Unisys Stealth Black

1,789 views
1,703 views

Published on

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,789
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
30
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Unisys Stealth Black

  1. 1. Unisys STEALTH solution for data security AFCEA Sofia Chapter Conference Sofia, 18 May 2011
  2. 2. Unisys STEALTH solution for data securityContent:1. Introduction2. Description3. Implementation4. Certificate5. Conclusion NSA Awards Unisys Stealth EAL-4
  3. 3. Unisys STEALTH solution for data security1. Introduction The Unisys Stealth Solution is a transformational way to protect your network data. It starts by using certified encryption, then bit- splits data into multiple slices as it moves through the network. But more than that, the Stealth Solution allows multiple communities of interest to share the same network without fear of another group accessing their data or even their workstations and servers. The result is a much simpler network infrastructure, increased agility to react to new opportunities, and enhanced security of your network data. NSA Awards Unisys Stealth EAL-4
  4. 4. Unisys STEALTH solution for data security1. Introduction To deliver the right information to the right people at the right time, defense agencies need to overcome the challenge of securing a collaborative environment. There are, however, inhibitors to achieving this vision. Many defense agencies have specific regulations for multi-level security. They have environments across the world where the networks are often unpredictable and at times unreliable. NSA Awards Unisys Stealth EAL-4
  5. 5. Unisys STEALTH solution for data security1. Introduction As a result, defense agencies are forced to field multiple independent global and regional networks to provide services to individuals who need access to controlled unclassified information (CUI), secret, and top-secret data. Access to more than one of these networks requires multiple LANs and PCs for the user. Simultaneously, the demand is growing to share information across these networks NSA Awards Unisys Stealth EAL-4
  6. 6. Unisys STEALTH solution for data security1. Introduction Physical security, such as maintaining separate LANs, is one way defense agencies are securing data. By keeping the data physically separated, certain security objectives can be achieved, but at what cost? There are challenges related to duplication of infrastructure, higher maintenance costs, and information sharing among communities of interest, such as coalition partners The Unisys Stealth Solution for Network is designed specifically to overcome this challenge and targets the SBU and classified domains NSA Awards Unisys Stealth EAL-4
  7. 7. Unisys STEALTH solution for data security2. Description The Stealth Solution for Network is a transformational solution that secures data-in-motion and controls the sharing of information within or across networks by employing an innovative cloaking technique – all while vastly simplifying the infrastructure. The Stealth Solution assures security by cryptographically transforming information using a bit-level, data-splitting algorithm that weaves the data into the very fabric of the network. NSA Awards Unisys Stealth EAL-4
  8. 8. Unisys STEALTH solution for data security2. DescriptionThe Stealth Solution for Network: Protects the confidentiality, integrity, and availability of data-in- motion and data-at-rest Allows multiple communities of interest to share the same network securely Cloaks Stealth Solution-equipped devices from unauthorized eyes NSA Awards Unisys Stealth EAL-4
  9. 9. Unisys STEALTH solution for data security2. Description For defense and agency networks: It protects the security and integrity of data on a single network by preventing unauthorized access For coalition operations: It allows nations to selectively control the sharing of information across a common coalition network or between a coalition network and a national network For privacy concern: It creates communities of interest that control access to information based upon user roles and responsibilities NSA Awards Unisys Stealth EAL-4
  10. 10. Unisys STEALTH solution for data security2. Description For cross-domain information sharing: It permits data classified at different levels to coexist on a single network, enabling the consolidation of different networks into a single IT infrastructure. It offers users access only to the information they are authorized. Permitting the consolidation of NIPR, SIPR, and JWICS- connected LANs into a single IT infrastructure NSA Awards Unisys Stealth EAL-4
  11. 11. Unisys STEALTH solution for data security2. Description The Stealth Solution for Network employs a Unisys-developed information management architecture that fundamentally alters the approach to data protection by directing and controlling parsed data “slices” The solution consists of appliances (with in-built software) that are deployed throughout the network at key locations. Software also resides on workstations and servers in the network. NSA Awards Unisys Stealth EAL-4
  12. 12. Unisys STEALTH solution for data security2. Description - Typical Agency Multi-Layered Infrastructure NSA Awards Unisys Stealth EAL-4
  13. 13. Unisys STEALTH solution for data security2. Description - Unisys Stealth Solution Infrastructure The Stealth Solution consolidates installation networks into one infrastructure and offers a single interface to the Global Information Grid NSA Awards Unisys Stealth EAL-4
  14. 14. Unisys STEALTH solution for data security2. Description The Unisys Stealth Solution for Network: - Splitting and encryption embedded in the Stealth Solution - Stealth endpoint runs in every workstation, server, and gateway - Splits IP packets and controls access to data - User workgroup keys control packet splitting and access to servers The result is a cloaked network that secures data-in-motion and hides servers and PCs in plain sight NSA Awards Unisys Stealth EAL-4
  15. 15. Unisys STEALTH solution for data security2. Description The Stealth Solution for SAN: Unisys is the only solution that enables data classified at different security levels to coexist on a single storage area network while vastly improving availability of stored data. Plus for SANs, it eliminates the need for complex and expensive remote mirror data replication software. NSA Awards Unisys Stealth EAL-4
  16. 16. Unisys STEALTH solution for data security2. Description The Stealth Solution for SAN:Multiple communities of interest(or domains) can safely share storage NSA Awards Unisys Stealth EAL-4
  17. 17. Unisys STEALTH solution for data security 2. Description The Stealth Solution for SAN:Even when local storage disks are unavailable,data can be read from other storagedevices, re-assembled, and decryptedFor unique “always-on” capabilities NSA Awards Unisys Stealth EAL-4
  18. 18. Unisys STEALTH solution for data security2. Description The Stealth Solution for SAN: Protects the confidentiality, integrity, and availability of data-at-rest Allows multiple communities of interest to share the same storage network securely Provides “always-on” data availability NSA Awards Unisys Stealth EAL-4
  19. 19. Unisys STEALTH solution for data security2. Description The Stealth Solution for SAN: For defense and agency networks: It protects the security and integrity of data on a single network or SAN by preventing unauthorized access For coalition operations: It allows nations to selectively control the sharing of information across a common coalition network or SAN or between a coalition infrastructure and a national infrastructure NSA Awards Unisys Stealth EAL-4
  20. 20. Unisys STEALTH solution for data security2. Description The Stealth Solution for SAN: For privacy concerns: It creates communities of interest that control access to information based upon user roles and responsibilities For cross-domain information sharing: It permits data classified at different levels to coexist on a single network or SAN, enabling the consolidation of different networks and SAN into a single infrastructure. It offers users access only to the information they are authorized NSA Awards Unisys Stealth EAL-4
  21. 21. Unisys STEALTH solution for data security3. Implementation Unisys Corporation was tasked, to demonstrate and validate a Cryptographic Bit Splitting Technology (CBST) solution The goal was to determine possible benefits for : Joint Improvised Explosive Device Defeat Organization (JIEDDO) field operations United States Joint Forces Command (USJFCOM) Joint Transformation Center – Intelligence (JTC-I) Joint Intelligence Laboratory (JIL) network convergence, and other applications. NSA Awards Unisys Stealth EAL-4
  22. 22. Unisys STEALTH solution for data security3. Implementation – U.S. Special Operations Command Unisys Corporation was tasked, under Defense Information Systems Agency (DISA) Encore II to analyze the existing United States Special Operations Command (USSOCOM) Tactical Local Area Network (TACLAN) infrastructure, and subsequently develop and demonstrate a prototype solution integrating Unisys Stealth Solution for Network and Stealth Solution for Storage Area Network (SAN) into the TACLAN Version 9.0 system. The customer for the project is the USSOCOM- TACLAN Program Management Office (PMO). The goal of the project is to provide a prototype that will enhance overall TACLAN operability by allowing for a smaller footprint, distributed and secure data storage, and easy integration into the current spiral development track of the TACLAN program NSA Awards Unisys Stealth EAL-4
  23. 23. Unisys STEALTH solution for data security4. Certificate NSA Awards Unisys Stealth EAL-4
  24. 24. Unisys STEALTH solution for data security4. Certificate Unisys Stealth Solution for Networks Certified by NSA to Protect Classified Government Data Patent-pending Unisys solution provides encrypted "virtual communities of interest" to protect data across any public or private network BLUE BELL, Pa., April 13, 2011 /PRNewswire/ -- Unisys today announced that the Unisys Stealth Solution for Network achieved EAL-4+ certification from the National Security Agency (NSA) as a secure solution for protection of data-in-motion across any network -- private or public. This qualifies Stealth to protect U.S. Defense Department data classified up to the "secret" level. NSA Awards Unisys Stealth EAL-4
  25. 25. Unisys STEALTH solution for data security5. Conclusion The Unisys Stealth Solution: Securing Networks and SANs Splitting and encryption embedded in the Stealth Solution Stealth management software controls access to data within a community of interest User workgroup keys control access to a specific community of interest The result is a cloaked network or SAN that secures data-in- motion and data-at-rest and hides data in plain sight NSA Awards Unisys Stealth EAL-4
  26. 26. Unisys STEALTH solution for data security5. Conclusion Revolutionary Security - With Stealth, you have a much simpler and more cost-effective consolidated infrastructure, vastly increased data availability for mission critical applications, and enhanced security and privacy of your data Unisys Stealth Solution - Secure Solutions for Defense Agencies The Stealth Solution enables you to get the right information to the right people at the right time, SECURELY! NSA Awards Unisys Stealth EAL-4
  27. 27. Unisys STEALTH solution for data securityContent:1. Introduction2. Description3. Implementation4. Certificate5. Conclusion QUESTIONS ? NSA Awards Unisys Stealth EAL-4

×