SlideShare a Scribd company logo
1 of 9
Download to read offline
NOT PROTECTIVELY MARKED




A Day in the Life of a User
                 20/03/12

     NOT PROTECTIVELY MARKED
NOT PROTECTIVELY MARKED



                                  Our User...
                                   (let's call him / her Hilary...)


•   Deals with multiple protective markings
•       could be sensitivities, could be caveats / codewords
•   Lives in a Government or List X facility approved for
    all the markings involved
•   Occasionally needs to distribute data from a marked
    input source to one or more differently marked output
    destinations
•   Occasionally needs to attend meetings in a room
    approved for a subset of markings
•   Has at least one Security Controller looking after a
    codeword who's “a bit of a Jobsworth”...

                   NOT PROTECTIVELY MARKED
NOT PROTECTIVELY MARKED




    Welcome to the Office...




NOT PROTECTIVELY MARKED
NOT PROTECTIVELY MARKED




                     First thing in the morning...
   Traditional                             Sun Ray
      Get Flagstone drives                  Power on
      from safe (1 or 2 drives               Insert smartcard
      per marking)                           Enter Sun Ray password
      Load into desktops                    Double-click remote
      Power on                               desktop at each marking
      Wait
      Unlock drives with
      iButtons, passwds
      Boot desktops
      Wait
      Log in to each desktop
      Log in to each remote
      infrastructure

                   NOT PROTECTIVELY MARKED
NOT PROTECTIVELY MARKED




                                     Moving data...
   Traditional                            Sun Ray
     Go to appropriate app                 Go to appropriate app in
      on appropriate desktop                 window at appropriate
     Highlight                              marking
     Save to file                          Highlight
     Cryptographically sign                Copy
     Copy to media (CD                     Go to appropriate app in
      ROM, <wince> USB stick                 window at appropriate
      </wince>)                              marking
     Mount media on                        Paste
      destination desktop                   No media to mishandle!
     Copy file to destination
     Extract data and paste
      accordingly
     Wipe / destroy media
                  NOT PROTECTIVELY MARKED
NOT PROTECTIVELY MARKED




                              Going to a meeting...
   Traditional                            Sun Ray
    Log out of appropriate                  Remove smartcard
     desktop(s)                              Go to meeting room
    Go to meeting room                      Insert smartcard
    Log into desktops                       Log into Sun Ray
    Re-launch apps etc                      Resume available
                                              desktop sessions




                  NOT PROTECTIVELY MARKED
NOT PROTECTIVELY MARKED




                                Before going home...
   Traditional                            Sun Ray
     Log out of remote                      Remove smartcard
      sessions on desktops
     Shut desktops down
     Wait
     Remove drives
     Put drives back in safe




                  NOT PROTECTIVELY MARKED
NOT PROTECTIVELY MARKED




                                      Interesting?
   These scenarios add up to a saving of maybe 20
    minutes per day, per user.
   Add up all those users.
   Add up all those desktops that won't be needed,
    too.
   Also, consider that any cross-domain data transfer
    stays firmly in the system; there's no media, at any
    point, to mishandle.
   Talk to us.
             contact@labelledsecurity.co.uk
                  NOT PROTECTIVELY MARKED
NOT PROTECTIVELY MARKED




Making Britain More Secure.
     NOT PROTECTIVELY MARKED

More Related Content

Viewers also liked

Zakon o osnovima bezbjednosti
Zakon o osnovima bezbjednostiZakon o osnovima bezbjednosti
Zakon o osnovima bezbjednostivucicj
 
Definition and explanation of the principle of archimedes
Definition and explanation of the principle of archimedesDefinition and explanation of the principle of archimedes
Definition and explanation of the principle of archimedesfreddymarcillo
 
Agile Business Analysis - The Key to Effective Requirements on Agile Projects
Agile Business Analysis - The Key to Effective Requirements on Agile ProjectsAgile Business Analysis - The Key to Effective Requirements on Agile Projects
Agile Business Analysis - The Key to Effective Requirements on Agile ProjectsLilian De Munno
 
Magento, uso, desarrollo y diseño
Magento, uso, desarrollo y diseñoMagento, uso, desarrollo y diseño
Magento, uso, desarrollo y diseñoIgnacio Pascual
 
Energy Management for Retail
Energy Management for RetailEnergy Management for Retail
Energy Management for RetailEnergent
 
A business plan for opening a school
A business plan for opening a schoolA business plan for opening a school
A business plan for opening a schoolSamit Shahi
 
Byadgi chillies, know more about chilliiii.....
Byadgi chillies, know more about chilliiii.....Byadgi chillies, know more about chilliiii.....
Byadgi chillies, know more about chilliiii.....Samit Shahi
 
Marvelous designer2 manual
Marvelous designer2 manualMarvelous designer2 manual
Marvelous designer2 manualDorel Lupu
 
عرض رسالة ماجستير للباحث عصام الفلاح
عرض رسالة ماجستير للباحث عصام الفلاحعرض رسالة ماجستير للباحث عصام الفلاح
عرض رسالة ماجستير للباحث عصام الفلاحHanan Bezan
 

Viewers also liked (12)

Ambato uta
Ambato utaAmbato uta
Ambato uta
 
Zakon o osnovima bezbjednosti
Zakon o osnovima bezbjednostiZakon o osnovima bezbjednosti
Zakon o osnovima bezbjednosti
 
Definition and explanation of the principle of archimedes
Definition and explanation of the principle of archimedesDefinition and explanation of the principle of archimedes
Definition and explanation of the principle of archimedes
 
Agile Business Analysis - The Key to Effective Requirements on Agile Projects
Agile Business Analysis - The Key to Effective Requirements on Agile ProjectsAgile Business Analysis - The Key to Effective Requirements on Agile Projects
Agile Business Analysis - The Key to Effective Requirements on Agile Projects
 
Brand plan
Brand plan Brand plan
Brand plan
 
Magento, uso, desarrollo y diseño
Magento, uso, desarrollo y diseñoMagento, uso, desarrollo y diseño
Magento, uso, desarrollo y diseño
 
Energy Management for Retail
Energy Management for RetailEnergy Management for Retail
Energy Management for Retail
 
A business plan for opening a school
A business plan for opening a schoolA business plan for opening a school
A business plan for opening a school
 
Byadgi chillies, know more about chilliiii.....
Byadgi chillies, know more about chilliiii.....Byadgi chillies, know more about chilliiii.....
Byadgi chillies, know more about chilliiii.....
 
Marvelous designer2 manual
Marvelous designer2 manualMarvelous designer2 manual
Marvelous designer2 manual
 
عرض رسالة ماجستير للباحث عصام الفلاح
عرض رسالة ماجستير للباحث عصام الفلاحعرض رسالة ماجستير للباحث عصام الفلاح
عرض رسالة ماجستير للباحث عصام الفلاح
 
MARKETING MIX
MARKETING MIXMARKETING MIX
MARKETING MIX
 

Similar to Lsl dayinlifeuser

Digitizing Financial Records: From Paper to the Cloud
Digitizing Financial Records: From Paper to the CloudDigitizing Financial Records: From Paper to the Cloud
Digitizing Financial Records: From Paper to the Clouddlhaase
 
The Final Show For It.Htm..
The Final Show For It.Htm..The Final Show For It.Htm..
The Final Show For It.Htm..shafeeqsookharry
 
DefCon 2012 - Hardware Backdooring (Slides)
DefCon 2012 - Hardware Backdooring (Slides)DefCon 2012 - Hardware Backdooring (Slides)
DefCon 2012 - Hardware Backdooring (Slides)Michael Smith
 
Rootkit Hunting & Compromise Detection
Rootkit Hunting & Compromise DetectionRootkit Hunting & Compromise Detection
Rootkit Hunting & Compromise Detectionamiable_indian
 
Eloi Sanfélix y Javier Moreno - Hardware hacking on your couch [RootedCON 2012]
Eloi Sanfélix y Javier Moreno - Hardware hacking on your couch [RootedCON 2012]Eloi Sanfélix y Javier Moreno - Hardware hacking on your couch [RootedCON 2012]
Eloi Sanfélix y Javier Moreno - Hardware hacking on your couch [RootedCON 2012]RootedCON
 
Embedded government espionage
Embedded government espionageEmbedded government espionage
Embedded government espionageMuts Byte
 
The VDI InfoSec Conundrum
The VDI InfoSec ConundrumThe VDI InfoSec Conundrum
The VDI InfoSec ConundrumVirtualTal
 
[Hackito2012] Hardware backdooring is practical
[Hackito2012] Hardware backdooring is practical[Hackito2012] Hardware backdooring is practical
[Hackito2012] Hardware backdooring is practicalMoabi.com
 
amrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdfamrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdfamrapalibuildersreviews
 
Accessing Forensic Images
Accessing Forensic ImagesAccessing Forensic Images
Accessing Forensic ImagesCTIN
 
Offline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encriptionOffline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encriptionmalvvv
 
Backing Up Android
Backing Up AndroidBacking Up Android
Backing Up AndroidPOSSCON
 
Hacking and cracking
Hacking and crackingHacking and cracking
Hacking and crackingDeepak kumar
 
Computer devices
Computer devicesComputer devices
Computer devicesakashsaw
 
Business Continuity 2009
Business Continuity 2009Business Continuity 2009
Business Continuity 2009OS-Cubed, Inc.
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidencerakesh mishra
 
Threats to data and information security
Threats to data and information securityThreats to data and information security
Threats to data and information securityJohn LEE
 

Similar to Lsl dayinlifeuser (20)

computer hardware
computer hardwarecomputer hardware
computer hardware
 
Digitizing Financial Records: From Paper to the Cloud
Digitizing Financial Records: From Paper to the CloudDigitizing Financial Records: From Paper to the Cloud
Digitizing Financial Records: From Paper to the Cloud
 
The Final Show For It.Htm..
The Final Show For It.Htm..The Final Show For It.Htm..
The Final Show For It.Htm..
 
DefCon 2012 - Hardware Backdooring (Slides)
DefCon 2012 - Hardware Backdooring (Slides)DefCon 2012 - Hardware Backdooring (Slides)
DefCon 2012 - Hardware Backdooring (Slides)
 
Rootkit Hunting & Compromise Detection
Rootkit Hunting & Compromise DetectionRootkit Hunting & Compromise Detection
Rootkit Hunting & Compromise Detection
 
Eloi Sanfélix y Javier Moreno - Hardware hacking on your couch [RootedCON 2012]
Eloi Sanfélix y Javier Moreno - Hardware hacking on your couch [RootedCON 2012]Eloi Sanfélix y Javier Moreno - Hardware hacking on your couch [RootedCON 2012]
Eloi Sanfélix y Javier Moreno - Hardware hacking on your couch [RootedCON 2012]
 
Embedded government espionage
Embedded government espionageEmbedded government espionage
Embedded government espionage
 
The VDI InfoSec Conundrum
The VDI InfoSec ConundrumThe VDI InfoSec Conundrum
The VDI InfoSec Conundrum
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
[Hackito2012] Hardware backdooring is practical
[Hackito2012] Hardware backdooring is practical[Hackito2012] Hardware backdooring is practical
[Hackito2012] Hardware backdooring is practical
 
ZENDAL BACKUP
ZENDAL BACKUPZENDAL BACKUP
ZENDAL BACKUP
 
amrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdfamrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdf
 
Accessing Forensic Images
Accessing Forensic ImagesAccessing Forensic Images
Accessing Forensic Images
 
Offline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encriptionOffline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encription
 
Backing Up Android
Backing Up AndroidBacking Up Android
Backing Up Android
 
Hacking and cracking
Hacking and crackingHacking and cracking
Hacking and cracking
 
Computer devices
Computer devicesComputer devices
Computer devices
 
Business Continuity 2009
Business Continuity 2009Business Continuity 2009
Business Continuity 2009
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Threats to data and information security
Threats to data and information securityThreats to data and information security
Threats to data and information security
 

Recently uploaded

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

Lsl dayinlifeuser

  • 1. NOT PROTECTIVELY MARKED A Day in the Life of a User 20/03/12 NOT PROTECTIVELY MARKED
  • 2. NOT PROTECTIVELY MARKED Our User... (let's call him / her Hilary...) • Deals with multiple protective markings • could be sensitivities, could be caveats / codewords • Lives in a Government or List X facility approved for all the markings involved • Occasionally needs to distribute data from a marked input source to one or more differently marked output destinations • Occasionally needs to attend meetings in a room approved for a subset of markings • Has at least one Security Controller looking after a codeword who's “a bit of a Jobsworth”... NOT PROTECTIVELY MARKED
  • 3. NOT PROTECTIVELY MARKED Welcome to the Office... NOT PROTECTIVELY MARKED
  • 4. NOT PROTECTIVELY MARKED First thing in the morning...  Traditional  Sun Ray  Get Flagstone drives  Power on from safe (1 or 2 drives  Insert smartcard per marking)  Enter Sun Ray password  Load into desktops  Double-click remote  Power on desktop at each marking  Wait  Unlock drives with iButtons, passwds  Boot desktops  Wait  Log in to each desktop  Log in to each remote infrastructure NOT PROTECTIVELY MARKED
  • 5. NOT PROTECTIVELY MARKED Moving data...  Traditional  Sun Ray  Go to appropriate app  Go to appropriate app in on appropriate desktop window at appropriate  Highlight marking  Save to file  Highlight  Cryptographically sign  Copy  Copy to media (CD  Go to appropriate app in ROM, <wince> USB stick window at appropriate </wince>) marking  Mount media on  Paste destination desktop  No media to mishandle!  Copy file to destination  Extract data and paste accordingly  Wipe / destroy media NOT PROTECTIVELY MARKED
  • 6. NOT PROTECTIVELY MARKED Going to a meeting...  Traditional  Sun Ray  Log out of appropriate  Remove smartcard desktop(s)  Go to meeting room  Go to meeting room  Insert smartcard  Log into desktops  Log into Sun Ray  Re-launch apps etc  Resume available desktop sessions NOT PROTECTIVELY MARKED
  • 7. NOT PROTECTIVELY MARKED Before going home...  Traditional  Sun Ray  Log out of remote  Remove smartcard sessions on desktops  Shut desktops down  Wait  Remove drives  Put drives back in safe NOT PROTECTIVELY MARKED
  • 8. NOT PROTECTIVELY MARKED Interesting?  These scenarios add up to a saving of maybe 20 minutes per day, per user.  Add up all those users.  Add up all those desktops that won't be needed, too.  Also, consider that any cross-domain data transfer stays firmly in the system; there's no media, at any point, to mishandle.  Talk to us. contact@labelledsecurity.co.uk NOT PROTECTIVELY MARKED
  • 9. NOT PROTECTIVELY MARKED Making Britain More Secure. NOT PROTECTIVELY MARKED