Download presentation
Presentation is loading. Please wait.
Published byElwin Maurice Cook Modified over 9 years ago
1
1 Secure Interoperability within the Defence Supply Chain Colin Nash – Business Development Manager Thursday 28 th October 2010
2
Introduction How Deep-Secure have used the Transglobal Secure Collaboration Programme (TSCP) specification to enable interoperability within the Defence Supply Chain. The UK MOD sponsored the demonstration of secure information exchange in the supply chain at CWID 2010 –Based on a Deep-Secure interoperability demonstration incorporating BAE Systems and TSCP (CertiPath) –Helping to understand applicability of the solutions to enable better sharing of information between MOD and supply chain organisations 2
3
Secure Interoperability within the Defence Supply Chain The aim of TSCP is provide a secure means of exchanging information between Aerospace and Defence Companies and the Government Organisations they deal with, such as UK MOD, US DOD and NL MOD This is achieved through the adoption of common standards for secure email and document labelling Deep-Secure is a Silver Member of TSCP 33 Deep-Secure Mail Guard www.tscp.org
4
Aim of the CWID 10 Trial To demonstrate secure messaging capabilities using the TSCP specification Enabled by the Deep-Secure Mail and Directory Guard Configured for: Encryption and Decryption of SMIME messages Secure Storage of certificates Organisational security policy enforcement Virus scanning Content Analysis Release Control Label checking and transformation Certificate LDAP Lookup 4
5
CWID Architecture 5
6
PKI Cross Certification 6
7
7
8
8 Email Preparation
9
MOD User finding external user encryption certificate 9
10
MOD User Sending encrypted email to an external user 10
11
11 Email Receipt and Verification (Bolden James)
12
12 Email Receipt and Verification (Titus Labs)
13
TSCP Secure Email v1Demo 13
14
TSCP Secure Email v2 Demo 14
15
Summary By adopting common standards this approach allows members of the Supply Chain community to: –Securely Collaborate with partners Assured enforcement of consistent Security Policies Controlled release of information with strong message checking Enhanced security with the use of desktop encryption Adoption of Federated Identity and Access Management Integration of Public Key Infrastructure –Reduce risk Data loss, Export Control transgressions, IPR breaches –Improve efficiency Reduce cost for delivery and operational support Improve and align with the tempo of operations 15
16
Booth Demonstration Architecture Secure Email, Web and Chat 16
17
Thanks to Supporting Companies 17
18
18 Key Contacts Deep-Secure Limited 1 Nimrod House Sandy’s Road Malvern Worcestershire WR14 1JJ +44 (0)1684 217070 www.deep-secure.com Colin Nash Business Development Manager Telephone: +44 (0)7918 053 897 Email: colin.nash@deep-secure.comcolin.nash@deep-secure.com Robin King Head of Sales and Marketing Telephone: +44 (0)7918 053 878 Email: robin.king@deep-secure.comrobin.king@deep-secure.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.