MULTI-LEVEL SECURITY for NATO

13
MULTI-LEVEL SECURITY for NATO 1

description

MULTI-LEVEL SECURITY for NATO. OUTSIDE MARKET FORCES. In the first quarter of 2008, there were $76 million of counterfeit networking boards seized by government officials. COUNTERFEIT. - PowerPoint PPT Presentation

Transcript of MULTI-LEVEL SECURITY for NATO

Page 1: MULTI-LEVEL SECURITY  for  NATO

MULTI-LEVEL SECURITY

for

NATO

1

Page 2: MULTI-LEVEL SECURITY  for  NATO

OUTSIDE MARKET FORCES

DELL CONFIDENTIAL 2

There are 3.4 identities stolen every 12 seconds and produces an average loss of $3,257 per event.

Identity TheftCOUNTERFEIT

In the first quarter of 2008, there were $76 million of counterfeit networking boards seized by government officials.

Intelligence analysts state that China’s military regards offensive computer operations as “critical to seize the initiative” in the first stage of a war.

2008 ASIS ConferenceTechnolytics State of Insecurity

Answer today:Separate / isolate the riskRemove the weakest link

Multi-Level Security (MLS)

In the first quarter of 2008, there were 360,000 counterfeit microprocessors seized by government officials.

COUNTERFEIT

Page 3: MULTI-LEVEL SECURITY  for  NATO

IMPACT OF SEPARATION / PAIN POINTS

Results of Pain Points:– Security requirements may be waived or circumvented to accommodate

the mission and flexibility of end-user and administrator

– Systems may not be maintained to standards because of increased complexity

– IT managers forced to balance management and level of risks with the agency’s mission and end-user needs.

DELL CONFIDENTIAL

Increased Network Security – layered, separate networks to block unauthorized data access/security breaches

Complex infrastructure – multiple client platforms/user; requires increased cost/management

Increased Staffing – duplicate management and break-fix

Inefficient – Cross Domain coordination

3

Page 4: MULTI-LEVEL SECURITY  for  NATO

DELL CONFIDENTIAL

DELL’S FOCUS ON MLS

MULTI-LEVEL SECURITY

4

Page 5: MULTI-LEVEL SECURITY  for  NATO

MISSION VALUE - RISK TOLERANCE ALIGNS INVESTMENT

Agency Initiatives

Information Technology Environment

Mission ComplianceCost Reduction Continuity of OperationsCustomers

Where does it go?

What information is important to

protect?

What are the potential threats?

Risk

What risks do we accept?What risks do we need to protect against to enable

the mission?

S E N S I T I V E S E N S I T I V E I N F O R M A T I O NI N F O R M A T I O N

S E N S I T I V E S E N S I T I V E I N F O R M A T I O NI N F O R M A T I O N

NetworkEndpoint App/DB StorageFS/CMS

S E C U R I T Y S E C U R I T Y I N C I D E N T SI N C I D E N T SS E C U R I T Y S E C U R I T Y I N C I D E N T SI N C I D E N T S

5

Page 6: MULTI-LEVEL SECURITY  for  NATO

DELL’S SOLUTION MODELS

DELL CONFIDENTIAL 6

Page 7: MULTI-LEVEL SECURITY  for  NATO

DELL CONFIDENTIAL 7

KEY TENETS Engineered into platform

Supports OEM Model High-Assurance Technologies Simplify for end-user Commoditize for cost savings Lifecycle consideration

DELL SECURITY SOLUTIONS MARKET APPROACH

Page 8: MULTI-LEVEL SECURITY  for  NATO

PARTNER SOLUTION

DELL CONFIDENTIAL

Thin client approach, using software (from partner) to address MLS

Dell provides hardware and support services

Partner provides all integration and solution support

8

Software at a host, allowing One Computer to access Multiple Domains

Page 9: MULTI-LEVEL SECURITY  for  NATO

BUNDLED SOLUTION

DELL CONFIDENTIAL 9

Multiple Virtual Machines (VMs) approach to MLS on a “fat client”

Complete Data Separation Between VMs

Solution tested and certified by Dell and the partner

DoD and IC Certified

Fully supported (Help Desk and repair) by Dell and partner

Software Allowing One Computer to Host Multiple Operating Systems, Security Levels and Domains

Page 10: MULTI-LEVEL SECURITY  for  NATO

ENGINEERED SOLUTION

DELL CONFIDENTIAL

HardwareBSP

Separation Kernel

ASP

Secure Separation Domain

VMM

10

OS Allowing One Computer to Host Multiple Operating Systems, Security Levels and Domains

Multiple Virtual Machines (VMs) approach to MLS on a “fat client”

Complete OS & Data Separation Between VMs

Solution engineered, from the beginning by Dell and key partners

Tested and certified by Dell and the partners

EAL Level 6 certified OS

Fully supported (Help Desk and repair) by Dell

Page 11: MULTI-LEVEL SECURITY  for  NATO

WHAT ARE THE APPLICATIONS NEEDING MLS TECHNOLOGY?

TODAY:Intelligence & Defense:

– Multiple Security Domains– Consolidated Battle Space View– Consolidated Inbox– Collaboration & Information Sharing

INCREASINGLYCritical Infrastructure:

– Financial– Utilities– Healthcare

11

MLS technology is the foundation for building these future capabilities

DELL CONFIDENTIAL

Page 12: MULTI-LEVEL SECURITY  for  NATO

DELL TECHNOLOGY VISION

Why invest in Security Solutions? Market trending toward higher security solutions Differentiated product Large opportunity for differentiated secure platform

What does Dell contribute? Production scale Unique capability to enhance security at

foundation OEM support model Standards Development

DELL CONFIDENTIAL 12

Page 13: MULTI-LEVEL SECURITY  for  NATO

Q&A

13