliency software that secures devices running modern Windows and Linux operating systems.

The easy-to-use solution actively maintains the integrity of software and files -- both on disk and in memory -- by creating a trusted, authenticated environment that prevents unauthorized execution without modifying files on protected systems or requiring major changes to existing organizational processes.

When paired, Countervail and Raytheon’ Boot Shield deliver a comprehensive software and hardware root-of-trust framework for detecting, preventing, and responding to cyber threats in real time.

Product Features

Downloadable Fact Sheet