SlideShare uma empresa Scribd logo
1 de 27
Unisys STEALTH solution

    for data security

      AFCEA Sofia Chapter Conference
             Sofia, 18 May 2011
Unisys STEALTH solution for data security


Content:
1. Introduction
2. Description
3. Implementation
4. Certificate
5. Conclusion




        NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

1. Introduction


 The Unisys Stealth Solution is a transformational way to protect
 your network data. It starts by using certified encryption, then bit-
 splits data into multiple slices as it moves through the network.
 But more than that, the Stealth Solution allows multiple
 communities of interest to share the same network without fear of
 another group accessing their data or even their workstations and
 servers.
 The result is a much simpler network infrastructure, increased
 agility to react to new opportunities, and enhanced security of
 your network data.

         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

1. Introduction


 To deliver the right information to the right people at the right time,
 defense agencies need to overcome the challenge of securing a
 collaborative environment.
 There are, however, inhibitors to achieving this vision. Many defense
 agencies have specific regulations for multi-level security. They
 have environments across the world where the networks are often
 unpredictable and at times unreliable.




         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

1. Introduction


 As a result, defense agencies are forced to field multiple independent
 global and regional networks to provide services to individuals who
 need access to controlled unclassified information (CUI), secret,
 and top-secret data.
 Access to more than one of these networks requires multiple LANs
 and PCs for the user. Simultaneously, the demand is growing to
 share information across these networks




         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

1. Introduction


 Physical security, such as maintaining separate LANs, is one way
 defense agencies are securing data. By keeping the data physically
 separated, certain security objectives can be achieved, but at what
 cost?
 There are challenges related to duplication of infrastructure, higher
 maintenance costs, and information sharing among communities of
 interest, such as coalition partners
 The Unisys Stealth Solution for Network is designed specifically to
 overcome this challenge and targets the SBU and classified
 domains

         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description


 The Stealth Solution for Network is a transformational solution that
 secures data-in-motion and controls the sharing of information within
 or across networks by employing an innovative cloaking
 technique – all while vastly simplifying the infrastructure.
 The Stealth Solution assures security by cryptographically
 transforming information using a bit-level, data-splitting
 algorithm that weaves the data into the very fabric of the network.




         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description


The Stealth Solution for Network:
 Protects the confidentiality, integrity, and availability of data-in-
 motion and data-at-rest
 Allows multiple communities of interest to share the same network
 securely
 Cloaks Stealth Solution-equipped devices from unauthorized eyes




         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description


 For defense and agency networks: It protects the security and
 integrity of data on a single network by preventing unauthorized
 access
 For coalition operations: It allows nations to selectively control
 the sharing of information across a common coalition network or
 between a coalition network and a national network
 For privacy concern: It creates communities of interest that
 control access to information based upon user roles and
 responsibilities



         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description


 For cross-domain information sharing: It permits data classified
 at different levels to coexist on a single network, enabling the
 consolidation of different networks into a single IT infrastructure. It
 offers users access only to the information they are authorized.
 Permitting the consolidation of NIPR, SIPR, and JWICS-
 connected LANs into a single IT infrastructure




         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description


 The Stealth Solution for Network employs a Unisys-developed
 information management architecture that fundamentally alters the
 approach to data protection by directing and controlling parsed
 data “slices”
 The solution consists of appliances (with in-built software) that
 are deployed throughout the network at key locations. Software also
 resides on workstations and servers in the network.




         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description - Typical Agency Multi-Layered Infrastructure




         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description - Unisys Stealth Solution Infrastructure




                             The Stealth Solution consolidates installation
                             networks into one infrastructure and offers a
                             single interface to the Global Information Grid




         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description


 The Unisys Stealth Solution for Network:
 - Splitting and encryption embedded in the Stealth Solution
 - Stealth endpoint runs in every workstation, server, and gateway
 - Splits IP packets and controls access to data
 - User workgroup keys control packet splitting and access to servers


 The result is a cloaked network that secures data-in-motion and
 hides servers and PCs in plain sight

           NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description


 The Stealth Solution for SAN:
 Unisys is the only solution that enables data classified at different
 security levels to coexist on a single storage area network while
 vastly improving availability of stored data.
 Plus for SANs, it eliminates the need for complex and expensive
 remote mirror data replication software.




         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description
  The Stealth Solution for SAN:




Multiple communities of interest
(or domains) can safely share storage


            NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

  2. Description
     The Stealth Solution for SAN:




Even when local storage disks are unavailable,
data can be read from other storage
devices, re-assembled, and decrypted
For unique “always-on” capabilities


                 NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description


 The Stealth Solution for SAN:


 Protects the confidentiality, integrity, and availability of data-at-rest
 Allows multiple communities of interest to share the same storage
 network securely
 Provides “always-on” data availability




         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description
 The Stealth Solution for SAN:
 For defense and agency networks: It protects the security
 and integrity of data on a single network or SAN by preventing
 unauthorized access
 For coalition operations: It allows nations to selectively
 control the sharing of information across a common coalition
 network or SAN or between a coalition infrastructure and a
 national infrastructure




        NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description
 The Stealth Solution for SAN:
 For privacy concerns: It creates communities of interest that
 control access to information based upon user roles and
 responsibilities
 For cross-domain information sharing: It permits data
 classified at different levels to coexist on a single network or
 SAN, enabling the consolidation of different networks and SAN
 into a single infrastructure. It offers users access only to the
 information they are authorized



        NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

3. Implementation
 Unisys Corporation was tasked, to demonstrate and validate a
 Cryptographic Bit Splitting Technology (CBST) solution
 The goal was to determine possible benefits for :
      Joint Improvised Explosive Device Defeat Organization (JIEDDO)
      field operations
      United States Joint Forces Command (USJFCOM)
      Joint Transformation Center – Intelligence (JTC-I)
      Joint Intelligence Laboratory (JIL) network convergence, and
      other applications.


          NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

3. Implementation – U.S. Special Operations Command
 Unisys Corporation was tasked, under Defense Information Systems
 Agency (DISA) Encore II to analyze the existing United States Special
 Operations Command (USSOCOM) Tactical Local Area Network
 (TACLAN) infrastructure, and subsequently develop and demonstrate a
 prototype solution integrating Unisys Stealth Solution for Network and
 Stealth Solution for Storage Area Network (SAN) into the TACLAN
 Version 9.0 system. The customer for the project is the USSOCOM-
 TACLAN Program Management Office (PMO).
 The goal of the project is to provide a prototype that will enhance overall
 TACLAN operability by allowing for a smaller footprint, distributed and
 secure data storage, and easy integration into the current spiral
 development track of the TACLAN program

           NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security
4. Certificate




           NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

4. Certificate
 Unisys Stealth Solution for Networks Certified by NSA to Protect Classified
 Government Data
 Patent-pending Unisys solution provides encrypted "virtual communities of interest"
 to protect data across any public or private network
 BLUE BELL, Pa., April 13, 2011 /PRNewswire/ -- Unisys today announced that the Unisys
 Stealth Solution for Network achieved EAL-4+ certification from the National Security
 Agency (NSA) as a secure solution for protection of data-in-motion across any network --
 private or public. This qualifies Stealth to protect U.S. Defense Department data
 classified up to the "secret" level.




              NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

5. Conclusion
 The Unisys Stealth Solution: Securing Networks and SANs
 Splitting and encryption embedded in the Stealth Solution
 Stealth management software controls access to data within a
 community of interest
 User workgroup keys control access to a specific community of
 interest
 The result is a cloaked network or SAN that secures data-in-
 motion and data-at-rest and hides data in plain sight



          NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

5. Conclusion
 Revolutionary Security - With Stealth, you have a much simpler
 and more cost-effective consolidated infrastructure, vastly
 increased data availability for mission critical applications, and
 enhanced security and privacy of your data
 Unisys Stealth Solution - Secure Solutions for Defense
 Agencies
 The Stealth Solution enables you to get the right information to the
 right people at the right time, SECURELY!




           NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security


Content:
1. Introduction
2. Description
3. Implementation
4. Certificate
5. Conclusion

       QUESTIONS ?

        NSA Awards Unisys Stealth EAL-4

Mais conteúdo relacionado

Mais procurados

GreenTec WORMdisk & CYBERdisk Capabilities
GreenTec WORMdisk & CYBERdisk CapabilitiesGreenTec WORMdisk & CYBERdisk Capabilities
GreenTec WORMdisk & CYBERdisk Capabilities
Keith P. Melvey
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
Narenda Wicaksono
 

Mais procurados (15)

GreenTec WORMdisk & CYBERdisk Capabilities
GreenTec WORMdisk & CYBERdisk CapabilitiesGreenTec WORMdisk & CYBERdisk Capabilities
GreenTec WORMdisk & CYBERdisk Capabilities
 
Juniper Networks SRX Branch Solutions
Juniper Networks SRX Branch SolutionsJuniper Networks SRX Branch Solutions
Juniper Networks SRX Branch Solutions
 
1000281 en 2
1000281 en 21000281 en 2
1000281 en 2
 
07security
07security07security
07security
 
QNX Sales Engineering Presentation
QNX Sales Engineering PresentationQNX Sales Engineering Presentation
QNX Sales Engineering Presentation
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
 
Building Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesBuilding Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal Devices
 
Document Security
Document SecurityDocument Security
Document Security
 
EMC Storage for Physical Security EMC VNX, VNXe, and Isilon, and Genetec Secu...
EMC Storage for Physical Security EMC VNX, VNXe, and Isilon, and Genetec Secu...EMC Storage for Physical Security EMC VNX, VNXe, and Isilon, and Genetec Secu...
EMC Storage for Physical Security EMC VNX, VNXe, and Isilon, and Genetec Secu...
 
Qnx os
Qnx os Qnx os
Qnx os
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
 
QNX OS
QNX OSQNX OS
QNX OS
 
Cloud computing Security
Cloud computing SecurityCloud computing Security
Cloud computing Security
 
NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...
NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...
NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...
 

Destaque

Supply Chain Management Basics: 3PLs - One Size Does Not Fit All
Supply Chain Management Basics: 3PLs  - One Size Does Not Fit AllSupply Chain Management Basics: 3PLs  - One Size Does Not Fit All
Supply Chain Management Basics: 3PLs - One Size Does Not Fit All
Angela Carver
 
Infosys ppt.
Infosys ppt.Infosys ppt.
Infosys ppt.
Roshni17
 

Destaque (13)

Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
 
Unisys Integrated Medical Device Management - Executive Brief
Unisys Integrated Medical Device Management - Executive BriefUnisys Integrated Medical Device Management - Executive Brief
Unisys Integrated Medical Device Management - Executive Brief
 
Outsourcing Class
Outsourcing ClassOutsourcing Class
Outsourcing Class
 
Why Web Projects Fail
Why Web Projects FailWhy Web Projects Fail
Why Web Projects Fail
 
Vested Outsourcing And Spot Brief August 2011
Vested Outsourcing And Spot Brief August 2011Vested Outsourcing And Spot Brief August 2011
Vested Outsourcing And Spot Brief August 2011
 
Wipro Diversey Case Study A Journey To Vested Outsourcing Body
Wipro Diversey Case Study A Journey To Vested Outsourcing BodyWipro Diversey Case Study A Journey To Vested Outsourcing Body
Wipro Diversey Case Study A Journey To Vested Outsourcing Body
 
Supply Chain Management Basics: 3PLs - One Size Does Not Fit All
Supply Chain Management Basics: 3PLs  - One Size Does Not Fit AllSupply Chain Management Basics: 3PLs  - One Size Does Not Fit All
Supply Chain Management Basics: 3PLs - One Size Does Not Fit All
 
Global Technology
Global  TechnologyGlobal  Technology
Global Technology
 
Global technology 2016 outlook
Global technology 2016 outlookGlobal technology 2016 outlook
Global technology 2016 outlook
 
Infosys ppt.
Infosys ppt.Infosys ppt.
Infosys ppt.
 
Impact of Technology on Society
Impact of Technology on SocietyImpact of Technology on Society
Impact of Technology on Society
 
Technology Presentation
Technology PresentationTechnology Presentation
Technology Presentation
 
Best Presentation About Infosys
Best Presentation About InfosysBest Presentation About Infosys
Best Presentation About Infosys
 

Semelhante a Unisys Stealth Black

Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...
eSAT Journals
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance Essay
Dotha Keller
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storage
Iaetsd Iaetsd
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx
annettsparrow
 

Semelhante a Unisys Stealth Black (20)

Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook
 
Network Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptxNetwork Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptx
 
Network Security v1.0 Network Security v
Network Security v1.0 Network Security vNetwork Security v1.0 Network Security v
Network Security v1.0 Network Security v
 
Secure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protectionSecure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protection
 
Network security
Network securityNetwork security
Network security
 
Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Lecture 07 networking
Lecture 07 networkingLecture 07 networking
Lecture 07 networking
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance Essay
 
Approach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed FirewallsApproach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed Firewalls
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storage
 
Network security
Network securityNetwork security
Network security
 
Review of NIST Security Controls SC-28 SC-10
Review of NIST Security Controls SC-28 SC-10Review of NIST Security Controls SC-28 SC-10
Review of NIST Security Controls SC-28 SC-10
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
161129 tryggve-at niasc-biobanks
161129 tryggve-at niasc-biobanks161129 tryggve-at niasc-biobanks
161129 tryggve-at niasc-biobanks
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
 
Network Security - Advanced Computer Network.pptx
Network Security - Advanced Computer Network.pptxNetwork Security - Advanced Computer Network.pptx
Network Security - Advanced Computer Network.pptx
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
 
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
 

Último

Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 

Último (20)

Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' Slideshare
 
Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance management
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 

Unisys Stealth Black

  • 1. Unisys STEALTH solution for data security AFCEA Sofia Chapter Conference Sofia, 18 May 2011
  • 2. Unisys STEALTH solution for data security Content: 1. Introduction 2. Description 3. Implementation 4. Certificate 5. Conclusion NSA Awards Unisys Stealth EAL-4
  • 3. Unisys STEALTH solution for data security 1. Introduction The Unisys Stealth Solution is a transformational way to protect your network data. It starts by using certified encryption, then bit- splits data into multiple slices as it moves through the network. But more than that, the Stealth Solution allows multiple communities of interest to share the same network without fear of another group accessing their data or even their workstations and servers. The result is a much simpler network infrastructure, increased agility to react to new opportunities, and enhanced security of your network data. NSA Awards Unisys Stealth EAL-4
  • 4. Unisys STEALTH solution for data security 1. Introduction To deliver the right information to the right people at the right time, defense agencies need to overcome the challenge of securing a collaborative environment. There are, however, inhibitors to achieving this vision. Many defense agencies have specific regulations for multi-level security. They have environments across the world where the networks are often unpredictable and at times unreliable. NSA Awards Unisys Stealth EAL-4
  • 5. Unisys STEALTH solution for data security 1. Introduction As a result, defense agencies are forced to field multiple independent global and regional networks to provide services to individuals who need access to controlled unclassified information (CUI), secret, and top-secret data. Access to more than one of these networks requires multiple LANs and PCs for the user. Simultaneously, the demand is growing to share information across these networks NSA Awards Unisys Stealth EAL-4
  • 6. Unisys STEALTH solution for data security 1. Introduction Physical security, such as maintaining separate LANs, is one way defense agencies are securing data. By keeping the data physically separated, certain security objectives can be achieved, but at what cost? There are challenges related to duplication of infrastructure, higher maintenance costs, and information sharing among communities of interest, such as coalition partners The Unisys Stealth Solution for Network is designed specifically to overcome this challenge and targets the SBU and classified domains NSA Awards Unisys Stealth EAL-4
  • 7. Unisys STEALTH solution for data security 2. Description The Stealth Solution for Network is a transformational solution that secures data-in-motion and controls the sharing of information within or across networks by employing an innovative cloaking technique – all while vastly simplifying the infrastructure. The Stealth Solution assures security by cryptographically transforming information using a bit-level, data-splitting algorithm that weaves the data into the very fabric of the network. NSA Awards Unisys Stealth EAL-4
  • 8. Unisys STEALTH solution for data security 2. Description The Stealth Solution for Network: Protects the confidentiality, integrity, and availability of data-in- motion and data-at-rest Allows multiple communities of interest to share the same network securely Cloaks Stealth Solution-equipped devices from unauthorized eyes NSA Awards Unisys Stealth EAL-4
  • 9. Unisys STEALTH solution for data security 2. Description For defense and agency networks: It protects the security and integrity of data on a single network by preventing unauthorized access For coalition operations: It allows nations to selectively control the sharing of information across a common coalition network or between a coalition network and a national network For privacy concern: It creates communities of interest that control access to information based upon user roles and responsibilities NSA Awards Unisys Stealth EAL-4
  • 10. Unisys STEALTH solution for data security 2. Description For cross-domain information sharing: It permits data classified at different levels to coexist on a single network, enabling the consolidation of different networks into a single IT infrastructure. It offers users access only to the information they are authorized. Permitting the consolidation of NIPR, SIPR, and JWICS- connected LANs into a single IT infrastructure NSA Awards Unisys Stealth EAL-4
  • 11. Unisys STEALTH solution for data security 2. Description The Stealth Solution for Network employs a Unisys-developed information management architecture that fundamentally alters the approach to data protection by directing and controlling parsed data “slices” The solution consists of appliances (with in-built software) that are deployed throughout the network at key locations. Software also resides on workstations and servers in the network. NSA Awards Unisys Stealth EAL-4
  • 12. Unisys STEALTH solution for data security 2. Description - Typical Agency Multi-Layered Infrastructure NSA Awards Unisys Stealth EAL-4
  • 13. Unisys STEALTH solution for data security 2. Description - Unisys Stealth Solution Infrastructure The Stealth Solution consolidates installation networks into one infrastructure and offers a single interface to the Global Information Grid NSA Awards Unisys Stealth EAL-4
  • 14. Unisys STEALTH solution for data security 2. Description The Unisys Stealth Solution for Network: - Splitting and encryption embedded in the Stealth Solution - Stealth endpoint runs in every workstation, server, and gateway - Splits IP packets and controls access to data - User workgroup keys control packet splitting and access to servers The result is a cloaked network that secures data-in-motion and hides servers and PCs in plain sight NSA Awards Unisys Stealth EAL-4
  • 15. Unisys STEALTH solution for data security 2. Description The Stealth Solution for SAN: Unisys is the only solution that enables data classified at different security levels to coexist on a single storage area network while vastly improving availability of stored data. Plus for SANs, it eliminates the need for complex and expensive remote mirror data replication software. NSA Awards Unisys Stealth EAL-4
  • 16. Unisys STEALTH solution for data security 2. Description The Stealth Solution for SAN: Multiple communities of interest (or domains) can safely share storage NSA Awards Unisys Stealth EAL-4
  • 17. Unisys STEALTH solution for data security 2. Description The Stealth Solution for SAN: Even when local storage disks are unavailable, data can be read from other storage devices, re-assembled, and decrypted For unique “always-on” capabilities NSA Awards Unisys Stealth EAL-4
  • 18. Unisys STEALTH solution for data security 2. Description The Stealth Solution for SAN: Protects the confidentiality, integrity, and availability of data-at-rest Allows multiple communities of interest to share the same storage network securely Provides “always-on” data availability NSA Awards Unisys Stealth EAL-4
  • 19. Unisys STEALTH solution for data security 2. Description The Stealth Solution for SAN: For defense and agency networks: It protects the security and integrity of data on a single network or SAN by preventing unauthorized access For coalition operations: It allows nations to selectively control the sharing of information across a common coalition network or SAN or between a coalition infrastructure and a national infrastructure NSA Awards Unisys Stealth EAL-4
  • 20. Unisys STEALTH solution for data security 2. Description The Stealth Solution for SAN: For privacy concerns: It creates communities of interest that control access to information based upon user roles and responsibilities For cross-domain information sharing: It permits data classified at different levels to coexist on a single network or SAN, enabling the consolidation of different networks and SAN into a single infrastructure. It offers users access only to the information they are authorized NSA Awards Unisys Stealth EAL-4
  • 21. Unisys STEALTH solution for data security 3. Implementation Unisys Corporation was tasked, to demonstrate and validate a Cryptographic Bit Splitting Technology (CBST) solution The goal was to determine possible benefits for : Joint Improvised Explosive Device Defeat Organization (JIEDDO) field operations United States Joint Forces Command (USJFCOM) Joint Transformation Center – Intelligence (JTC-I) Joint Intelligence Laboratory (JIL) network convergence, and other applications. NSA Awards Unisys Stealth EAL-4
  • 22. Unisys STEALTH solution for data security 3. Implementation – U.S. Special Operations Command Unisys Corporation was tasked, under Defense Information Systems Agency (DISA) Encore II to analyze the existing United States Special Operations Command (USSOCOM) Tactical Local Area Network (TACLAN) infrastructure, and subsequently develop and demonstrate a prototype solution integrating Unisys Stealth Solution for Network and Stealth Solution for Storage Area Network (SAN) into the TACLAN Version 9.0 system. The customer for the project is the USSOCOM- TACLAN Program Management Office (PMO). The goal of the project is to provide a prototype that will enhance overall TACLAN operability by allowing for a smaller footprint, distributed and secure data storage, and easy integration into the current spiral development track of the TACLAN program NSA Awards Unisys Stealth EAL-4
  • 23. Unisys STEALTH solution for data security 4. Certificate NSA Awards Unisys Stealth EAL-4
  • 24. Unisys STEALTH solution for data security 4. Certificate Unisys Stealth Solution for Networks Certified by NSA to Protect Classified Government Data Patent-pending Unisys solution provides encrypted "virtual communities of interest" to protect data across any public or private network BLUE BELL, Pa., April 13, 2011 /PRNewswire/ -- Unisys today announced that the Unisys Stealth Solution for Network achieved EAL-4+ certification from the National Security Agency (NSA) as a secure solution for protection of data-in-motion across any network -- private or public. This qualifies Stealth to protect U.S. Defense Department data classified up to the "secret" level. NSA Awards Unisys Stealth EAL-4
  • 25. Unisys STEALTH solution for data security 5. Conclusion The Unisys Stealth Solution: Securing Networks and SANs Splitting and encryption embedded in the Stealth Solution Stealth management software controls access to data within a community of interest User workgroup keys control access to a specific community of interest The result is a cloaked network or SAN that secures data-in- motion and data-at-rest and hides data in plain sight NSA Awards Unisys Stealth EAL-4
  • 26. Unisys STEALTH solution for data security 5. Conclusion Revolutionary Security - With Stealth, you have a much simpler and more cost-effective consolidated infrastructure, vastly increased data availability for mission critical applications, and enhanced security and privacy of your data Unisys Stealth Solution - Secure Solutions for Defense Agencies The Stealth Solution enables you to get the right information to the right people at the right time, SECURELY! NSA Awards Unisys Stealth EAL-4
  • 27. Unisys STEALTH solution for data security Content: 1. Introduction 2. Description 3. Implementation 4. Certificate 5. Conclusion QUESTIONS ? NSA Awards Unisys Stealth EAL-4