Download presentation
Presentation is loading. Please wait.
Published byDavin Hardcastle Modified over 9 years ago
1
MULTI-LEVEL SECURITY for NATO 1
2
OUTSIDE MARKET FORCES DELL CONFIDENTIAL 2 There are 3.4 identities stolen every 12 seconds and produces an average loss of $3,257 per event. Identity Theft COUNTERFEIT In the first quarter of 2008, there were $76 million of counterfeit networking boards seized by government officials. Intelligence analysts state that China’s military regards offensive computer operations as “critical to seize the initiative” in the first stage of a war. 2008 ASIS Conference Technolytics State of Insecurity Answer today: Separate / isolate the risk Remove the weakest link Multi-Level Security (MLS) In the first quarter of 2008, there were 360,000 counterfeit microprocessors seized by government officials. COUNTERFEIT
3
IMPACT OF SEPARATION / PAIN POINTS Results of Pain Points: –Security requirements may be waived or circumvented to accommodate the mission and flexibility of end-user and administrator –Systems may not be maintained to standards because of increased complexity –IT managers forced to balance management and level of risks with the agency’s mission and end-user needs. DELL CONFIDENTIAL Increased Network Security – layered, separate networks to block unauthorized data access/security breaches Complex infrastructure – multiple client platforms/user; requires increased cost/management Increased Staffing – duplicate management and break-fix Inefficient – Cross Domain coordination 3
4
DELL CONFIDENTIAL DELL’S FOCUS ON MLS MULTI-LEVEL SECURITY 4
5
MISSION VALUE - RISK TOLERANCE ALIGNS INVESTMENT Agency Initiatives Information Technology Environment MissionComplianceCost ReductionContinuity of OperationsCustomers Where does it go? What information is important to protect? What are the potential threats? Risk What risks do we accept? What risks do we need to protect against to enable the mission? S E N S I T I V E I N F O R M A T I O N S E N S I T I V E I N F O R M A T I O N NetworkEndpointApp/DBStorageFS/CMS S E C U R I T Y I N C I D E N T S S E C U R I T Y I N C I D E N T S 5
6
DELL’S SOLUTION MODELS DELL CONFIDENTIAL 6 Partner Third party technology marketed by Dell Supported through third party No guarantee of functionality or performance by Dell Bundled Solution Third party technology available through Dell solutioning Support may be from Dell custom support or third party Third party technology combined with Dell technology for custom integration Engineered Technology solution engineered by Dell to provide outstanding performance Dell branded solution Fully Integrated into Dell Support and Warranty Service
7
DELL CONFIDENTIAL 7 KEY TENETS Engineered into platform Supports OEM Model High-Assurance Technologies Simplify for end-user Commoditize for cost savings Lifecycle consideration DELL SECURITY SOLUTIONS MARKET APPROACH
8
PARTNER SOLUTION DELL CONFIDENTIAL Thin client approach, using software (from partner) to address MLS Dell provides hardware and support services Partner provides all integration and solution support 8 Software at a host, allowing One Computer to access Multiple Domains
9
BUNDLED SOLUTION DELL CONFIDENTIAL 9 Multiple Virtual Machines (VMs) approach to MLS on a “fat client” Complete Data Separation Between VMs Solution tested and certified by Dell and the partner DoD and IC Certified Fully supported (Help Desk and repair) by Dell and partner Software Allowing One Computer to Host Multiple Operating Systems, Security Levels and Domains
10
ENGINEERED SOLUTION DELL CONFIDENTIAL Hardware BSP Separation Kernel ASP Secure Separation Domain VMM 10 OS Allowing One Computer to Host Multiple Operating Systems, Security Levels and Domains Multiple Virtual Machines (VMs) approach to MLS on a “fat client” Complete OS & Data Separation Between VMs Solution engineered, from the beginning by Dell and key partners Tested and certified by Dell and the partners EAL Level 6 certified OS Fully supported (Help Desk and repair) by Dell
11
WHAT ARE THE APPLICATIONS NEEDING MLS TECHNOLOGY? TODAY: Intelligence & Defense: –Multiple Security Domains –Consolidated Battle Space View –Consolidated Inbox –Collaboration & Information Sharing INCREASINGLY Critical Infrastructure: –Financial –Utilities –Healthcare 11 MLS technology is the foundation for building these future capabilities DELL CONFIDENTIAL
12
DELL TECHNOLOGY VISION Why invest in Security Solutions? Market trending toward higher security solutions Differentiated product Large opportunity for differentiated secure platform What does Dell contribute? Production scale Unique capability to enhance security at foundation OEM support model Standards Development DELL CONFIDENTIAL 12
13
Q&A 13
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.