130 likes | 259 Views
MULTI-LEVEL SECURITY for NATO. OUTSIDE MARKET FORCES. In the first quarter of 2008, there were $76 million of counterfeit networking boards seized by government officials. COUNTERFEIT.
E N D
OUTSIDE MARKET FORCES In the first quarter of 2008, there were $76 million of counterfeit networking boards seized by government officials. COUNTERFEIT In the first quarter of 2008, there were 360,000 counterfeit microprocessors seized by government officials. Identity Theft There are 3.4 identities stolen every 12 seconds and produces an average loss of $3,257 per event. COUNTERFEIT Intelligence analysts state that China’s military regards offensive computer operations as “critical to seize the initiative” in the first stage of a war. Answer today: Separate / isolate the risk Remove the weakest link Multi-Level Security (MLS) 2008 ASIS Conference Technolytics State of Insecurity DELL CONFIDENTIAL
Impact of separation / pain points Increased Network Security– layered, separate networks to block unauthorized data access/security breaches Complex infrastructure– multiple client platforms/user; requires increased cost/management Increased Staffing– duplicate management and break-fix Inefficient – Cross Domain coordination • Results of Pain Points: • Security requirements may be waived or circumvented to accommodate the mission and flexibility of end-user and administrator • Systems may not be maintained to standards because of increased complexity • IT managers forced to balance management and level of risks with the agency’s mission and end-user needs. DELL CONFIDENTIAL
Dell’s Focus on MLSMulti-level Security DELL CONFIDENTIAL
MISSION Value - Risk Tolerance Aligns Investment HR Records-Card Holder Data-Health Records-Financial Results Intellectual Property-Financial Transactions Personal Identifiable Information What information is important to protect? What risks do we accept? What risks do we need to protect against to enable the mission? Grades-Exams-Contracts-SSN What are the potential threats? Where does it go? Unavailability - Data Corruption - Denial of service Eavesdropping - Media Loss - Data theft Device failure - Denial of Service - Unauthorized activity Device takeover - Intercept - Unavailability Lost Laptops-Unauthorized Access-Data theft AgencyInitiatives Mission Cost Reduction Customers Continuity of Operations Compliance S E N S I T I V E I N F O R M A T I O N Risk S E C U R I T Y I N C I D E N T S Endpoint Network App/DB FS/CMS Storage Information Technology Environment
Dell’s Solution Models DELL CONFIDENTIAL
Dell Security Solutions Market Approach • Key Tenets • Engineered into platform • Supports OEM Model • High-Assurance Technologies • Simplify for end-user • Commoditize for cost savings • Lifecycle consideration DELL CONFIDENTIAL
PARTNER SOLUTION Software at a host, allowing One Computer to access Multiple Domains • Thin client approach, using software (from partner) to address MLS • Dell provides hardware and support services • Partner provides all integration and solution support DELL CONFIDENTIAL
Bundled solution Software Allowing One Computer to Host Multiple Operating Systems, Security Levels and Domains • Multiple Virtual Machines (VMs) approach to MLS on a “fat client” • Complete Data Separation Between VMs • Solution tested and certified by Dell and the partner • DoD and IC Certified • Fully supported (Help Desk and repair) by Dell and partner DELL CONFIDENTIAL
ENGINEERED SOLUTION OS Allowing One Computer to Host Multiple Operating Systems, Security Levels and Domains • Multiple Virtual Machines (VMs) approach to MLS on a “fat client” • Complete OS & Data Separation Between VMs • Solution engineered, from the beginning by Dell and key partners • Tested and certified by Dell and the partners • EAL Level 6 certified OS • Fully supported (Help Desk and repair) by Dell Secure Separation Domain VMM Separation Kernel ASP BSP Hardware DELL CONFIDENTIAL
What are the applications needing MLS technology? TODAY: • Intelligence & Defense: • Multiple Security Domains • Consolidated Battle Space View • Consolidated Inbox • Collaboration & Information Sharing INCREASINGLY • Critical Infrastructure: • Financial • Utilities • Healthcare MLS technology is the foundation for building these future capabilities DELL CONFIDENTIAL
Dell Technology Vision Why invest in Security Solutions? • Market trending toward higher security solutions • Differentiated product • Large opportunity for differentiated secure platform What does Dell contribute? • Production scale • Unique capability to enhance security at foundation • OEM support model • Standards Development DELL CONFIDENTIAL
Q&A 13