1 / 13

MULTI-LEVEL SECURITY for NATO

MULTI-LEVEL SECURITY for NATO. OUTSIDE MARKET FORCES. In the first quarter of 2008, there were $76 million of counterfeit networking boards seized by government officials. COUNTERFEIT.

adora
Download Presentation

MULTI-LEVEL SECURITY for NATO

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. MULTI-LEVEL SECURITY for NATO

  2. OUTSIDE MARKET FORCES In the first quarter of 2008, there were $76 million of counterfeit networking boards seized by government officials. COUNTERFEIT In the first quarter of 2008, there were 360,000 counterfeit microprocessors seized by government officials. Identity Theft There are 3.4 identities stolen every 12 seconds and produces an average loss of $3,257 per event. COUNTERFEIT Intelligence analysts state that China’s military regards offensive computer operations as “critical to seize the initiative” in the first stage of a war. Answer today: Separate / isolate the risk Remove the weakest link Multi-Level Security (MLS) 2008 ASIS Conference Technolytics State of Insecurity DELL CONFIDENTIAL

  3. Impact of separation / pain points Increased Network Security– layered, separate networks to block unauthorized data access/security breaches Complex infrastructure– multiple client platforms/user; requires increased cost/management Increased Staffing– duplicate management and break-fix Inefficient – Cross Domain coordination • Results of Pain Points: • Security requirements may be waived or circumvented to accommodate the mission and flexibility of end-user and administrator • Systems may not be maintained to standards because of increased complexity • IT managers forced to balance management and level of risks with the agency’s mission and end-user needs. DELL CONFIDENTIAL

  4. Dell’s Focus on MLSMulti-level Security DELL CONFIDENTIAL

  5. MISSION Value - Risk Tolerance Aligns Investment HR Records-Card Holder Data-Health Records-Financial Results Intellectual Property-Financial Transactions Personal Identifiable Information What information is important to protect? What risks do we accept? What risks do we need to protect against to enable the mission? Grades-Exams-Contracts-SSN What are the potential threats? Where does it go? Unavailability - Data Corruption - Denial of service Eavesdropping - Media Loss - Data theft Device failure - Denial of Service - Unauthorized activity Device takeover - Intercept - Unavailability Lost Laptops-Unauthorized Access-Data theft AgencyInitiatives Mission Cost Reduction Customers Continuity of Operations Compliance S E N S I T I V E I N F O R M A T I O N Risk S E C U R I T Y I N C I D E N T S Endpoint Network App/DB FS/CMS Storage Information Technology Environment

  6. Dell’s Solution Models DELL CONFIDENTIAL

  7. Dell Security Solutions Market Approach • Key Tenets • Engineered into platform • Supports OEM Model • High-Assurance Technologies • Simplify for end-user • Commoditize for cost savings • Lifecycle consideration DELL CONFIDENTIAL

  8. PARTNER SOLUTION Software at a host, allowing One Computer to access Multiple Domains • Thin client approach, using software (from partner) to address MLS • Dell provides hardware and support services • Partner provides all integration and solution support DELL CONFIDENTIAL

  9. Bundled solution Software Allowing One Computer to Host Multiple Operating Systems, Security Levels and Domains • Multiple Virtual Machines (VMs) approach to MLS on a “fat client” • Complete Data Separation Between VMs • Solution tested and certified by Dell and the partner • DoD and IC Certified • Fully supported (Help Desk and repair) by Dell and partner DELL CONFIDENTIAL

  10. ENGINEERED SOLUTION OS Allowing One Computer to Host Multiple Operating Systems, Security Levels and Domains • Multiple Virtual Machines (VMs) approach to MLS on a “fat client” • Complete OS & Data Separation Between VMs • Solution engineered, from the beginning by Dell and key partners • Tested and certified by Dell and the partners • EAL Level 6 certified OS • Fully supported (Help Desk and repair) by Dell Secure Separation Domain VMM Separation Kernel ASP BSP Hardware DELL CONFIDENTIAL

  11. What are the applications needing MLS technology? TODAY: • Intelligence & Defense: • Multiple Security Domains • Consolidated Battle Space View • Consolidated Inbox • Collaboration & Information Sharing INCREASINGLY • Critical Infrastructure: • Financial • Utilities • Healthcare MLS technology is the foundation for building these future capabilities DELL CONFIDENTIAL

  12. Dell Technology Vision Why invest in Security Solutions? • Market trending toward higher security solutions • Differentiated product • Large opportunity for differentiated secure platform What does Dell contribute? • Production scale • Unique capability to enhance security at foundation • OEM support model • Standards Development DELL CONFIDENTIAL

  13. Q&A 13

More Related