SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
SecureView: Government/Industry Collaboration
Delivers Improved Levels of Security, Performance,
and Cost Savings for Mission-Critical Applications
SecureView provides accredited cross-domain security, delivers the performance for advanced collaboration,
and is estimated to reduce total cost of ownership (TCO) by up to 67 percent over single-domain architectures and
45 percent over an alternative thin-client, multi-domain architecture with results normalized to a four-year refresh
cycle. The SecureView solution is the result of close collaboration among the US Air Force Research Laboratory,
Intel and Citrix, and uses Citrix XenClient™
XTand Intel®
vPro™
technology.
Authors:
Dr. Ryan J. Durante, DR-III, DAFC
Mr. John C. Woodruff, DR-III, DAFC
Cross-Domain Solutions and Innovation
Air Force Research Laboratory
Information Directorate
United States Air Force
White Paper
White Paper: SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications
2
Table of Contents
Executive Summary.................................................................................................................... 3
Developing SecureView............................................................................................................. 4
SecureView Technology Overview............................................................................................ 5
Comparing the Total Costs of Four Deployment Models......................................................... 5
Environment 1.............................................................................................................................. 6
Environment 2.............................................................................................................................. 6
Environment 3.............................................................................................................................. 7
Environment 4.............................................................................................................................. 7
Cross-Domain Platform TCO Summary..................................................................................... 8
Deployment Costs: Hardware..................................................................................................... 8
Deployment Costs: Implementation, Training and Application Porting/Replacement......... 9
Annual Power Costs..................................................................................................................... 9
Annual Management Costs......................................................................................................... 9
Productivity Losses.................................................................................................................... 10
Security Benefits........................................................................................................................ 10
Conclusion.................................................................................................................................11
White Paper: SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications
3
Performance and Responsiveness. SecureView can run on
commercially available PCs, laptops or tablets with Intel®
Core™
vPro™
technology-based processors with Intel®
Inte-
grated Graphics. This supports mission effectiveness by
enabling analysts and other users the performance to run
geographic information systems (GIS), multi-party High
Definition , videoconferencing, and other performance-
intensive applications that are essential to modern analysis
and collaboration. SecureView’s client-side intelligent virtual-
ization and local execution avoid the performance degrada-
tions of network latency often encountered with server-side
virtualization. SecureView not only provides a consistently
responsive end-user experience but also offers flexibility for
sites and users that need the flexibility of mobile computing;
allowing users to work productively even when persistent
network connectivity is lacking.The net result is demonstrable
improvements to user productivity.
Costs. SecureView reduces the traditional need for each user
to have separate workstations for each security level. As a
client-hosted virtualization (CHV) solution, it doesn’t require
the network and back-end build-out often necessary with
server-hosted virtualization (SHV) approaches running on
thin-clients. AFRL applied their direct experience in consulta-
tion with industry counterparts to conduct a detailed analysis
of the TCO to deploy, manage, and support SecureView and
three common deployment models. The data provided is
verified by AFRL where available and based on conventional
industry benchmark data otherwise. The concluding analysis
estimates that SecureView reduces annual total (capital and
operational) costs by up to 67 percent compared to single-
domain architectures and up to 45 percent over a widely
deployed thin-client, multi-domain architecture. The study
shows that a site deploying SecureView to 10,000 users over
a four-year period achieves cost savings of up to:
• $63.53 millioncompared to a traditional environment
with independent security levels and three PCs per user
(Environment 1)
• $73.79 million compared to a deployment with single-level
security using two thin-clients and one PC (Environment 2)
• $29.85 million comparedto a multi-level security solution
with one thin-client (Environment 3)3
Executive Summary
Data access and information-sharing strategies for the most
sensitive communities within the US Government must provide
affordability without compromising the most stringent require-
ments for data security and operational efficiency. In a security
environment marked by increasing sophistication and persis-
tent threats, the Office of the Director of National Intelligence
(ODNI) asked the US Air Force Research Laboratory (AFRL)
to lead the development of a solution. AFRL engaged in a
technical collaboration with Intel and Citrix resulting in Secure-
View, a government solution that expands on commercial
off-the-shelf (COTS) capabilities in Citrix XenClient™
and Intel®
Core™ i5 and i7 vPro™ processors.
SecureView has been deployed at more than one dozen
federal agencies and has saved the government millions of
dollars in development and TCO expenses. The solution is less
vulnerable to modification or corruption than traditional soft-
ware-based security solutions and provides unprecedented
performance for mission-critical collaboration and media-
intensive use cases than alternate hardware configurations.
As a hardened client-hosted virtualization (CHV) solution,
SecureView enables independent, concurrent access to multi-
ple security domains. It provides performance that is inde-
pendent of network bandwidth and server contention issues,
providing analysts with consistent responsiveness for visu-
ally intensive analysis and collaboration. SecureView is NIST
800-53 certified as High in both Confidentiality and Integrity,
and Medium in availability. On August 25, 2011, SecureView
received Authority to Operate (ATO) accreditation from the
ODNI. It has been deployed to users at more than one dozen
federal agencies as of November 2012, and is supported on
several Dell and HP desktop and numerous laptop models.
SecureView significantly improves all three vectors of secu-
rity, performance, and cost as compared to both legacy and
contemporary alternatives:
Security. Using hardware-assisted virtualization and security
technologies built into select Intel®
processors and chipsets,
SecureView is less vulnerable to modification or corruption
than traditional software-based security solutions. Secure-
View’s advanced isolation provides the ability to run multiple
securely isolated environments on a single PC. It includes a
hardware-assisted trusted boot that verifies the integrity of
the virtual desktop at launch, as well as hardware-assisted,
accelerated disk encryption.
White Paper: SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications
4
Developing SecureView
The 9/11 Commission highlighted the critical importance of
collaboration to enable intelligence analysts to accurately and
fully assess threats and share their findings across agencies
to help prevent attacks. They must do this in a world where
cyber-espionage, cyber-criminals, and cyber-terrorists pose
an ever-increasing threat. A serious security breach to the
intelligence and broader government community can do seri-
ous harm to the nation’s well-being, as well as confidence in
the technology infrastructure.
Groups with responsibility for developing secure, cost-effective
and powerful client environments for defense analysis have
tried a number of approaches, but each presented problems
that have become widely recognized.4
Traditionally, analysts
used a separate PC for each security domain they needed
access to (e.g., secret or top secret). This approach was expen-
sive to implement and support, as well as cumbersome and
inconvenient for end-users. The emergence of thin-clients and
desktop virtualization increased manageability and, in some
cases, made it possible to provide users the convenience of
a single client system. However, with workloads running on
back-end servers, deployment requires costly data center
build-out for servers, networks, and storage. Even with these
infrastructure investments performance has often been found
to be inadequate for modern visually based applications. The
result has been a poor user experience that reduces analysts’
productivity and impacts their effectiveness in using modern,
visually based applications.
Figure 1. SecureView annual TCO. Other environments are 176 percent, 205 percent, and 83 percent higher, respectively, than the SecureView
baseline (Environment 4). Results are derived from a detailed spreadsheet resulting from the TCO analysis conducted by AFRL in consultation
with industry experts.
100%
200%
300%
350%
0%
SecureView Annual TCO Compared to Other Architectures
176%
higher cost
205%
higher cost
83%
higher cost
0%
higher cost
Environment 1
Single-level security,
three PCs
Environment 2
Single-level security,
one PC and two
thin clients
Environment 3
Multi-level security,
one thin client
Environment 4
Multi-level security,
one PC with Intel®
Core™
vPro™
technology and
Citrix Xen Client XT
% Higher Annual TCO
Compare to SecureView
Baseline SecureView
AFRL developed SecureView in response to a direct request
from the Deputy Director for Information Assurance of the
ODNI.ODNI requested the development of a secure, robust
workstation that would support high-performance applica-
tions and provide independent and concurrent access to
multiple security domains from a single client system. ODNI
specified that the solution handle highly sensitive/secure infor-
mation with zero tolerance for data exfiltration, be deploy-
able with minimal impact to the host agency, and be capable
of provisioning within four hours. ODNI wanted the solution
within 10 months, requiring rapid development and delivery
of an innovative solution.
AFRL evaluated more than a dozen solutions, and established
collaboration with Citrix and Intel to enhance and utilize Citrix
XenClient software, which uses hardware security capabilities
that Intel has built into its Intel vPro technology-based proces-
sors. AFRL used Citrix XenClient XT, a commercial off-the-shelf
(COTS) solution which had been modified and enhanced with
government-specified capabilities. The team added further
government off-the-shelf (GOTS) enhancements to XenClient
XT to produce the government solution called SecureView.
XenClient and XenClient XT derive from the Xen.org Open
Source Development Community, a widely used and well-
tested open source operating system that runs an estimated
80 percent of the public infrastructure cloud.
White Paper: SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications
5
SecureView Technology Overview
SecureView’s technology foundation is Intel vPro technology
and Citrix XenClient XT—technologies that efficiently combine
hardware and software to improve security, manageability, and
performance of the client computing environment. Secure-
View is a flexible virtualization solution that runs on clients
in either client-hosted or server-hosted modes of operation.
Server-hosted modes use a thin virtual machine (VM), with a
minimal operating system running on the client and applica-
tions executing on server infrastructure within the environ-
ment. In client-hosted modes, the end point operates a full
operating system and applications execution within virtual
containers. This TCO study assumes client-hosted operation
for SecureView.
SecureView provides integrated, hardware-based functional-
ity that supports multiple operating system environments and
security domains on each end-user PC desktop or notebook
via virtual containers. These capabilities are supported by
Intel®
Virtualization Technology (Intel®
VT)and provide safe-
guards, via Intel®
Trusted Execution Technology (Intel®
TXT) to
protect each virtual environment from malware contamination.
Intel®
Advanced Encryption Standard New Instructions (Intel®
AES-NI)accelerates disk encryption. These hardware-aided
security technologies render SecureView clients inherently
less vulnerable than traditional software-only approaches.
Additionally, new integrated graphics capabilities improve
handling of high-resolution imagery and 3D graphics.
SecureView implements a true Type 1 “bare metal” client
hypervisor to provide robust data and computer resource
isolation by using Intel vPro technology and XenClient XT.
SecureView provides hardware-assisted trusted boot, main-
tains isolation between multiple independent virtual machines
(VMs), and verifies the integrity of the client at launch. The
trusted computing base configuration state is measured,
encrypted, and the measurements are sealed at installation.
Upon subsequent system start, the computing base is
re-measured and the encryption keys are unsealed only if
they match the appropriate cryptographic response from a
trusted platform module (TPM). XenClient XT Synchronizer™
enables SecureView to download centrally managed virtual
desktops. Using Synchronizer, IT can centrally back up user
data through a secure connection whenever the user connects
to the network, define security policies for managed devices,
disable XenClient PCs, and restore a user’s virtual desktop on
any XenClient-based device.
Comparing the Total Costs of Four
Deployment Models
SecureView was developed to harden security within the
intelligence community and increase analysts’ effectiveness
by improving their ability to use visually rich graphics, media,
and collaboration tools.SecureView also delivers significant
savings in both operational and capital expenses compared
to prevalent alternative approaches. To assess these savings,
AFRL compared SecureView’s operational costs to those of
three other client computing environments, reflecting the
evolution of government agencies’ approaches to providing
access to multiple security levels.
To develop the analysis, AFRL worked closely with a business
value analyst from Intel, and used a comprehensive client-
compute TCO model that has been applied in a range of
business and government environments.The analysis uses data
from actual deployments at AFRL where such data was avail-
able, and used respected sources of industry data, such as Prin-
cipled Technologies’ TCO Calculator, when it was not.The study
assumes that SecureView is deployed in a client-hosted mode.
The analysis calculates the costs to deploy and support
10,000 users for government environments which commonly
use either desktop PCs over a life cycle of four years, and/or
thin-client, server-hosted client environments with six-year life
cycles. This comprehensive view includes the necessary build-
out costs for client, server, network and other hardware over
the entire life cycle. It considers power costs, the costs of
pre-deployment preparation, deployment, and ongoing
management costs over the upgrade cycle. The analysis also
factors in user productivity impacts for each solution.
The analysis compared SecureView to two traditional, segre-
gated architectures, where users have a separate client system
for each security level, and a third, contemporary approach
which provides comparable domain segregation. These archi-
tectures are more fully described on following page.
SecureView Architecture
Intel®
vPro™
Hardware
XenClient XT
User VM
VT-D
SE
Linux
TXT
AES NIVT-X
User VM
Service VMs
SE
Linux
SE
Linux
SE
Linux
Xen Security Modules
Control
Domain
XenClient
XenClient XT Unique
Receiver
forXC
Network
Isolation
VPN
Isolation
Policy
Granularity
Policy
Granularity
Figure 2. SecureView technology architecture
White Paper: SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications
6
Environment 1	
Traditional single-level security environment with typically
managed rich desktops. Each user has a separate PC, moni-
tor, and network connection to back-end infrastructure for
multiple security domains (e.g., secret, top secret, and one or
more coalition domains). The TCO analysis assumed a four-
year upgrade cycle for this model.
Environment 2 	
Single-level security environment, thick and thin-clients. Again,
the user has a separate client system for each security domain,
but some domains are accessed via thin-clients, with access
servers providing a portal to back-end infrastructure for each
client. Applications on Domain A typically run on the PC, to
facilitate performance-sensitive applications. Environment 2
has an assumed upgrade cycle of six years.
Figure 4. Environment 2. Single-level security, one PC and two thin clients.
Figure 3. Environment 1. Single-level security, three PCs.
Environment 1
Domain A
Network Storage with
Network Services
Workstation 1
Domain B
Network Storage with
Network ServicesWorkstation 2
Domain C
Network Storage with
Network ServicesWorkstation 3
Environment 2
Domain A
Network Storage with
Network Services
Workstation 1
Network Storage with
Network Services
Domain B
Access Servers
Thin Client 1
Domain C
Access Servers Network Storage with
Network Services
Thin Client 2
White Paper: SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications
7
Environment 3	
Multi-level secure environment with a single thin-client and
session (access servers) to provide concurrent connections
to all three security levels. The analysis uses data from a
commonly deployed, multi-level thin-client environment for
this model. The assumed upgrade cycle for Environment 3
is six years.
Figure 5. Environment 3. Multi-level security, one thin client.
Environment 4 	
SecureView multi-level secure environment with a single intel-
ligent, virtualized PC running Citrix XenClient XT and powered
by Intel Core vPro processors providing concurrent, indepen-
dent access to all three domains. The assumed upgrade cycle
is four years.
Figure 6. Environment 4. SecureView: Multi-level security, one PC with Intel®
Core™
vPro™
technology and Citrix XenClient XT.
Environment 3
Domain A
Network Storage with Network Services
Domain B
User Session
Servers
User Desktop
Thin
Domain C
Environment 4
Domain A
Network Storage with
Network Services
SecureView
vPro Workstation
Network Storage with
Network Services
Domain B
Domain C
Standard COTS VPN
Concentrator(s)
Single Encrypted
“Grey Wire” to Workstation
Network Storage with
Network Services
White Paper: SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications
8
Cross-Domain Platform TCO Summary
Table 1 summarizes the cross-domain platform TCO for a deploy-
ment of 10,000 seats. It is followed by a brief discussion of the
analysis and some of the major assumptions made. Figure 7
summarizes annual TCO including productivity savings.
Deployment Costs: Hardware
As expected, the acquisition cost for SecureView PCs is higher
than that of thin-clients: $13.39 million for 10,000 PCs to $12.07
million for 10,000 thin-clients. However, these acquisition costs
are more than offset by the added costs of server and network
infrastructure build-out, among other issues.
Server and network infrastructure add significant costs to the
deployment of thin-client models.Thin-clients require serv-
ers to provide access/presentation services, as well as, server
infrastructure to run the server-hosted applications. The analy-
sis calculates the clients supported per server based on AFRL’s
experiences, and lab tests funded by Intel and conducted by
Principled Technologies. The analysis details the combined
costs for access infrastructure servers for the two thin-client
scenarios (Environments 2 and 3), session servers for the
multi-security level thin-client scenario (Environment 3), and
management servers for all four environments constitutethe
server deployment costs shown in Table 2.
Figure 7. Annual TCO including productivity costs for 10,000 users.11
Table 1. Cross-Domain Platform TCO Summary for a 10,000 Seat Deployment**
Siloed Domain Access, Single-Level Concurrent Multi-Domain Access, Multi-Level
Client Compute Platform Single-Domain,
3 Desktops
Environment 1
Single-Domain, 2 Thin-
clients + 1 Desktop
Environment 2
Multi-Domain,
1 Thin-client
Environment 3
SecureView: Multi-
Domain, 1 vPro PC
Environment 4
TCO Summary Including Lost Productivity Costs
Annual costs per client $2,489 $2,745 $1,647 $901
TCO per client for the upgrade cycle $9,956 $16,472 $9,881 $3,602
TCO for all clients for the upgrade cycle $99,560,000 $164,720,000 $98,810,000 $36,023,000
TCO per year for all clients $24,890,000 $27,450.000 $16,470,000 $9,006,000
TCO Summary Excluding Lost Productivity
Annual costs per client $2,489 $2,383 $1,103 $901
TCO per client for the upgrade cycle $9,956 $14,297 $6,617 $3,602
TCO for all clients for the upgrade cycle $99,560,000 $142,970,000 $66,174,000 $36,023,000
TCO per year for all clients $24,890,000 $23,830,000 $11,029,000 $9,006,000
Annual Cost Breakdown
One year annualized deployment cost $9,466,000 $9,808,000 $6,644,000 $4,171,000
Power per year $884,000 $951,000 $386,000 $295,000
Manageability per year $14,538,000 $13,068,000 $3,999,000 $4,540,000
Productivity lost per year $0 $3,626,000 $5,439,000 $0
Total $24,888,000 $27,453,000 $16,468,000 $9,006,000
TCO Breakdown
One-time deployment costs $37,870,000 $58,850,000 $39,870,000 $16,690,000
Power for the entire upgrade cycle $3,540,000 $5,710,000 $2,310,000 $1,180,000
Manageability for the entire upgrade cycle $58,150,000 $78,410,000 $23,990,000 $18,160,000
Productivity lost for the entire upgrade cycle $0 $21,760,000 $32,630,000 $0
Total $99,560,000 $164,730,000 $98,800,000 $36,030,000
**Table is drawn from a detailed spreadsheet resulting from the TCO analysis conducted by AFRL in consultation with industry experts. Data for Environments 1 and 2 are largely based on industry data sources. Key assumptions
for Environments 3 and 4 are drawn from common industry data sources, such as Principled Technologies’ TCO Calculator, when actual data was not available.Key assumptions in the analysis include: SecureView deployment in a
thick mode of operation; users wages are assumed to be $41 per hour, IT wages are assumed to be $63 per hour; client power state assumes 8 hours.10
On and 16 hours standby per workday; cooling power is assumed to be 1 W per
system watt; power cost is assumed to be $0.1 per kWh; annual client management activities are assumed to consist of 12 asset inventories, 14 patch installations, and 5 helpdesk calls per client.
30
25
20
15
10
5
0
Environment 1
Single-level
security,
three PCs
Environment 2
Single-level
security,
one PC and two
thin clients
Environment 3
Multi-level
security,
one thin client
Environment 4
Multi-level security,
one PC with Intel®
Core™
vPro™
technology and
Citrix Xen Client XT
Productivity lost per year
Manageability per year
Power per year
$MILLIONS
Annual TCO
Including Productivity Costs
One year's annualized
deployment cost
White Paper: SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications
9
Annual Power Costs
The analysis factors in the costs of power consumption and
cooling for PCs, thin-clients and monitors, as well as for serv-
ers required to support the client environments. The single-
domain, three-PC environment modeled (Environment 1) had
recently replaced its PCs. Environments with older PCs would
see greater energy savings from refreshing their PCs and
deploying SecureView, since new PCs consume significantly
less power than older ones. The study assumed three monitors
per user for the single-domain implementations (Environments
1 and 2), and two monitors each for the two multi-domain
implementations (Environments 3 and 4). Table 5 shows that
SecureView is the most energy-efficient of the four solutions
with the lowest expenditures on power.
Annual Management Costs
Client management tasks are assumed to consist of 12 asset
inventories, 14 patch installations, and 5 helpdesk calls per
client per year.
Table 2. Hardware Deployment Costs Summary for 10,000 Users
Single-Domain,
3 Desktops
Single-Domain,
2 Thin, 1 PC
Multi-Domain,
1 Thin
SecureView**
Server deployment costs $3,240,000 $7,870,000 $12,210,000 $1,080,000
Desktop and thin-client costs $31,880,000 $30,800,000 $12,070,000 $13,390,000
Network cost (client port, VPN) $3,750,000 $3,750,000 $1,250,000 $1,280,000
Total hardware deployment costs $38,870,000 $ 42,420,000 $25,530,000 $15,750,000
**Table is drawn from a detailed spreadsheet resulting from the TCO analysis conducted by AFRL in consultation with industry experts.
Table 3. Data Center Costs for the Entire Upgrade Cycle for 10,000 Users
Single-Domain,
3 Desktops
Single-Domain,
2 Thin, 1 PC
Multi-Domain,
1 Thin
SecureView**
Construction costs $40,000 $353,000 $600,000 $13,000
Port costs $130,000 $1,145,000 $1,944,000 $43,000
Wiring costs $7,000 $64,000 $108,000 $2,000
Total data center costs $177,000 $1,562,000 $2,652,000 $58,000
**Table is drawn from a detailed spreadsheet resulting from the TCO analysis conducted by AFRL in consultation with industry experts.
Note that the cost of server power is a recurring cost and is included in the annual power cost shown in Table 5.
Data center build-out factors to support the server infrastruc-
ture for all four deployment environments are also factored
into overall deployment costs, and shown in Table 3. 	
It should be noted that the analysis did not consider the fact
that Environments 2 and 3 introduce the server as a single
point of failure for multiple clients, since one server typically
takes on the entire processing load of multiple clients. This risk
can be mitigated through server and network redundancy, but
this would further increase capital expenses and complexity of
thin-client supporting infrastructure.
Deployment Costs: Implementation, Training
and Application Porting/Replacement
In AFRL’s experience, SecureView is a dramatically easier and
faster approach to analyze, define, and validate requirements,
and therefore, a superior implementation solution for cross-
domain security than either of the thin-client-based environ-
ments. At the same time, it is also the most cost-effective
approach. The savings in Table 4 reflect roughly a tenfold
difference in the costs of implementation and porting or
replacing applications.
White Paper: SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications
10
Productivity Losses
Productivity analysis is based on lab tests conducted by
Principled Technologies, assuming a user wage is $41 per
hour and an IT wage of $63 per hour. The analysis estimated
conservatively that users in these multi-level security, thin-
client scenarios (Environments 2 and 3) would lose 3.25
minutes each day on each of their thin-clients due to server or
network congestion. This results in a daily loss of $22,000 of
user productivity across 10,000 users or $5.439 million annually
for the multi-domain solution with a single thin-client (Environ-
ment 3). Environment 2, with a single PC and two thin-clients,
results in annual lost productivity of $3.626 million. Note that
the summary table reports the TCO results both with and with-
out these productivity costs included.
The study assumed the cost and performance of common
application or resource servers, such as those providing file,
e-mail, database, Web services, and network services such as
Active Directory and Domain Name System (DNS) hosting,
would be uniform across all environments. Therefore, these
were not included in the TCO analysis.
Table 4. Implementation, Training and Application Porting/Replacement Costs for 10,000 Users**
Single-Domain,
3 Desktops
Single-Domain,
2 Thin, 1 PC
Multi-Domain,
1 Thin
SecureView**
Implementation costs $34,000 $498,000 $464,000 $50,000
Training costs $0 $1,550,000 $1,600,000 $1,211,000
Application porting and replacement costs $38,000 $3,546,000 $3,508,000 $38,000
** Table is drawn from a detailed spreadsheet resulting from the TCO analysis conducted by AFRL in consultation with industry experts.
Table 5. Power Costs per Year for 10,000 Users**
Single-Domain,
3 Desktops
Single-Domain,
2 Thin, 1 PC
Multi-Domain,
1 Thin
SecureView**
Total power consumed (kWh) 8,844,000 9,514,000 3,856,000 2,948,000
Cost of power $884,400 $951,400 $385,600 $294,800
** Table is drawn from a detailed spreadsheet resulting from the TCO analysis conducted by AFRL in consultation withindustry experts.Client power state assumes 8 hours on and 16 hours Standby per workday. Cooling power is
assumed to be 1 W per system watt. Power cost is assumed to be $0.1 per kWh.
Table 6. Total Management Costs per Year**
Single-Domain,
3 Desktops
Single-Domain,
2 Thin, 1 PC
Multi-Domain,
1 Thin
SecureView**
Total manageability costs $14,538,000 $13,068,000 $3,999,000 $4,540,000
** Table is drawn from a detailed spreadsheet resulting from the TCO analysis conducted by AFRL in consultation withindustry experts.
Security Benefits
SecureView’s most important benefits did not lend themselves
to inclusion in the analysis. Specifically, there is no quantifica-
tion of the increase in information security provided by the
SecureView technologies or any attempt to monetize the cost
of a potential breach in information security. However, it is
worth noting that Ponemon Institute estimates the organiza-
tional cost of a single data breach at $5.5 million.12
Given the
sensitivity of the information that SecureView users work with,
the cost of a security breach could be literally incalculable.
Given that SecureView’s landmark utilization of hardware-
assisted security is intrinsically less vulnerable to modification
or corruption than alternative, software-only solutions, there
is additional, critical intrinsic value of risk reduction from data
exfiltration and infiltration.
White Paper: SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications
11
Conclusion
SecureView provides independent, concurrent access to
multiple security domains from a single client platform, which
is vital to the nation’s security.The architecture establishes a
new best-of-breed baseline in meeting the US Government’s
requirements for a secure data analysis and collaboration
environment that is robust, affordable, easily deployablein
multiple client configurationsand supportsmission effec-
tiveness by enabling analysts to run the latest visually based
software tools without sacrificing user experience.
With its flexible architecture and foundation in COTS technol-
ogies, SecureView is a readily deployable solution that enables
agencies to achieve the cost and manageability benefits of
modern desktop virtualization while increasing the security
of the information infrastructure. It provides the flexibility of
a server-hosted or a lower-cost client-hosted mode of opera-
tion, and offers straightforward ways for organizations to add
security domains as project requirements change. In addition,
SecureView is not a closed proprietary solution—it is based on
Xen open source hypervisor and COTS hardware technologies
that are easily accessible and affordable to acquire by govern-
ment and private sector enterprises.
SecureView not only provides the convenience of multi-
domain access from a single client without performance
compromises, but it is also distinguished from alternate
approaches by setting a precedent inextending the secure
multi-domain access boundary to mainstream mobile use
environments. Its availability on Intel Core vPro processor-
based notebook computers, along with an increasing variety
of cutting-edge business Ultrabooks™ and tablets, enables
security-sensitive users the flexibility to function in a wider
range of settings, including those where a persistent network
connection is unavailable.
The project execution of AFRL, Intel and Citrix is an excellent
example of effective government/industry collaboration. The
commitment and teamwork coupled with the use of robust
COTS technologies enabled AFRL to meet ODNI’s request
within months and deliver a solution that enhances the security
of some of the nation’s most critical information infrastructure
and assets. SecureView not only improves the productivity and
effectiveness of intelligence analysts and other key users by
enabling them to better support their organization mission,
it does so with dramatic cost savings.
1
For an overview of Citrix XenClient XT, see: http://www.citrix.com/products/xenclient/features/editions/xt.html.
2 
An overview of Intel vPro Technology is at: http://www.intel.com/content/www/us/en/architecture-and-technology/vpro/vpro-technology-general.html. Intel®
vPro™ technology is
sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software, and IT environment.
To learn more, visit http://www.intel.com/technology/vpro.
3
Results are derived from a detailed spreadsheet which captured the TCO analysis conducted by AFRL in consultation with industry experts.All results were normalized to a four-year
life cycle.
4
For a discussion of the intelligence community’s need for hardware-based information security, see, Michael Mestrovich, Implementing New Hardware-Based Information Security
Capabilities, 26 October 2010: http://www.intel.com/Assets/PDF/whitepaper/itc-snb_hardware_security_capabilities.pdf.
5
Intel®
Virtualization Technology (Intel®
VT) requires a computer system with an enabled Intel processor, BIOS, and virtual machine monitor (VMM). Functionality, performance, or other
benefits will vary depending on hardware
and software configurations. . Consult your system manufacturer.For more information, visit http://www.intel.com/go/virtualization.
6
Intel®
Trusted Execution Technology (Intel®
TXT). No computer system can provide absolute security under all conditions. Intel TXT) requires a computer with Intel®
Virtualization
Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE).Intel TXT also requires
the system to contain a TPM v1.For more information, visit http://www.intel.com/technology/security.
7
Intel®
Advanced Encryption Standard New Instructions (Intel®
AES-NI) requires a computer system with an AES-NI enabled processor, as well as non-Intel software to execute the
instructions in the correct sequence. AES-NI is available on select Intel®
processors. For availability, consult your reseller or system manufacturer.For more information, see http://software.
intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/.
8
Intel disclaims any responsibility or liability for any errors or inaccuracies that may appear in the model or which may have occurred in the underlying assumptions used to create the
analysis discussed in this paper.
9
For a whitepaper by Principled Technologies, seehttp://www.principledtechnologies.com/clients/reports/Intel/CompModelsTCO1107.pdf . The TCO Calculator is at
http://www.principledtechnologies.com/Clients/Reports/Intel/ComputeModelTCOCalc1107.xls.
10
For a whitepaper by Principled Technologies, seehttp://www.principledtechnologies.com/clients/reports/Intel/CompModelsTCO1107.pdf . The TCO Calculator is at
http://www.principledtechnologies.com/Clients/Reports/Intel/ComputeModelTCOCalc1107.xls. The TCO Calculator was developed with funding support from Intel Corporation.
11
Chart is derived from a detailed spreadsheet developed as part of the TCO analysis conducted by AFRL in consultation with industry experts.
12
2011 Cost of Data Breach Study: United States. Benchmark Research Conducted by Ponemon Institute, March 2012.
Copyright © 2012 Intel Corporation. All rights reserved. Intel, Core, vPro, and Ultrabook are trademarks of Intel Corporation in the U.S. and other countries.
Copyright © 2012 Citrix Systems Inc. All rights reserved. Citrix and XenClient are trademarks of Citrix Systems Inc.
*Other names and brands may be claimed as the property of others.
Printed in the USA	 1112/WS/OCG/XX/PDF	 Please Recycle	 328282-001US

Más contenido relacionado

La actualidad más candente

Protecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityProtecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityInnoTech
 
Esg solution showcase considerations for protecting converged systems and ...
Esg solution showcase  considerations for protecting converged systems   and ...Esg solution showcase  considerations for protecting converged systems   and ...
Esg solution showcase considerations for protecting converged systems and ...Fernando Alves
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Dell World
 
Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorSoftware Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorIRJET Journal
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteSplunk
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Troy Marshall
 
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...Power System Operation
 
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Unisys Corporation
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...IJNSA Journal
 
The Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control SystemsThe Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control SystemsMuhammad FAHAD
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesDell EMC World
 
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMCloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMHector Del Castillo, CPM, CPMM
 
Architecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationArchitecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationChadni Islam
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture IJECEIAES
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
Take the guesswork out of video surveillance with pre-validated, virtualized ...
Take the guesswork out of video surveillance with pre-validated, virtualized ...Take the guesswork out of video surveillance with pre-validated, virtualized ...
Take the guesswork out of video surveillance with pre-validated, virtualized ...Principled Technologies
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security StrategyCapgemini
 
Automated Interpretation and Integration of Security Tools Using Semantic Kno...
Automated Interpretation and Integration of Security Tools Using Semantic Kno...Automated Interpretation and Integration of Security Tools Using Semantic Kno...
Automated Interpretation and Integration of Security Tools Using Semantic Kno...Chadni Islam
 

La actualidad más candente (19)

Protecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityProtecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud Security
 
Esg solution showcase considerations for protecting converged systems and ...
Esg solution showcase  considerations for protecting converged systems   and ...Esg solution showcase  considerations for protecting converged systems   and ...
Esg solution showcase considerations for protecting converged systems and ...
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats
 
Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorSoftware Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for Shopfloor
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
 
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
 
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
 
The Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control SystemsThe Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control Systems
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
 
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMCloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
 
Architecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationArchitecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automation
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Take the guesswork out of video surveillance with pre-validated, virtualized ...
Take the guesswork out of video surveillance with pre-validated, virtualized ...Take the guesswork out of video surveillance with pre-validated, virtualized ...
Take the guesswork out of video surveillance with pre-validated, virtualized ...
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
 
Automated Interpretation and Integration of Security Tools Using Semantic Kno...
Automated Interpretation and Integration of Security Tools Using Semantic Kno...Automated Interpretation and Integration of Security Tools Using Semantic Kno...
Automated Interpretation and Integration of Security Tools Using Semantic Kno...
 

Destacado

About me presentation
About me presentationAbout me presentation
About me presentationCarson25
 
8 april bt(print) new window opens for sm_es as e-commerce thrives paypal
8 april bt(print) new window opens for sm_es as e-commerce thrives paypal8 april bt(print) new window opens for sm_es as e-commerce thrives paypal
8 april bt(print) new window opens for sm_es as e-commerce thrives paypalBridget Kow
 
Itsemääräämisoikeus
ItsemääräämisoikeusItsemääräämisoikeus
ItsemääräämisoikeusAssiAssari
 
A STUDY ON GUJARAT TOURISM AND ITS CONTRIBUTION
A STUDY ON GUJARAT TOURISM AND ITS CONTRIBUTIONA STUDY ON GUJARAT TOURISM AND ITS CONTRIBUTION
A STUDY ON GUJARAT TOURISM AND ITS CONTRIBUTIONViral Mansukh Meghpara
 
Setting up Your Staff and Volunteers for Success
Setting up Your Staff and Volunteers for SuccessSetting up Your Staff and Volunteers for Success
Setting up Your Staff and Volunteers for SuccessAudienceView
 
Crear un correcto documento de word
Crear un correcto documento de wordCrear un correcto documento de word
Crear un correcto documento de wordRegina Peña
 
Dispositivos para crear redes
Dispositivos para crear redesDispositivos para crear redes
Dispositivos para crear redesmarabunta12
 
Permainan Teka-teki (ICE BREAKING)
Permainan Teka-teki (ICE BREAKING)Permainan Teka-teki (ICE BREAKING)
Permainan Teka-teki (ICE BREAKING)Ghian Velina
 

Destacado (12)

About me presentation
About me presentationAbout me presentation
About me presentation
 
CV
CVCV
CV
 
Guía de lectura del libro "Evoluciona o Muere"
Guía de lectura del libro "Evoluciona o Muere"Guía de lectura del libro "Evoluciona o Muere"
Guía de lectura del libro "Evoluciona o Muere"
 
8 april bt(print) new window opens for sm_es as e-commerce thrives paypal
8 april bt(print) new window opens for sm_es as e-commerce thrives paypal8 april bt(print) new window opens for sm_es as e-commerce thrives paypal
8 april bt(print) new window opens for sm_es as e-commerce thrives paypal
 
Madan Resume
Madan ResumeMadan Resume
Madan Resume
 
Itsemääräämisoikeus
ItsemääräämisoikeusItsemääräämisoikeus
Itsemääräämisoikeus
 
A STUDY ON GUJARAT TOURISM AND ITS CONTRIBUTION
A STUDY ON GUJARAT TOURISM AND ITS CONTRIBUTIONA STUDY ON GUJARAT TOURISM AND ITS CONTRIBUTION
A STUDY ON GUJARAT TOURISM AND ITS CONTRIBUTION
 
Cinta Dalam Diam
Cinta Dalam DiamCinta Dalam Diam
Cinta Dalam Diam
 
Setting up Your Staff and Volunteers for Success
Setting up Your Staff and Volunteers for SuccessSetting up Your Staff and Volunteers for Success
Setting up Your Staff and Volunteers for Success
 
Crear un correcto documento de word
Crear un correcto documento de wordCrear un correcto documento de word
Crear un correcto documento de word
 
Dispositivos para crear redes
Dispositivos para crear redesDispositivos para crear redes
Dispositivos para crear redes
 
Permainan Teka-teki (ICE BREAKING)
Permainan Teka-teki (ICE BREAKING)Permainan Teka-teki (ICE BREAKING)
Permainan Teka-teki (ICE BREAKING)
 

Similar a 24091_AFRL_ROI_WP_r02

Cisco Secure Enclaves Architecture
Cisco Secure Enclaves ArchitectureCisco Secure Enclaves Architecture
Cisco Secure Enclaves ArchitectureCisco Russia
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming SecurityPCM
 
Design-Guide-to-Run-VMware-NSX-with-Cisco-ACI-white-paper.pdf
Design-Guide-to-Run-VMware-NSX-with-Cisco-ACI-white-paper.pdfDesign-Guide-to-Run-VMware-NSX-with-Cisco-ACI-white-paper.pdf
Design-Guide-to-Run-VMware-NSX-with-Cisco-ACI-white-paper.pdfssuserc6aaff
 
Private sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesPrivate sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesOllie Whitehouse
 
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...IJERA Editor
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420Steve Goeringer
 
Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services IntroCruatech
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresMohammed Saqib
 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage1crore projects
 
New Threat Trends in CII(Critical Information Infrastructure)
New Threat Trends in CII(Critical Information Infrastructure)New Threat Trends in CII(Critical Information Infrastructure)
New Threat Trends in CII(Critical Information Infrastructure)Seungjoo Kim
 
A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...Amber Wheeler
 
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...IRJET Journal
 
A secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOpsA secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOpsnooriasukmaningtyas
 
Recapitulation Workshop Cloud Reliability Resilience 2016
Recapitulation Workshop Cloud Reliability Resilience 2016Recapitulation Workshop Cloud Reliability Resilience 2016
Recapitulation Workshop Cloud Reliability Resilience 2016Jorge Cardoso
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTUREacijjournal
 
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...IJECEIAES
 
NEC UNIVERGE BLUE BACKUP
NEC UNIVERGE BLUE BACKUPNEC UNIVERGE BLUE BACKUP
NEC UNIVERGE BLUE BACKUPInteractiveNEC
 
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVERNEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVERInteractiveNEC
 
User Authentication Technique for Office Environment
User Authentication Technique for Office EnvironmentUser Authentication Technique for Office Environment
User Authentication Technique for Office EnvironmentIRJET Journal
 

Similar a 24091_AFRL_ROI_WP_r02 (20)

Cisco Secure Enclaves Architecture
Cisco Secure Enclaves ArchitectureCisco Secure Enclaves Architecture
Cisco Secure Enclaves Architecture
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security
 
Design-Guide-to-Run-VMware-NSX-with-Cisco-ACI-white-paper.pdf
Design-Guide-to-Run-VMware-NSX-with-Cisco-ACI-white-paper.pdfDesign-Guide-to-Run-VMware-NSX-with-Cisco-ACI-white-paper.pdf
Design-Guide-to-Run-VMware-NSX-with-Cisco-ACI-white-paper.pdf
 
Private sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesPrivate sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodes
 
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
 
Intercloud_Fabric
Intercloud_FabricIntercloud_Fabric
Intercloud_Fabric
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420
 
Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services Intro
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
 
New Threat Trends in CII(Critical Information Infrastructure)
New Threat Trends in CII(Critical Information Infrastructure)New Threat Trends in CII(Critical Information Infrastructure)
New Threat Trends in CII(Critical Information Infrastructure)
 
A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...
 
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
 
A secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOpsA secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOps
 
Recapitulation Workshop Cloud Reliability Resilience 2016
Recapitulation Workshop Cloud Reliability Resilience 2016Recapitulation Workshop Cloud Reliability Resilience 2016
Recapitulation Workshop Cloud Reliability Resilience 2016
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...
 
NEC UNIVERGE BLUE BACKUP
NEC UNIVERGE BLUE BACKUPNEC UNIVERGE BLUE BACKUP
NEC UNIVERGE BLUE BACKUP
 
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVERNEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
 
User Authentication Technique for Office Environment
User Authentication Technique for Office EnvironmentUser Authentication Technique for Office Environment
User Authentication Technique for Office Environment
 

Más de Manoj Punamia

Reticle Inspection Diagram
Reticle Inspection DiagramReticle Inspection Diagram
Reticle Inspection DiagramManoj Punamia
 
CXI-SoftwareDevelopmentBonusAward-2
CXI-SoftwareDevelopmentBonusAward-2CXI-SoftwareDevelopmentBonusAward-2
CXI-SoftwareDevelopmentBonusAward-2Manoj Punamia
 
RecommendationLetter-JamesCGreen
RecommendationLetter-JamesCGreenRecommendationLetter-JamesCGreen
RecommendationLetter-JamesCGreenManoj Punamia
 
Developing-IoT-Solutions
Developing-IoT-SolutionsDeveloping-IoT-Solutions
Developing-IoT-SolutionsManoj Punamia
 
Reducing tco white paper rev5
Reducing tco white paper rev5Reducing tco white paper rev5
Reducing tco white paper rev5Manoj Punamia
 
325711-001US-secured-old
325711-001US-secured-old325711-001US-secured-old
325711-001US-secured-oldManoj Punamia
 
328491-PCI-dss white paper
328491-PCI-dss white paper328491-PCI-dss white paper
328491-PCI-dss white paperManoj Punamia
 

Más de Manoj Punamia (7)

Reticle Inspection Diagram
Reticle Inspection DiagramReticle Inspection Diagram
Reticle Inspection Diagram
 
CXI-SoftwareDevelopmentBonusAward-2
CXI-SoftwareDevelopmentBonusAward-2CXI-SoftwareDevelopmentBonusAward-2
CXI-SoftwareDevelopmentBonusAward-2
 
RecommendationLetter-JamesCGreen
RecommendationLetter-JamesCGreenRecommendationLetter-JamesCGreen
RecommendationLetter-JamesCGreen
 
Developing-IoT-Solutions
Developing-IoT-SolutionsDeveloping-IoT-Solutions
Developing-IoT-Solutions
 
Reducing tco white paper rev5
Reducing tco white paper rev5Reducing tco white paper rev5
Reducing tco white paper rev5
 
325711-001US-secured-old
325711-001US-secured-old325711-001US-secured-old
325711-001US-secured-old
 
328491-PCI-dss white paper
328491-PCI-dss white paper328491-PCI-dss white paper
328491-PCI-dss white paper
 

24091_AFRL_ROI_WP_r02

  • 1. SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications SecureView provides accredited cross-domain security, delivers the performance for advanced collaboration, and is estimated to reduce total cost of ownership (TCO) by up to 67 percent over single-domain architectures and 45 percent over an alternative thin-client, multi-domain architecture with results normalized to a four-year refresh cycle. The SecureView solution is the result of close collaboration among the US Air Force Research Laboratory, Intel and Citrix, and uses Citrix XenClient™ XTand Intel® vPro™ technology. Authors: Dr. Ryan J. Durante, DR-III, DAFC Mr. John C. Woodruff, DR-III, DAFC Cross-Domain Solutions and Innovation Air Force Research Laboratory Information Directorate United States Air Force White Paper
  • 2. White Paper: SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications 2 Table of Contents Executive Summary.................................................................................................................... 3 Developing SecureView............................................................................................................. 4 SecureView Technology Overview............................................................................................ 5 Comparing the Total Costs of Four Deployment Models......................................................... 5 Environment 1.............................................................................................................................. 6 Environment 2.............................................................................................................................. 6 Environment 3.............................................................................................................................. 7 Environment 4.............................................................................................................................. 7 Cross-Domain Platform TCO Summary..................................................................................... 8 Deployment Costs: Hardware..................................................................................................... 8 Deployment Costs: Implementation, Training and Application Porting/Replacement......... 9 Annual Power Costs..................................................................................................................... 9 Annual Management Costs......................................................................................................... 9 Productivity Losses.................................................................................................................... 10 Security Benefits........................................................................................................................ 10 Conclusion.................................................................................................................................11
  • 3. White Paper: SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications 3 Performance and Responsiveness. SecureView can run on commercially available PCs, laptops or tablets with Intel® Core™ vPro™ technology-based processors with Intel® Inte- grated Graphics. This supports mission effectiveness by enabling analysts and other users the performance to run geographic information systems (GIS), multi-party High Definition , videoconferencing, and other performance- intensive applications that are essential to modern analysis and collaboration. SecureView’s client-side intelligent virtual- ization and local execution avoid the performance degrada- tions of network latency often encountered with server-side virtualization. SecureView not only provides a consistently responsive end-user experience but also offers flexibility for sites and users that need the flexibility of mobile computing; allowing users to work productively even when persistent network connectivity is lacking.The net result is demonstrable improvements to user productivity. Costs. SecureView reduces the traditional need for each user to have separate workstations for each security level. As a client-hosted virtualization (CHV) solution, it doesn’t require the network and back-end build-out often necessary with server-hosted virtualization (SHV) approaches running on thin-clients. AFRL applied their direct experience in consulta- tion with industry counterparts to conduct a detailed analysis of the TCO to deploy, manage, and support SecureView and three common deployment models. The data provided is verified by AFRL where available and based on conventional industry benchmark data otherwise. The concluding analysis estimates that SecureView reduces annual total (capital and operational) costs by up to 67 percent compared to single- domain architectures and up to 45 percent over a widely deployed thin-client, multi-domain architecture. The study shows that a site deploying SecureView to 10,000 users over a four-year period achieves cost savings of up to: • $63.53 millioncompared to a traditional environment with independent security levels and three PCs per user (Environment 1) • $73.79 million compared to a deployment with single-level security using two thin-clients and one PC (Environment 2) • $29.85 million comparedto a multi-level security solution with one thin-client (Environment 3)3 Executive Summary Data access and information-sharing strategies for the most sensitive communities within the US Government must provide affordability without compromising the most stringent require- ments for data security and operational efficiency. In a security environment marked by increasing sophistication and persis- tent threats, the Office of the Director of National Intelligence (ODNI) asked the US Air Force Research Laboratory (AFRL) to lead the development of a solution. AFRL engaged in a technical collaboration with Intel and Citrix resulting in Secure- View, a government solution that expands on commercial off-the-shelf (COTS) capabilities in Citrix XenClient™ and Intel® Core™ i5 and i7 vPro™ processors. SecureView has been deployed at more than one dozen federal agencies and has saved the government millions of dollars in development and TCO expenses. The solution is less vulnerable to modification or corruption than traditional soft- ware-based security solutions and provides unprecedented performance for mission-critical collaboration and media- intensive use cases than alternate hardware configurations. As a hardened client-hosted virtualization (CHV) solution, SecureView enables independent, concurrent access to multi- ple security domains. It provides performance that is inde- pendent of network bandwidth and server contention issues, providing analysts with consistent responsiveness for visu- ally intensive analysis and collaboration. SecureView is NIST 800-53 certified as High in both Confidentiality and Integrity, and Medium in availability. On August 25, 2011, SecureView received Authority to Operate (ATO) accreditation from the ODNI. It has been deployed to users at more than one dozen federal agencies as of November 2012, and is supported on several Dell and HP desktop and numerous laptop models. SecureView significantly improves all three vectors of secu- rity, performance, and cost as compared to both legacy and contemporary alternatives: Security. Using hardware-assisted virtualization and security technologies built into select Intel® processors and chipsets, SecureView is less vulnerable to modification or corruption than traditional software-based security solutions. Secure- View’s advanced isolation provides the ability to run multiple securely isolated environments on a single PC. It includes a hardware-assisted trusted boot that verifies the integrity of the virtual desktop at launch, as well as hardware-assisted, accelerated disk encryption.
  • 4. White Paper: SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications 4 Developing SecureView The 9/11 Commission highlighted the critical importance of collaboration to enable intelligence analysts to accurately and fully assess threats and share their findings across agencies to help prevent attacks. They must do this in a world where cyber-espionage, cyber-criminals, and cyber-terrorists pose an ever-increasing threat. A serious security breach to the intelligence and broader government community can do seri- ous harm to the nation’s well-being, as well as confidence in the technology infrastructure. Groups with responsibility for developing secure, cost-effective and powerful client environments for defense analysis have tried a number of approaches, but each presented problems that have become widely recognized.4 Traditionally, analysts used a separate PC for each security domain they needed access to (e.g., secret or top secret). This approach was expen- sive to implement and support, as well as cumbersome and inconvenient for end-users. The emergence of thin-clients and desktop virtualization increased manageability and, in some cases, made it possible to provide users the convenience of a single client system. However, with workloads running on back-end servers, deployment requires costly data center build-out for servers, networks, and storage. Even with these infrastructure investments performance has often been found to be inadequate for modern visually based applications. The result has been a poor user experience that reduces analysts’ productivity and impacts their effectiveness in using modern, visually based applications. Figure 1. SecureView annual TCO. Other environments are 176 percent, 205 percent, and 83 percent higher, respectively, than the SecureView baseline (Environment 4). Results are derived from a detailed spreadsheet resulting from the TCO analysis conducted by AFRL in consultation with industry experts. 100% 200% 300% 350% 0% SecureView Annual TCO Compared to Other Architectures 176% higher cost 205% higher cost 83% higher cost 0% higher cost Environment 1 Single-level security, three PCs Environment 2 Single-level security, one PC and two thin clients Environment 3 Multi-level security, one thin client Environment 4 Multi-level security, one PC with Intel® Core™ vPro™ technology and Citrix Xen Client XT % Higher Annual TCO Compare to SecureView Baseline SecureView AFRL developed SecureView in response to a direct request from the Deputy Director for Information Assurance of the ODNI.ODNI requested the development of a secure, robust workstation that would support high-performance applica- tions and provide independent and concurrent access to multiple security domains from a single client system. ODNI specified that the solution handle highly sensitive/secure infor- mation with zero tolerance for data exfiltration, be deploy- able with minimal impact to the host agency, and be capable of provisioning within four hours. ODNI wanted the solution within 10 months, requiring rapid development and delivery of an innovative solution. AFRL evaluated more than a dozen solutions, and established collaboration with Citrix and Intel to enhance and utilize Citrix XenClient software, which uses hardware security capabilities that Intel has built into its Intel vPro technology-based proces- sors. AFRL used Citrix XenClient XT, a commercial off-the-shelf (COTS) solution which had been modified and enhanced with government-specified capabilities. The team added further government off-the-shelf (GOTS) enhancements to XenClient XT to produce the government solution called SecureView. XenClient and XenClient XT derive from the Xen.org Open Source Development Community, a widely used and well- tested open source operating system that runs an estimated 80 percent of the public infrastructure cloud.
  • 5. White Paper: SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications 5 SecureView Technology Overview SecureView’s technology foundation is Intel vPro technology and Citrix XenClient XT—technologies that efficiently combine hardware and software to improve security, manageability, and performance of the client computing environment. Secure- View is a flexible virtualization solution that runs on clients in either client-hosted or server-hosted modes of operation. Server-hosted modes use a thin virtual machine (VM), with a minimal operating system running on the client and applica- tions executing on server infrastructure within the environ- ment. In client-hosted modes, the end point operates a full operating system and applications execution within virtual containers. This TCO study assumes client-hosted operation for SecureView. SecureView provides integrated, hardware-based functional- ity that supports multiple operating system environments and security domains on each end-user PC desktop or notebook via virtual containers. These capabilities are supported by Intel® Virtualization Technology (Intel® VT)and provide safe- guards, via Intel® Trusted Execution Technology (Intel® TXT) to protect each virtual environment from malware contamination. Intel® Advanced Encryption Standard New Instructions (Intel® AES-NI)accelerates disk encryption. These hardware-aided security technologies render SecureView clients inherently less vulnerable than traditional software-only approaches. Additionally, new integrated graphics capabilities improve handling of high-resolution imagery and 3D graphics. SecureView implements a true Type 1 “bare metal” client hypervisor to provide robust data and computer resource isolation by using Intel vPro technology and XenClient XT. SecureView provides hardware-assisted trusted boot, main- tains isolation between multiple independent virtual machines (VMs), and verifies the integrity of the client at launch. The trusted computing base configuration state is measured, encrypted, and the measurements are sealed at installation. Upon subsequent system start, the computing base is re-measured and the encryption keys are unsealed only if they match the appropriate cryptographic response from a trusted platform module (TPM). XenClient XT Synchronizer™ enables SecureView to download centrally managed virtual desktops. Using Synchronizer, IT can centrally back up user data through a secure connection whenever the user connects to the network, define security policies for managed devices, disable XenClient PCs, and restore a user’s virtual desktop on any XenClient-based device. Comparing the Total Costs of Four Deployment Models SecureView was developed to harden security within the intelligence community and increase analysts’ effectiveness by improving their ability to use visually rich graphics, media, and collaboration tools.SecureView also delivers significant savings in both operational and capital expenses compared to prevalent alternative approaches. To assess these savings, AFRL compared SecureView’s operational costs to those of three other client computing environments, reflecting the evolution of government agencies’ approaches to providing access to multiple security levels. To develop the analysis, AFRL worked closely with a business value analyst from Intel, and used a comprehensive client- compute TCO model that has been applied in a range of business and government environments.The analysis uses data from actual deployments at AFRL where such data was avail- able, and used respected sources of industry data, such as Prin- cipled Technologies’ TCO Calculator, when it was not.The study assumes that SecureView is deployed in a client-hosted mode. The analysis calculates the costs to deploy and support 10,000 users for government environments which commonly use either desktop PCs over a life cycle of four years, and/or thin-client, server-hosted client environments with six-year life cycles. This comprehensive view includes the necessary build- out costs for client, server, network and other hardware over the entire life cycle. It considers power costs, the costs of pre-deployment preparation, deployment, and ongoing management costs over the upgrade cycle. The analysis also factors in user productivity impacts for each solution. The analysis compared SecureView to two traditional, segre- gated architectures, where users have a separate client system for each security level, and a third, contemporary approach which provides comparable domain segregation. These archi- tectures are more fully described on following page. SecureView Architecture Intel® vPro™ Hardware XenClient XT User VM VT-D SE Linux TXT AES NIVT-X User VM Service VMs SE Linux SE Linux SE Linux Xen Security Modules Control Domain XenClient XenClient XT Unique Receiver forXC Network Isolation VPN Isolation Policy Granularity Policy Granularity Figure 2. SecureView technology architecture
  • 6. White Paper: SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications 6 Environment 1 Traditional single-level security environment with typically managed rich desktops. Each user has a separate PC, moni- tor, and network connection to back-end infrastructure for multiple security domains (e.g., secret, top secret, and one or more coalition domains). The TCO analysis assumed a four- year upgrade cycle for this model. Environment 2 Single-level security environment, thick and thin-clients. Again, the user has a separate client system for each security domain, but some domains are accessed via thin-clients, with access servers providing a portal to back-end infrastructure for each client. Applications on Domain A typically run on the PC, to facilitate performance-sensitive applications. Environment 2 has an assumed upgrade cycle of six years. Figure 4. Environment 2. Single-level security, one PC and two thin clients. Figure 3. Environment 1. Single-level security, three PCs. Environment 1 Domain A Network Storage with Network Services Workstation 1 Domain B Network Storage with Network ServicesWorkstation 2 Domain C Network Storage with Network ServicesWorkstation 3 Environment 2 Domain A Network Storage with Network Services Workstation 1 Network Storage with Network Services Domain B Access Servers Thin Client 1 Domain C Access Servers Network Storage with Network Services Thin Client 2
  • 7. White Paper: SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications 7 Environment 3 Multi-level secure environment with a single thin-client and session (access servers) to provide concurrent connections to all three security levels. The analysis uses data from a commonly deployed, multi-level thin-client environment for this model. The assumed upgrade cycle for Environment 3 is six years. Figure 5. Environment 3. Multi-level security, one thin client. Environment 4 SecureView multi-level secure environment with a single intel- ligent, virtualized PC running Citrix XenClient XT and powered by Intel Core vPro processors providing concurrent, indepen- dent access to all three domains. The assumed upgrade cycle is four years. Figure 6. Environment 4. SecureView: Multi-level security, one PC with Intel® Core™ vPro™ technology and Citrix XenClient XT. Environment 3 Domain A Network Storage with Network Services Domain B User Session Servers User Desktop Thin Domain C Environment 4 Domain A Network Storage with Network Services SecureView vPro Workstation Network Storage with Network Services Domain B Domain C Standard COTS VPN Concentrator(s) Single Encrypted “Grey Wire” to Workstation Network Storage with Network Services
  • 8. White Paper: SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications 8 Cross-Domain Platform TCO Summary Table 1 summarizes the cross-domain platform TCO for a deploy- ment of 10,000 seats. It is followed by a brief discussion of the analysis and some of the major assumptions made. Figure 7 summarizes annual TCO including productivity savings. Deployment Costs: Hardware As expected, the acquisition cost for SecureView PCs is higher than that of thin-clients: $13.39 million for 10,000 PCs to $12.07 million for 10,000 thin-clients. However, these acquisition costs are more than offset by the added costs of server and network infrastructure build-out, among other issues. Server and network infrastructure add significant costs to the deployment of thin-client models.Thin-clients require serv- ers to provide access/presentation services, as well as, server infrastructure to run the server-hosted applications. The analy- sis calculates the clients supported per server based on AFRL’s experiences, and lab tests funded by Intel and conducted by Principled Technologies. The analysis details the combined costs for access infrastructure servers for the two thin-client scenarios (Environments 2 and 3), session servers for the multi-security level thin-client scenario (Environment 3), and management servers for all four environments constitutethe server deployment costs shown in Table 2. Figure 7. Annual TCO including productivity costs for 10,000 users.11 Table 1. Cross-Domain Platform TCO Summary for a 10,000 Seat Deployment** Siloed Domain Access, Single-Level Concurrent Multi-Domain Access, Multi-Level Client Compute Platform Single-Domain, 3 Desktops Environment 1 Single-Domain, 2 Thin- clients + 1 Desktop Environment 2 Multi-Domain, 1 Thin-client Environment 3 SecureView: Multi- Domain, 1 vPro PC Environment 4 TCO Summary Including Lost Productivity Costs Annual costs per client $2,489 $2,745 $1,647 $901 TCO per client for the upgrade cycle $9,956 $16,472 $9,881 $3,602 TCO for all clients for the upgrade cycle $99,560,000 $164,720,000 $98,810,000 $36,023,000 TCO per year for all clients $24,890,000 $27,450.000 $16,470,000 $9,006,000 TCO Summary Excluding Lost Productivity Annual costs per client $2,489 $2,383 $1,103 $901 TCO per client for the upgrade cycle $9,956 $14,297 $6,617 $3,602 TCO for all clients for the upgrade cycle $99,560,000 $142,970,000 $66,174,000 $36,023,000 TCO per year for all clients $24,890,000 $23,830,000 $11,029,000 $9,006,000 Annual Cost Breakdown One year annualized deployment cost $9,466,000 $9,808,000 $6,644,000 $4,171,000 Power per year $884,000 $951,000 $386,000 $295,000 Manageability per year $14,538,000 $13,068,000 $3,999,000 $4,540,000 Productivity lost per year $0 $3,626,000 $5,439,000 $0 Total $24,888,000 $27,453,000 $16,468,000 $9,006,000 TCO Breakdown One-time deployment costs $37,870,000 $58,850,000 $39,870,000 $16,690,000 Power for the entire upgrade cycle $3,540,000 $5,710,000 $2,310,000 $1,180,000 Manageability for the entire upgrade cycle $58,150,000 $78,410,000 $23,990,000 $18,160,000 Productivity lost for the entire upgrade cycle $0 $21,760,000 $32,630,000 $0 Total $99,560,000 $164,730,000 $98,800,000 $36,030,000 **Table is drawn from a detailed spreadsheet resulting from the TCO analysis conducted by AFRL in consultation with industry experts. Data for Environments 1 and 2 are largely based on industry data sources. Key assumptions for Environments 3 and 4 are drawn from common industry data sources, such as Principled Technologies’ TCO Calculator, when actual data was not available.Key assumptions in the analysis include: SecureView deployment in a thick mode of operation; users wages are assumed to be $41 per hour, IT wages are assumed to be $63 per hour; client power state assumes 8 hours.10 On and 16 hours standby per workday; cooling power is assumed to be 1 W per system watt; power cost is assumed to be $0.1 per kWh; annual client management activities are assumed to consist of 12 asset inventories, 14 patch installations, and 5 helpdesk calls per client. 30 25 20 15 10 5 0 Environment 1 Single-level security, three PCs Environment 2 Single-level security, one PC and two thin clients Environment 3 Multi-level security, one thin client Environment 4 Multi-level security, one PC with Intel® Core™ vPro™ technology and Citrix Xen Client XT Productivity lost per year Manageability per year Power per year $MILLIONS Annual TCO Including Productivity Costs One year's annualized deployment cost
  • 9. White Paper: SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications 9 Annual Power Costs The analysis factors in the costs of power consumption and cooling for PCs, thin-clients and monitors, as well as for serv- ers required to support the client environments. The single- domain, three-PC environment modeled (Environment 1) had recently replaced its PCs. Environments with older PCs would see greater energy savings from refreshing their PCs and deploying SecureView, since new PCs consume significantly less power than older ones. The study assumed three monitors per user for the single-domain implementations (Environments 1 and 2), and two monitors each for the two multi-domain implementations (Environments 3 and 4). Table 5 shows that SecureView is the most energy-efficient of the four solutions with the lowest expenditures on power. Annual Management Costs Client management tasks are assumed to consist of 12 asset inventories, 14 patch installations, and 5 helpdesk calls per client per year. Table 2. Hardware Deployment Costs Summary for 10,000 Users Single-Domain, 3 Desktops Single-Domain, 2 Thin, 1 PC Multi-Domain, 1 Thin SecureView** Server deployment costs $3,240,000 $7,870,000 $12,210,000 $1,080,000 Desktop and thin-client costs $31,880,000 $30,800,000 $12,070,000 $13,390,000 Network cost (client port, VPN) $3,750,000 $3,750,000 $1,250,000 $1,280,000 Total hardware deployment costs $38,870,000 $ 42,420,000 $25,530,000 $15,750,000 **Table is drawn from a detailed spreadsheet resulting from the TCO analysis conducted by AFRL in consultation with industry experts. Table 3. Data Center Costs for the Entire Upgrade Cycle for 10,000 Users Single-Domain, 3 Desktops Single-Domain, 2 Thin, 1 PC Multi-Domain, 1 Thin SecureView** Construction costs $40,000 $353,000 $600,000 $13,000 Port costs $130,000 $1,145,000 $1,944,000 $43,000 Wiring costs $7,000 $64,000 $108,000 $2,000 Total data center costs $177,000 $1,562,000 $2,652,000 $58,000 **Table is drawn from a detailed spreadsheet resulting from the TCO analysis conducted by AFRL in consultation with industry experts. Note that the cost of server power is a recurring cost and is included in the annual power cost shown in Table 5. Data center build-out factors to support the server infrastruc- ture for all four deployment environments are also factored into overall deployment costs, and shown in Table 3. It should be noted that the analysis did not consider the fact that Environments 2 and 3 introduce the server as a single point of failure for multiple clients, since one server typically takes on the entire processing load of multiple clients. This risk can be mitigated through server and network redundancy, but this would further increase capital expenses and complexity of thin-client supporting infrastructure. Deployment Costs: Implementation, Training and Application Porting/Replacement In AFRL’s experience, SecureView is a dramatically easier and faster approach to analyze, define, and validate requirements, and therefore, a superior implementation solution for cross- domain security than either of the thin-client-based environ- ments. At the same time, it is also the most cost-effective approach. The savings in Table 4 reflect roughly a tenfold difference in the costs of implementation and porting or replacing applications.
  • 10. White Paper: SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications 10 Productivity Losses Productivity analysis is based on lab tests conducted by Principled Technologies, assuming a user wage is $41 per hour and an IT wage of $63 per hour. The analysis estimated conservatively that users in these multi-level security, thin- client scenarios (Environments 2 and 3) would lose 3.25 minutes each day on each of their thin-clients due to server or network congestion. This results in a daily loss of $22,000 of user productivity across 10,000 users or $5.439 million annually for the multi-domain solution with a single thin-client (Environ- ment 3). Environment 2, with a single PC and two thin-clients, results in annual lost productivity of $3.626 million. Note that the summary table reports the TCO results both with and with- out these productivity costs included. The study assumed the cost and performance of common application or resource servers, such as those providing file, e-mail, database, Web services, and network services such as Active Directory and Domain Name System (DNS) hosting, would be uniform across all environments. Therefore, these were not included in the TCO analysis. Table 4. Implementation, Training and Application Porting/Replacement Costs for 10,000 Users** Single-Domain, 3 Desktops Single-Domain, 2 Thin, 1 PC Multi-Domain, 1 Thin SecureView** Implementation costs $34,000 $498,000 $464,000 $50,000 Training costs $0 $1,550,000 $1,600,000 $1,211,000 Application porting and replacement costs $38,000 $3,546,000 $3,508,000 $38,000 ** Table is drawn from a detailed spreadsheet resulting from the TCO analysis conducted by AFRL in consultation with industry experts. Table 5. Power Costs per Year for 10,000 Users** Single-Domain, 3 Desktops Single-Domain, 2 Thin, 1 PC Multi-Domain, 1 Thin SecureView** Total power consumed (kWh) 8,844,000 9,514,000 3,856,000 2,948,000 Cost of power $884,400 $951,400 $385,600 $294,800 ** Table is drawn from a detailed spreadsheet resulting from the TCO analysis conducted by AFRL in consultation withindustry experts.Client power state assumes 8 hours on and 16 hours Standby per workday. Cooling power is assumed to be 1 W per system watt. Power cost is assumed to be $0.1 per kWh. Table 6. Total Management Costs per Year** Single-Domain, 3 Desktops Single-Domain, 2 Thin, 1 PC Multi-Domain, 1 Thin SecureView** Total manageability costs $14,538,000 $13,068,000 $3,999,000 $4,540,000 ** Table is drawn from a detailed spreadsheet resulting from the TCO analysis conducted by AFRL in consultation withindustry experts. Security Benefits SecureView’s most important benefits did not lend themselves to inclusion in the analysis. Specifically, there is no quantifica- tion of the increase in information security provided by the SecureView technologies or any attempt to monetize the cost of a potential breach in information security. However, it is worth noting that Ponemon Institute estimates the organiza- tional cost of a single data breach at $5.5 million.12 Given the sensitivity of the information that SecureView users work with, the cost of a security breach could be literally incalculable. Given that SecureView’s landmark utilization of hardware- assisted security is intrinsically less vulnerable to modification or corruption than alternative, software-only solutions, there is additional, critical intrinsic value of risk reduction from data exfiltration and infiltration.
  • 11. White Paper: SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications 11 Conclusion SecureView provides independent, concurrent access to multiple security domains from a single client platform, which is vital to the nation’s security.The architecture establishes a new best-of-breed baseline in meeting the US Government’s requirements for a secure data analysis and collaboration environment that is robust, affordable, easily deployablein multiple client configurationsand supportsmission effec- tiveness by enabling analysts to run the latest visually based software tools without sacrificing user experience. With its flexible architecture and foundation in COTS technol- ogies, SecureView is a readily deployable solution that enables agencies to achieve the cost and manageability benefits of modern desktop virtualization while increasing the security of the information infrastructure. It provides the flexibility of a server-hosted or a lower-cost client-hosted mode of opera- tion, and offers straightforward ways for organizations to add security domains as project requirements change. In addition, SecureView is not a closed proprietary solution—it is based on Xen open source hypervisor and COTS hardware technologies that are easily accessible and affordable to acquire by govern- ment and private sector enterprises. SecureView not only provides the convenience of multi- domain access from a single client without performance compromises, but it is also distinguished from alternate approaches by setting a precedent inextending the secure multi-domain access boundary to mainstream mobile use environments. Its availability on Intel Core vPro processor- based notebook computers, along with an increasing variety of cutting-edge business Ultrabooks™ and tablets, enables security-sensitive users the flexibility to function in a wider range of settings, including those where a persistent network connection is unavailable. The project execution of AFRL, Intel and Citrix is an excellent example of effective government/industry collaboration. The commitment and teamwork coupled with the use of robust COTS technologies enabled AFRL to meet ODNI’s request within months and deliver a solution that enhances the security of some of the nation’s most critical information infrastructure and assets. SecureView not only improves the productivity and effectiveness of intelligence analysts and other key users by enabling them to better support their organization mission, it does so with dramatic cost savings.
  • 12. 1 For an overview of Citrix XenClient XT, see: http://www.citrix.com/products/xenclient/features/editions/xt.html. 2 An overview of Intel vPro Technology is at: http://www.intel.com/content/www/us/en/architecture-and-technology/vpro/vpro-technology-general.html. Intel® vPro™ technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software, and IT environment. To learn more, visit http://www.intel.com/technology/vpro. 3 Results are derived from a detailed spreadsheet which captured the TCO analysis conducted by AFRL in consultation with industry experts.All results were normalized to a four-year life cycle. 4 For a discussion of the intelligence community’s need for hardware-based information security, see, Michael Mestrovich, Implementing New Hardware-Based Information Security Capabilities, 26 October 2010: http://www.intel.com/Assets/PDF/whitepaper/itc-snb_hardware_security_capabilities.pdf. 5 Intel® Virtualization Technology (Intel® VT) requires a computer system with an enabled Intel processor, BIOS, and virtual machine monitor (VMM). Functionality, performance, or other benefits will vary depending on hardware and software configurations. . Consult your system manufacturer.For more information, visit http://www.intel.com/go/virtualization. 6 Intel® Trusted Execution Technology (Intel® TXT). No computer system can provide absolute security under all conditions. Intel TXT) requires a computer with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE).Intel TXT also requires the system to contain a TPM v1.For more information, visit http://www.intel.com/technology/security. 7 Intel® Advanced Encryption Standard New Instructions (Intel® AES-NI) requires a computer system with an AES-NI enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. AES-NI is available on select Intel® processors. For availability, consult your reseller or system manufacturer.For more information, see http://software. intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/. 8 Intel disclaims any responsibility or liability for any errors or inaccuracies that may appear in the model or which may have occurred in the underlying assumptions used to create the analysis discussed in this paper. 9 For a whitepaper by Principled Technologies, seehttp://www.principledtechnologies.com/clients/reports/Intel/CompModelsTCO1107.pdf . The TCO Calculator is at http://www.principledtechnologies.com/Clients/Reports/Intel/ComputeModelTCOCalc1107.xls. 10 For a whitepaper by Principled Technologies, seehttp://www.principledtechnologies.com/clients/reports/Intel/CompModelsTCO1107.pdf . The TCO Calculator is at http://www.principledtechnologies.com/Clients/Reports/Intel/ComputeModelTCOCalc1107.xls. The TCO Calculator was developed with funding support from Intel Corporation. 11 Chart is derived from a detailed spreadsheet developed as part of the TCO analysis conducted by AFRL in consultation with industry experts. 12 2011 Cost of Data Breach Study: United States. Benchmark Research Conducted by Ponemon Institute, March 2012. Copyright © 2012 Intel Corporation. All rights reserved. Intel, Core, vPro, and Ultrabook are trademarks of Intel Corporation in the U.S. and other countries. Copyright © 2012 Citrix Systems Inc. All rights reserved. Citrix and XenClient are trademarks of Citrix Systems Inc. *Other names and brands may be claimed as the property of others. Printed in the USA 1112/WS/OCG/XX/PDF Please Recycle 328282-001US