Granite Gate Corporation™Corporate Capabilities PresentationContent SecurityForSecure Information Sharing&  Application IntegrationJuly 8, 2009Copyright ©2009 Granite Gate Corporation all rights reserved.
Corporate Capabilities PresentationBriefing OverviewMission and Standards-Based Offering	1Protecting Content is the Future of Cybersecurity 	2The Integrated Cyber Solution (ICS) &	3Application*SECURE* 	 Consulting and Training 	7Granite Gate Officers and Organization	8Conclusion 	9iGranite Gate Corporation™
Granite Gate’s mission is to provide innovative cyber security products and services that address content security. Granite Gate Corporation™Granite Gate Standards-based Content Security OfferingsMissionIntegrated Cyber Secure (ICS)*SECURE* Content ApplicationsProvide innovative cybersecurity capabilities that facilitate secure content sharingCyber Security ServicesComputer-based Content Security Training1Granite Gate Corporation™
The future of cybersecurity is to supplement network security with protection of the content. The President’s Cyberspace Policy Review Report of May 25, 2009 - Cyberspace touches practically everything and everyone. It provides a platform for innovation and prosperity and the means to improve general welfare around the globe. But with the broad reach of a loose and lightly regulated digital infrastructure, great risks threaten nations, private enterprises, and individual rights. The government has a responsibility to address these strategic vulnerabilities Lawrence H. Summers, senior White House economic adviser, is pushing for the National Economic Council to have a key role in cybersecurity …It is a key government responsibility to help secure private-sector networks
It discusses the need to provide incentives for greater data sharing and risk management
There exists a plethora of security-in-a-box products on the market, but few address content security in detail. 110th Congress, 2d Session, H, CON. RES September 24, 2008,  425TH, by Republican Rep. Michael Burgess and Democrat Rep. Chuck Gonzalez of Texas cites a litany of losses, exposures and shortfalls in protecting personal information, and notes that 36 states already have taken the lead in passing their own data security legislation.Nevada law NRS 597.970 of Title 52of the state code. It says that, 'A business in this State shall not transfer any personal information of a customer through an electronic …unless the business uses encryption to ensure the security of electronic transmission.2Granite Gate Corporation™
Granite Gate provides the Integrated Cyber Secure (ICS) for secure information sharing and secure application integration. A key product is Application*SECURE*Secure Key ManagementPositive ID & Privilege ManagementDesktop  ApplicationsConstructive KeysSecureInformation SharingApplication*SECURE*Dedicated ApplicationsVulnerableArchitectureSecure ArchitectureSecure Rule DataEnterprise ApplicationPrivilege Mgt.NetworksID of MeritWebsiteSecure Rule Based ApplicationsSecure Data at Rest & Datain Motion3Granite Gate Corporation™
Granite Gate’s Integrated Cyber Secure including Application*SECURE* is based on proven technologies from TecSec and IQwareNetwork, Internet, or ConnectionSecure Server(DOD rated  B2/C2)Workstation(Windows, Mac, Linux)Access Control Devise(ID card, biometric, etc.)X-Toolkit, X-Intrinsics, X-Lib , X-ProtocolEncrypted DataEncrypted DataX-Protocol, X-Server, X-DisplayIdentity of MeritConstructive Key Management (CKM®TECSEC ) Privilege ManagementBusiness LogicRule-Based ApplicationsOpen Office *SECURE*  & OtherApplicationsTecSec DomainIQware DomainHardware Dependent GraphicsHardware Dependent inputsIntegrated Environment Granite Gate Domain4Granite Gate Corporation™
Granite Gate’s Integrated Cyber Secure addresses serious vulnerabilities in government and commercial markets. Network, Internet, or ConnectionSecure Server(DOD Rated  B2/C2)Workstation(Windows, Mac, Linux)Access Control Devise(Card, biometric, etc.)ArchitectureOpen Office*SECURE* & OtherApplications on ServerAuthoring (key strokes)Encrypted DataEncrypted Info on Secure ServerAssignment of Privileges by Role by AuthorProcessEncrypted DataEncrypted Info on Secure ServerRequested Data Deciphered Based on Approved RoleEncrypted DataIdentity of MeritConstructive Key Management  & EncryptionRule-Based ApplicationsTechnologyIntegrated Environment 5Granite Gate Corporation™
TecSec and IQware  are Granite Gate shareholders providing access to patented technologies.TecSec Proprietary ComponentsIQware Proprietary ComponentsGranite Gate Proprietary ComponentsPatented US #7,322,028Rule Based App Component“cuts the business logic from the workstation and hosts it on the secure  server”
“the application is controlled by rules not hard coded logic”

General Version 8 Jul 09

  • 1.
    Granite Gate Corporation™CorporateCapabilities PresentationContent SecurityForSecure Information Sharing& Application IntegrationJuly 8, 2009Copyright ©2009 Granite Gate Corporation all rights reserved.
  • 2.
    Corporate Capabilities PresentationBriefingOverviewMission and Standards-Based Offering 1Protecting Content is the Future of Cybersecurity 2The Integrated Cyber Solution (ICS) & 3Application*SECURE* Consulting and Training 7Granite Gate Officers and Organization 8Conclusion 9iGranite Gate Corporation™
  • 3.
    Granite Gate’s missionis to provide innovative cyber security products and services that address content security. Granite Gate Corporation™Granite Gate Standards-based Content Security OfferingsMissionIntegrated Cyber Secure (ICS)*SECURE* Content ApplicationsProvide innovative cybersecurity capabilities that facilitate secure content sharingCyber Security ServicesComputer-based Content Security Training1Granite Gate Corporation™
  • 4.
    The future ofcybersecurity is to supplement network security with protection of the content. The President’s Cyberspace Policy Review Report of May 25, 2009 - Cyberspace touches practically everything and everyone. It provides a platform for innovation and prosperity and the means to improve general welfare around the globe. But with the broad reach of a loose and lightly regulated digital infrastructure, great risks threaten nations, private enterprises, and individual rights. The government has a responsibility to address these strategic vulnerabilities Lawrence H. Summers, senior White House economic adviser, is pushing for the National Economic Council to have a key role in cybersecurity …It is a key government responsibility to help secure private-sector networks
  • 5.
    It discusses theneed to provide incentives for greater data sharing and risk management
  • 6.
    There exists aplethora of security-in-a-box products on the market, but few address content security in detail. 110th Congress, 2d Session, H, CON. RES September 24, 2008, 425TH, by Republican Rep. Michael Burgess and Democrat Rep. Chuck Gonzalez of Texas cites a litany of losses, exposures and shortfalls in protecting personal information, and notes that 36 states already have taken the lead in passing their own data security legislation.Nevada law NRS 597.970 of Title 52of the state code. It says that, 'A business in this State shall not transfer any personal information of a customer through an electronic …unless the business uses encryption to ensure the security of electronic transmission.2Granite Gate Corporation™
  • 7.
    Granite Gate providesthe Integrated Cyber Secure (ICS) for secure information sharing and secure application integration. A key product is Application*SECURE*Secure Key ManagementPositive ID & Privilege ManagementDesktop ApplicationsConstructive KeysSecureInformation SharingApplication*SECURE*Dedicated ApplicationsVulnerableArchitectureSecure ArchitectureSecure Rule DataEnterprise ApplicationPrivilege Mgt.NetworksID of MeritWebsiteSecure Rule Based ApplicationsSecure Data at Rest & Datain Motion3Granite Gate Corporation™
  • 8.
    Granite Gate’s IntegratedCyber Secure including Application*SECURE* is based on proven technologies from TecSec and IQwareNetwork, Internet, or ConnectionSecure Server(DOD rated B2/C2)Workstation(Windows, Mac, Linux)Access Control Devise(ID card, biometric, etc.)X-Toolkit, X-Intrinsics, X-Lib , X-ProtocolEncrypted DataEncrypted DataX-Protocol, X-Server, X-DisplayIdentity of MeritConstructive Key Management (CKM®TECSEC ) Privilege ManagementBusiness LogicRule-Based ApplicationsOpen Office *SECURE* & OtherApplicationsTecSec DomainIQware DomainHardware Dependent GraphicsHardware Dependent inputsIntegrated Environment Granite Gate Domain4Granite Gate Corporation™
  • 9.
    Granite Gate’s IntegratedCyber Secure addresses serious vulnerabilities in government and commercial markets. Network, Internet, or ConnectionSecure Server(DOD Rated B2/C2)Workstation(Windows, Mac, Linux)Access Control Devise(Card, biometric, etc.)ArchitectureOpen Office*SECURE* & OtherApplications on ServerAuthoring (key strokes)Encrypted DataEncrypted Info on Secure ServerAssignment of Privileges by Role by AuthorProcessEncrypted DataEncrypted Info on Secure ServerRequested Data Deciphered Based on Approved RoleEncrypted DataIdentity of MeritConstructive Key Management & EncryptionRule-Based ApplicationsTechnologyIntegrated Environment 5Granite Gate Corporation™
  • 10.
    TecSec and IQware are Granite Gate shareholders providing access to patented technologies.TecSec Proprietary ComponentsIQware Proprietary ComponentsGranite Gate Proprietary ComponentsPatented US #7,322,028Rule Based App Component“cuts the business logic from the workstation and hosts it on the secure server”
  • 11.
    “the application iscontrolled by rules not hard coded logic”