SlideShare una empresa de Scribd logo
1 de 27
Unisys STEALTH solution

    for data security

      AFCEA Sofia Chapter Conference
             Sofia, 18 May 2011
Unisys STEALTH solution for data security


Content:
1. Introduction
2. Description
3. Implementation
4. Certificate
5. Conclusion




        NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

1. Introduction


 The Unisys Stealth Solution is a transformational way to protect
 your network data. It starts by using certified encryption, then bit-
 splits data into multiple slices as it moves through the network.
 But more than that, the Stealth Solution allows multiple
 communities of interest to share the same network without fear of
 another group accessing their data or even their workstations and
 servers.
 The result is a much simpler network infrastructure, increased
 agility to react to new opportunities, and enhanced security of
 your network data.

         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

1. Introduction


 To deliver the right information to the right people at the right time,
 defense agencies need to overcome the challenge of securing a
 collaborative environment.
 There are, however, inhibitors to achieving this vision. Many defense
 agencies have specific regulations for multi-level security. They
 have environments across the world where the networks are often
 unpredictable and at times unreliable.




         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

1. Introduction


 As a result, defense agencies are forced to field multiple independent
 global and regional networks to provide services to individuals who
 need access to controlled unclassified information (CUI), secret,
 and top-secret data.
 Access to more than one of these networks requires multiple LANs
 and PCs for the user. Simultaneously, the demand is growing to
 share information across these networks




         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

1. Introduction


 Physical security, such as maintaining separate LANs, is one way
 defense agencies are securing data. By keeping the data physically
 separated, certain security objectives can be achieved, but at what
 cost?
 There are challenges related to duplication of infrastructure, higher
 maintenance costs, and information sharing among communities of
 interest, such as coalition partners
 The Unisys Stealth Solution for Network is designed specifically to
 overcome this challenge and targets the SBU and classified
 domains

         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description


 The Stealth Solution for Network is a transformational solution that
 secures data-in-motion and controls the sharing of information within
 or across networks by employing an innovative cloaking
 technique – all while vastly simplifying the infrastructure.
 The Stealth Solution assures security by cryptographically
 transforming information using a bit-level, data-splitting
 algorithm that weaves the data into the very fabric of the network.




         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description


The Stealth Solution for Network:
 Protects the confidentiality, integrity, and availability of data-in-
 motion and data-at-rest
 Allows multiple communities of interest to share the same network
 securely
 Cloaks Stealth Solution-equipped devices from unauthorized eyes




         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description


 For defense and agency networks: It protects the security and
 integrity of data on a single network by preventing unauthorized
 access
 For coalition operations: It allows nations to selectively control
 the sharing of information across a common coalition network or
 between a coalition network and a national network
 For privacy concern: It creates communities of interest that
 control access to information based upon user roles and
 responsibilities



         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description


 For cross-domain information sharing: It permits data classified
 at different levels to coexist on a single network, enabling the
 consolidation of different networks into a single IT infrastructure. It
 offers users access only to the information they are authorized.
 Permitting the consolidation of NIPR, SIPR, and JWICS-
 connected LANs into a single IT infrastructure




         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description


 The Stealth Solution for Network employs a Unisys-developed
 information management architecture that fundamentally alters the
 approach to data protection by directing and controlling parsed
 data “slices”
 The solution consists of appliances (with in-built software) that
 are deployed throughout the network at key locations. Software also
 resides on workstations and servers in the network.




         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description - Typical Agency Multi-Layered Infrastructure




         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description - Unisys Stealth Solution Infrastructure




                             The Stealth Solution consolidates installation
                             networks into one infrastructure and offers a
                             single interface to the Global Information Grid




         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description


 The Unisys Stealth Solution for Network:
 - Splitting and encryption embedded in the Stealth Solution
 - Stealth endpoint runs in every workstation, server, and gateway
 - Splits IP packets and controls access to data
 - User workgroup keys control packet splitting and access to servers


 The result is a cloaked network that secures data-in-motion and
 hides servers and PCs in plain sight

           NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description


 The Stealth Solution for SAN:
 Unisys is the only solution that enables data classified at different
 security levels to coexist on a single storage area network while
 vastly improving availability of stored data.
 Plus for SANs, it eliminates the need for complex and expensive
 remote mirror data replication software.




         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description
  The Stealth Solution for SAN:




Multiple communities of interest
(or domains) can safely share storage


            NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

  2. Description
     The Stealth Solution for SAN:




Even when local storage disks are unavailable,
data can be read from other storage
devices, re-assembled, and decrypted
For unique “always-on” capabilities


                 NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description


 The Stealth Solution for SAN:


 Protects the confidentiality, integrity, and availability of data-at-rest
 Allows multiple communities of interest to share the same storage
 network securely
 Provides “always-on” data availability




         NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description
 The Stealth Solution for SAN:
 For defense and agency networks: It protects the security
 and integrity of data on a single network or SAN by preventing
 unauthorized access
 For coalition operations: It allows nations to selectively
 control the sharing of information across a common coalition
 network or SAN or between a coalition infrastructure and a
 national infrastructure




        NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

2. Description
 The Stealth Solution for SAN:
 For privacy concerns: It creates communities of interest that
 control access to information based upon user roles and
 responsibilities
 For cross-domain information sharing: It permits data
 classified at different levels to coexist on a single network or
 SAN, enabling the consolidation of different networks and SAN
 into a single infrastructure. It offers users access only to the
 information they are authorized



        NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

3. Implementation
 Unisys Corporation was tasked, to demonstrate and validate a
 Cryptographic Bit Splitting Technology (CBST) solution
 The goal was to determine possible benefits for :
      Joint Improvised Explosive Device Defeat Organization (JIEDDO)
      field operations
      United States Joint Forces Command (USJFCOM)
      Joint Transformation Center – Intelligence (JTC-I)
      Joint Intelligence Laboratory (JIL) network convergence, and
      other applications.


          NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

3. Implementation – U.S. Special Operations Command
 Unisys Corporation was tasked, under Defense Information Systems
 Agency (DISA) Encore II to analyze the existing United States Special
 Operations Command (USSOCOM) Tactical Local Area Network
 (TACLAN) infrastructure, and subsequently develop and demonstrate a
 prototype solution integrating Unisys Stealth Solution for Network and
 Stealth Solution for Storage Area Network (SAN) into the TACLAN
 Version 9.0 system. The customer for the project is the USSOCOM-
 TACLAN Program Management Office (PMO).
 The goal of the project is to provide a prototype that will enhance overall
 TACLAN operability by allowing for a smaller footprint, distributed and
 secure data storage, and easy integration into the current spiral
 development track of the TACLAN program

           NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security
4. Certificate




           NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

4. Certificate
 Unisys Stealth Solution for Networks Certified by NSA to Protect Classified
 Government Data
 Patent-pending Unisys solution provides encrypted "virtual communities of interest"
 to protect data across any public or private network
 BLUE BELL, Pa., April 13, 2011 /PRNewswire/ -- Unisys today announced that the Unisys
 Stealth Solution for Network achieved EAL-4+ certification from the National Security
 Agency (NSA) as a secure solution for protection of data-in-motion across any network --
 private or public. This qualifies Stealth to protect U.S. Defense Department data
 classified up to the "secret" level.




              NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

5. Conclusion
 The Unisys Stealth Solution: Securing Networks and SANs
 Splitting and encryption embedded in the Stealth Solution
 Stealth management software controls access to data within a
 community of interest
 User workgroup keys control access to a specific community of
 interest
 The result is a cloaked network or SAN that secures data-in-
 motion and data-at-rest and hides data in plain sight



          NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security

5. Conclusion
 Revolutionary Security - With Stealth, you have a much simpler
 and more cost-effective consolidated infrastructure, vastly
 increased data availability for mission critical applications, and
 enhanced security and privacy of your data
 Unisys Stealth Solution - Secure Solutions for Defense
 Agencies
 The Stealth Solution enables you to get the right information to the
 right people at the right time, SECURELY!




           NSA Awards Unisys Stealth EAL-4
Unisys STEALTH solution for data security


Content:
1. Introduction
2. Description
3. Implementation
4. Certificate
5. Conclusion

       QUESTIONS ?

        NSA Awards Unisys Stealth EAL-4

Más contenido relacionado

La actualidad más candente

GreenTec WORMdisk & CYBERdisk Capabilities
GreenTec WORMdisk & CYBERdisk CapabilitiesGreenTec WORMdisk & CYBERdisk Capabilities
GreenTec WORMdisk & CYBERdisk Capabilities
Keith P. Melvey
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
Narenda Wicaksono
 

La actualidad más candente (15)

GreenTec WORMdisk & CYBERdisk Capabilities
GreenTec WORMdisk & CYBERdisk CapabilitiesGreenTec WORMdisk & CYBERdisk Capabilities
GreenTec WORMdisk & CYBERdisk Capabilities
 
Juniper Networks SRX Branch Solutions
Juniper Networks SRX Branch SolutionsJuniper Networks SRX Branch Solutions
Juniper Networks SRX Branch Solutions
 
1000281 en 2
1000281 en 21000281 en 2
1000281 en 2
 
07security
07security07security
07security
 
QNX Sales Engineering Presentation
QNX Sales Engineering PresentationQNX Sales Engineering Presentation
QNX Sales Engineering Presentation
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
 
Building Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesBuilding Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal Devices
 
Document Security
Document SecurityDocument Security
Document Security
 
EMC Storage for Physical Security EMC VNX, VNXe, and Isilon, and Genetec Secu...
EMC Storage for Physical Security EMC VNX, VNXe, and Isilon, and Genetec Secu...EMC Storage for Physical Security EMC VNX, VNXe, and Isilon, and Genetec Secu...
EMC Storage for Physical Security EMC VNX, VNXe, and Isilon, and Genetec Secu...
 
Qnx os
Qnx os Qnx os
Qnx os
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
 
QNX OS
QNX OSQNX OS
QNX OS
 
Cloud computing Security
Cloud computing SecurityCloud computing Security
Cloud computing Security
 
NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...
NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...
NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...
 

Destacado

Supply Chain Management Basics: 3PLs - One Size Does Not Fit All
Supply Chain Management Basics: 3PLs  - One Size Does Not Fit AllSupply Chain Management Basics: 3PLs  - One Size Does Not Fit All
Supply Chain Management Basics: 3PLs - One Size Does Not Fit All
Angela Carver
 
Infosys ppt.
Infosys ppt.Infosys ppt.
Infosys ppt.
Roshni17
 

Destacado (13)

Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
 
Unisys Integrated Medical Device Management - Executive Brief
Unisys Integrated Medical Device Management - Executive BriefUnisys Integrated Medical Device Management - Executive Brief
Unisys Integrated Medical Device Management - Executive Brief
 
Outsourcing Class
Outsourcing ClassOutsourcing Class
Outsourcing Class
 
Why Web Projects Fail
Why Web Projects FailWhy Web Projects Fail
Why Web Projects Fail
 
Vested Outsourcing And Spot Brief August 2011
Vested Outsourcing And Spot Brief August 2011Vested Outsourcing And Spot Brief August 2011
Vested Outsourcing And Spot Brief August 2011
 
Wipro Diversey Case Study A Journey To Vested Outsourcing Body
Wipro Diversey Case Study A Journey To Vested Outsourcing BodyWipro Diversey Case Study A Journey To Vested Outsourcing Body
Wipro Diversey Case Study A Journey To Vested Outsourcing Body
 
Supply Chain Management Basics: 3PLs - One Size Does Not Fit All
Supply Chain Management Basics: 3PLs  - One Size Does Not Fit AllSupply Chain Management Basics: 3PLs  - One Size Does Not Fit All
Supply Chain Management Basics: 3PLs - One Size Does Not Fit All
 
Global Technology
Global  TechnologyGlobal  Technology
Global Technology
 
Global technology 2016 outlook
Global technology 2016 outlookGlobal technology 2016 outlook
Global technology 2016 outlook
 
Infosys ppt.
Infosys ppt.Infosys ppt.
Infosys ppt.
 
Impact of Technology on Society
Impact of Technology on SocietyImpact of Technology on Society
Impact of Technology on Society
 
Technology Presentation
Technology PresentationTechnology Presentation
Technology Presentation
 
Best Presentation About Infosys
Best Presentation About InfosysBest Presentation About Infosys
Best Presentation About Infosys
 

Similar a Unisys Stealth Black

Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...
eSAT Journals
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance Essay
Dotha Keller
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storage
Iaetsd Iaetsd
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx
annettsparrow
 

Similar a Unisys Stealth Black (20)

Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook
 
Network Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptxNetwork Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptx
 
Network Security v1.0 Network Security v
Network Security v1.0 Network Security vNetwork Security v1.0 Network Security v
Network Security v1.0 Network Security v
 
Secure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protectionSecure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protection
 
Network security
Network securityNetwork security
Network security
 
Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Lecture 07 networking
Lecture 07 networkingLecture 07 networking
Lecture 07 networking
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance Essay
 
Approach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed FirewallsApproach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed Firewalls
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storage
 
Network security
Network securityNetwork security
Network security
 
Review of NIST Security Controls SC-28 SC-10
Review of NIST Security Controls SC-28 SC-10Review of NIST Security Controls SC-28 SC-10
Review of NIST Security Controls SC-28 SC-10
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
161129 tryggve-at niasc-biobanks
161129 tryggve-at niasc-biobanks161129 tryggve-at niasc-biobanks
161129 tryggve-at niasc-biobanks
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
 
Network Security - Advanced Computer Network.pptx
Network Security - Advanced Computer Network.pptxNetwork Security - Advanced Computer Network.pptx
Network Security - Advanced Computer Network.pptx
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
 
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
 

Último

Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
ZurliaSoop
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Abortion pills in Kuwait Cytotec pills in Kuwait
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
laloo_007
 

Último (20)

Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Falcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial Wings
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 

Unisys Stealth Black

  • 1. Unisys STEALTH solution for data security AFCEA Sofia Chapter Conference Sofia, 18 May 2011
  • 2. Unisys STEALTH solution for data security Content: 1. Introduction 2. Description 3. Implementation 4. Certificate 5. Conclusion NSA Awards Unisys Stealth EAL-4
  • 3. Unisys STEALTH solution for data security 1. Introduction The Unisys Stealth Solution is a transformational way to protect your network data. It starts by using certified encryption, then bit- splits data into multiple slices as it moves through the network. But more than that, the Stealth Solution allows multiple communities of interest to share the same network without fear of another group accessing their data or even their workstations and servers. The result is a much simpler network infrastructure, increased agility to react to new opportunities, and enhanced security of your network data. NSA Awards Unisys Stealth EAL-4
  • 4. Unisys STEALTH solution for data security 1. Introduction To deliver the right information to the right people at the right time, defense agencies need to overcome the challenge of securing a collaborative environment. There are, however, inhibitors to achieving this vision. Many defense agencies have specific regulations for multi-level security. They have environments across the world where the networks are often unpredictable and at times unreliable. NSA Awards Unisys Stealth EAL-4
  • 5. Unisys STEALTH solution for data security 1. Introduction As a result, defense agencies are forced to field multiple independent global and regional networks to provide services to individuals who need access to controlled unclassified information (CUI), secret, and top-secret data. Access to more than one of these networks requires multiple LANs and PCs for the user. Simultaneously, the demand is growing to share information across these networks NSA Awards Unisys Stealth EAL-4
  • 6. Unisys STEALTH solution for data security 1. Introduction Physical security, such as maintaining separate LANs, is one way defense agencies are securing data. By keeping the data physically separated, certain security objectives can be achieved, but at what cost? There are challenges related to duplication of infrastructure, higher maintenance costs, and information sharing among communities of interest, such as coalition partners The Unisys Stealth Solution for Network is designed specifically to overcome this challenge and targets the SBU and classified domains NSA Awards Unisys Stealth EAL-4
  • 7. Unisys STEALTH solution for data security 2. Description The Stealth Solution for Network is a transformational solution that secures data-in-motion and controls the sharing of information within or across networks by employing an innovative cloaking technique – all while vastly simplifying the infrastructure. The Stealth Solution assures security by cryptographically transforming information using a bit-level, data-splitting algorithm that weaves the data into the very fabric of the network. NSA Awards Unisys Stealth EAL-4
  • 8. Unisys STEALTH solution for data security 2. Description The Stealth Solution for Network: Protects the confidentiality, integrity, and availability of data-in- motion and data-at-rest Allows multiple communities of interest to share the same network securely Cloaks Stealth Solution-equipped devices from unauthorized eyes NSA Awards Unisys Stealth EAL-4
  • 9. Unisys STEALTH solution for data security 2. Description For defense and agency networks: It protects the security and integrity of data on a single network by preventing unauthorized access For coalition operations: It allows nations to selectively control the sharing of information across a common coalition network or between a coalition network and a national network For privacy concern: It creates communities of interest that control access to information based upon user roles and responsibilities NSA Awards Unisys Stealth EAL-4
  • 10. Unisys STEALTH solution for data security 2. Description For cross-domain information sharing: It permits data classified at different levels to coexist on a single network, enabling the consolidation of different networks into a single IT infrastructure. It offers users access only to the information they are authorized. Permitting the consolidation of NIPR, SIPR, and JWICS- connected LANs into a single IT infrastructure NSA Awards Unisys Stealth EAL-4
  • 11. Unisys STEALTH solution for data security 2. Description The Stealth Solution for Network employs a Unisys-developed information management architecture that fundamentally alters the approach to data protection by directing and controlling parsed data “slices” The solution consists of appliances (with in-built software) that are deployed throughout the network at key locations. Software also resides on workstations and servers in the network. NSA Awards Unisys Stealth EAL-4
  • 12. Unisys STEALTH solution for data security 2. Description - Typical Agency Multi-Layered Infrastructure NSA Awards Unisys Stealth EAL-4
  • 13. Unisys STEALTH solution for data security 2. Description - Unisys Stealth Solution Infrastructure The Stealth Solution consolidates installation networks into one infrastructure and offers a single interface to the Global Information Grid NSA Awards Unisys Stealth EAL-4
  • 14. Unisys STEALTH solution for data security 2. Description The Unisys Stealth Solution for Network: - Splitting and encryption embedded in the Stealth Solution - Stealth endpoint runs in every workstation, server, and gateway - Splits IP packets and controls access to data - User workgroup keys control packet splitting and access to servers The result is a cloaked network that secures data-in-motion and hides servers and PCs in plain sight NSA Awards Unisys Stealth EAL-4
  • 15. Unisys STEALTH solution for data security 2. Description The Stealth Solution for SAN: Unisys is the only solution that enables data classified at different security levels to coexist on a single storage area network while vastly improving availability of stored data. Plus for SANs, it eliminates the need for complex and expensive remote mirror data replication software. NSA Awards Unisys Stealth EAL-4
  • 16. Unisys STEALTH solution for data security 2. Description The Stealth Solution for SAN: Multiple communities of interest (or domains) can safely share storage NSA Awards Unisys Stealth EAL-4
  • 17. Unisys STEALTH solution for data security 2. Description The Stealth Solution for SAN: Even when local storage disks are unavailable, data can be read from other storage devices, re-assembled, and decrypted For unique “always-on” capabilities NSA Awards Unisys Stealth EAL-4
  • 18. Unisys STEALTH solution for data security 2. Description The Stealth Solution for SAN: Protects the confidentiality, integrity, and availability of data-at-rest Allows multiple communities of interest to share the same storage network securely Provides “always-on” data availability NSA Awards Unisys Stealth EAL-4
  • 19. Unisys STEALTH solution for data security 2. Description The Stealth Solution for SAN: For defense and agency networks: It protects the security and integrity of data on a single network or SAN by preventing unauthorized access For coalition operations: It allows nations to selectively control the sharing of information across a common coalition network or SAN or between a coalition infrastructure and a national infrastructure NSA Awards Unisys Stealth EAL-4
  • 20. Unisys STEALTH solution for data security 2. Description The Stealth Solution for SAN: For privacy concerns: It creates communities of interest that control access to information based upon user roles and responsibilities For cross-domain information sharing: It permits data classified at different levels to coexist on a single network or SAN, enabling the consolidation of different networks and SAN into a single infrastructure. It offers users access only to the information they are authorized NSA Awards Unisys Stealth EAL-4
  • 21. Unisys STEALTH solution for data security 3. Implementation Unisys Corporation was tasked, to demonstrate and validate a Cryptographic Bit Splitting Technology (CBST) solution The goal was to determine possible benefits for : Joint Improvised Explosive Device Defeat Organization (JIEDDO) field operations United States Joint Forces Command (USJFCOM) Joint Transformation Center – Intelligence (JTC-I) Joint Intelligence Laboratory (JIL) network convergence, and other applications. NSA Awards Unisys Stealth EAL-4
  • 22. Unisys STEALTH solution for data security 3. Implementation – U.S. Special Operations Command Unisys Corporation was tasked, under Defense Information Systems Agency (DISA) Encore II to analyze the existing United States Special Operations Command (USSOCOM) Tactical Local Area Network (TACLAN) infrastructure, and subsequently develop and demonstrate a prototype solution integrating Unisys Stealth Solution for Network and Stealth Solution for Storage Area Network (SAN) into the TACLAN Version 9.0 system. The customer for the project is the USSOCOM- TACLAN Program Management Office (PMO). The goal of the project is to provide a prototype that will enhance overall TACLAN operability by allowing for a smaller footprint, distributed and secure data storage, and easy integration into the current spiral development track of the TACLAN program NSA Awards Unisys Stealth EAL-4
  • 23. Unisys STEALTH solution for data security 4. Certificate NSA Awards Unisys Stealth EAL-4
  • 24. Unisys STEALTH solution for data security 4. Certificate Unisys Stealth Solution for Networks Certified by NSA to Protect Classified Government Data Patent-pending Unisys solution provides encrypted "virtual communities of interest" to protect data across any public or private network BLUE BELL, Pa., April 13, 2011 /PRNewswire/ -- Unisys today announced that the Unisys Stealth Solution for Network achieved EAL-4+ certification from the National Security Agency (NSA) as a secure solution for protection of data-in-motion across any network -- private or public. This qualifies Stealth to protect U.S. Defense Department data classified up to the "secret" level. NSA Awards Unisys Stealth EAL-4
  • 25. Unisys STEALTH solution for data security 5. Conclusion The Unisys Stealth Solution: Securing Networks and SANs Splitting and encryption embedded in the Stealth Solution Stealth management software controls access to data within a community of interest User workgroup keys control access to a specific community of interest The result is a cloaked network or SAN that secures data-in- motion and data-at-rest and hides data in plain sight NSA Awards Unisys Stealth EAL-4
  • 26. Unisys STEALTH solution for data security 5. Conclusion Revolutionary Security - With Stealth, you have a much simpler and more cost-effective consolidated infrastructure, vastly increased data availability for mission critical applications, and enhanced security and privacy of your data Unisys Stealth Solution - Secure Solutions for Defense Agencies The Stealth Solution enables you to get the right information to the right people at the right time, SECURELY! NSA Awards Unisys Stealth EAL-4
  • 27. Unisys STEALTH solution for data security Content: 1. Introduction 2. Description 3. Implementation 4. Certificate 5. Conclusion QUESTIONS ? NSA Awards Unisys Stealth EAL-4