Rapid Deployment Cyber System (RDCS)
Designed by cyber professionals for cyber professionals, the Rapid Deployment Cyber System (RDCS) is the “Swiss Army knife” for deploying teams with the capabilities of fulfilling a variety of roles and functions such as data / packet capture, forensics, and analytics engineering. Easily transportable at 28 pounds, this deployable system enables defensive cyber operations (DCO) forces to maneuver on site or remotely into a network in order to augment local and regional cyberspace defenders and conduct DCO. Its durable hard case meets MIL STD 810G shipping requirements and includes TSA compliant rollaboard.

High End Computing Module Features and Capabilities
Designed for flexibility and scalability, the High End Computing (HEC) module conducts the majority of heavy lifting for DCO, providing deployed high end data capture and analysis. By including an integrated Endace Data Acquisition and GenerationTM Data Capture Card, all packet capture activities can be offloaded from the Core processors to the card, freeing the system to provide its computing power toward building virtual machines and providing other analytic capabilities. With 32 cores, the system will also stay relevant for a three-year life cycle.
Maneuver on site or remotely into a network in order to augment local and regional cyberspace defenders and conduct DCO
Mitigates gaps in security capabilities and response capabilities
Overcomes limitations and improves agility, battlespace awareness and the ability to operate remotely
Ingests data at 20Gbps
Consists of an integrated hardware/networking layer, platform/virtualization system layer, and tool/payload layer

Cyber Analyst Workstation Features and Capabilities
The RDCS Cyber Analyst Workstation (CAW) replaces laptops as the analyst interface to the system. The CAW can be fielded based on team size and functions, working as a standalone system or in conjunction with the High End Computing Module. There is no need to toggle between screens. The CAW’s three screen system allows analysts to visually correlate and fuse disparate views and capabilities on the ground. that view.
Enables DCO forces (e.g. Cyber Protection Teams) to visualize complex cyber security and digital forensics work flows
Powerful enough to run Splunk, ELK Stack or other data analytics platforms for onsite data mining and forensics reducing response time and increasing response capabilities
Overcomes limitations of traditional workstations or laptops and improves agility, battlespace awareness and the ability to operate onsite
Designed for full spectrum cyber operations including SOC Analysts monitoring large enterprises and NSOC forces managing large enterprises
Consists of an integrated hardware/networking layer, platform/virtualization system layer, tool/payload layer and enhanced visualization capability