MULTI-LEVEL SECURITY for NATO 1. OUTSIDE MARKET FORCES DELL CONFIDENTIAL 2 There are 3.4 identities stolen every 12 seconds and produces an average loss.

Slides:



Advertisements
Similar presentations
Connected Health Framework
Advertisements

Trusted Computing in Government Networks May 16, 2007 Richard C. (Dick) Schaeffer, Jr. Information Assurance Director National Security Agency.
Ljubomir Ivaniš CPU d.o.o.
1 Vladimir Knežević Microsoft Software d.o.o.. 80% Održavanje 80% Održavanje 20% New Cost Reduction Keep Business Up & Running End User Productivity End.
Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
VMware Virtualization Last Update Copyright Kenneth M. Chipps Ph.D.
-How To leverage Virtual Desktop for Manageability & Security -Desktop Computing “as a service” Andreas Tsangaris CTO, PERFORMANCE
Minimising IT costs, maximising operational efficiency desktop.
Leaders Have Vision™ visionsolutions.com 1 Double-Take for Hyper-V Overview.
Chapter 10 Managing the Delivery of Information Services.
Virtual Machine approach to Security Gautam Prasad and Sudeep Pradhan 10/05/2010 CS 239 UCLA.
VIRTUALIZATION AND YOUR BUSINESS November 18, 2010 | Worksighted.
VAP What is a Virtual Application ? A virtual application is an application that has been optimized to run on virtual infrastructure. The application software.
Navigating the Maze How to sell to the public sector Adrian Farley Chief Deputy CIO State of California
1 Jon Whitfield Agency CEO Head of Government Internal Audit.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Maximize.
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
7/23/2009 Capabilities Briefing For CDCA Andy Carter
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Ingram.
© Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Buying factors – HP.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Data Center Solutions Marketing Data Center Business Advantage Customer Proof.
Market Intelligence: Trends and Strategies
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
April 9,  Employers  IS Careers  Business Support  Key Trends  Manage your career  Questions 2.
Anderson School of Management University of New Mexico.
Dell Connected Security Solutions Simplify & unify.
Enterprise User Enabling Warfighter Capability
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B17 Organizational Architecture Trends.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Cisco Confidential 1 © 2011 Cisco and/or its affiliates. All rights reserved. Customer Name Date Cisco Transformative Networking Lifecycle Financing that.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Future of the Server Room Tour. Ottawa Montreal Calgary Vancouver Toronto Future of Your Server Room Three Pillars of Windows Server 2008 Virtualization.
©2015 EarthLink. All rights reserved. Private Cloud Hosting Create Your Own Private IT Environment.
Chapter 5 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks
Welcome Georgia Infrastructure Transformation 2010 Kick-off Meeting January 30, 2008.
LegendCorp What is System Center Virtual Machine Manager (SCVMM)? SCVMM at a glance Features and Benefits Components / Topology /
Private Cloud Hosting. IT Business Challenges I need to extend my on-premises virtualized environment to utilize the Cloud and manage the entire environment.
© 2014 IBM Corporation Does your Cloud have a Silver Lining ? The adoption of Cloud in Grid Operations of Electric Distribution Utilities Kieran McLoughlin.
SOFTWARE DEFINED NETWORKING/OPENFLOW: A PATH TO PROGRAMMABLE NETWORKS April 23, 2012 © Brocade Communications Systems, Inc.
SAM for SQL Workloads Presenter Name.
Microsoft and Symantec
Global Strategy. Mitch Rowe.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
Mark Gilbert Microsoft Corporation Services Taxonomy Building Block Services Attached Services Finished Services.
Connect with life Ravi Sankar Technology Evangelist | Microsoft Corporation Ravisankar.spaces.live.com/blog.
Sponsored by: 1 The State of Corporate A Survey of IT Professionals October 2013.
1 Acquisition Automation – Challenges and Pitfalls Breakout Session # E11 Name: Jim Hargrove and Allen Edgar Date: Tuesday, July 31, 2012 Time: 2:30 pm-3:45.
Cloud, big data, and mobility Your phone today probably meets the minimum requirements to run Windows Server 2003 Transformational change up.
HP Network and Service Provider Business Unit Sebastiano Tevarotto February 2003.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
©2014 Cleo. All rights reserved. Company confidential. Managing Chaos: Andy Moir Director, Product Marketing 2 Data Movement in 2015.
Copyright 2016, Techarex Networks LLC. | | Call Toll-Free : Benefits Of Hosted QuickBooks For CPA Firms.
Unix Server Consolidation
Maritime Security as an Integral Part of an
Chapter 6: Securing the Cloud
Volume Licensing Readiness: Level 100
Segmap Solutions Mapping segments.
Managing the Delivery of Information Services
Volume Licensing Readiness: Level 100
Volume Licensing Readiness: Level 100
Information Security: Risk Management or Business Enablement?
How to Mitigate the Consequences What are the Countermeasures?
Virtualization.
Computer Services Business challenge
Presentation transcript:

MULTI-LEVEL SECURITY for NATO 1

OUTSIDE MARKET FORCES DELL CONFIDENTIAL 2 There are 3.4 identities stolen every 12 seconds and produces an average loss of $3,257 per event. Identity Theft COUNTERFEIT In the first quarter of 2008, there were $76 million of counterfeit networking boards seized by government officials. Intelligence analysts state that China’s military regards offensive computer operations as “critical to seize the initiative” in the first stage of a war ASIS Conference Technolytics State of Insecurity Answer today: Separate / isolate the risk Remove the weakest link Multi-Level Security (MLS) In the first quarter of 2008, there were 360,000 counterfeit microprocessors seized by government officials. COUNTERFEIT

IMPACT OF SEPARATION / PAIN POINTS  Results of Pain Points: –Security requirements may be waived or circumvented to accommodate the mission and flexibility of end-user and administrator –Systems may not be maintained to standards because of increased complexity –IT managers forced to balance management and level of risks with the agency’s mission and end-user needs. DELL CONFIDENTIAL Increased Network Security – layered, separate networks to block unauthorized data access/security breaches Complex infrastructure – multiple client platforms/user; requires increased cost/management Increased Staffing – duplicate management and break-fix Inefficient – Cross Domain coordination 3

DELL CONFIDENTIAL DELL’S FOCUS ON MLS MULTI-LEVEL SECURITY 4

MISSION VALUE - RISK TOLERANCE ALIGNS INVESTMENT Agency Initiatives Information Technology Environment MissionComplianceCost ReductionContinuity of OperationsCustomers Where does it go? What information is important to protect? What are the potential threats? Risk What risks do we accept? What risks do we need to protect against to enable the mission? S E N S I T I V E I N F O R M A T I O N S E N S I T I V E I N F O R M A T I O N NetworkEndpointApp/DBStorageFS/CMS S E C U R I T Y I N C I D E N T S S E C U R I T Y I N C I D E N T S 5

DELL’S SOLUTION MODELS DELL CONFIDENTIAL 6 Partner Third party technology marketed by Dell Supported through third party No guarantee of functionality or performance by Dell Bundled Solution Third party technology available through Dell solutioning Support may be from Dell custom support or third party Third party technology combined with Dell technology for custom integration Engineered Technology solution engineered by Dell to provide outstanding performance Dell branded solution Fully Integrated into Dell Support and Warranty Service

DELL CONFIDENTIAL 7 KEY TENETS  Engineered into platform  Supports OEM Model  High-Assurance Technologies  Simplify for end-user  Commoditize for cost savings  Lifecycle consideration DELL SECURITY SOLUTIONS MARKET APPROACH

PARTNER SOLUTION DELL CONFIDENTIAL  Thin client approach, using software (from partner) to address MLS  Dell provides hardware and support services  Partner provides all integration and solution support 8 Software at a host, allowing One Computer to access Multiple Domains

BUNDLED SOLUTION DELL CONFIDENTIAL 9  Multiple Virtual Machines (VMs) approach to MLS on a “fat client”  Complete Data Separation Between VMs  Solution tested and certified by Dell and the partner  DoD and IC Certified  Fully supported (Help Desk and repair) by Dell and partner Software Allowing One Computer to Host Multiple Operating Systems, Security Levels and Domains

ENGINEERED SOLUTION DELL CONFIDENTIAL Hardware BSP Separation Kernel ASP Secure Separation Domain VMM 10 OS Allowing One Computer to Host Multiple Operating Systems, Security Levels and Domains  Multiple Virtual Machines (VMs) approach to MLS on a “fat client”  Complete OS & Data Separation Between VMs  Solution engineered, from the beginning by Dell and key partners  Tested and certified by Dell and the partners  EAL Level 6 certified OS  Fully supported (Help Desk and repair) by Dell

WHAT ARE THE APPLICATIONS NEEDING MLS TECHNOLOGY? TODAY:  Intelligence & Defense: –Multiple Security Domains –Consolidated Battle Space View –Consolidated Inbox –Collaboration & Information Sharing INCREASINGLY  Critical Infrastructure: –Financial –Utilities –Healthcare 11 MLS technology is the foundation for building these future capabilities DELL CONFIDENTIAL

DELL TECHNOLOGY VISION Why invest in Security Solutions?  Market trending toward higher security solutions  Differentiated product  Large opportunity for differentiated secure platform What does Dell contribute?  Production scale  Unique capability to enhance security at foundation  OEM support model  Standards Development DELL CONFIDENTIAL 12

Q&A 13