+ All Categories
Home > Business > Unisys Stealth Black

Unisys Stealth Black

Date post: 19-May-2015
Category:
Upload: global-consulting
View: 1,484 times
Download: 2 times
Share this document with a friend
Popular Tags:
27
Unisys STEALTH solution for data security AFCEA Sofia Chapter Conference Sofia, 18 May 2011
Transcript
Page 1: Unisys Stealth Black

Unisys STEALTH solution

for data security

AFCEA Sofia Chapter ConferenceSofia, 18 May 2011

Page 2: Unisys Stealth Black

Unisys STEALTH solution for data security

Content:1. Introduction

2. Description

3. Implementation

4. Certificate

5. Conclusion

NSA Awards Unisys Stealth EAL-4

Page 3: Unisys Stealth Black

Unisys STEALTH solution for data security

1. Introduction

The Unisys Stealth Solution is a transformational way to protect your network data. It starts by using certified encryption, then bit-splits data into multiple slices as it moves through the network.

But more than that, the Stealth Solution allows multiple communities of interest to share the same network without fear of another group accessing their data or even their workstations and servers.

The result is a much simpler network infrastructure, increased agility to react to new opportunities, and enhanced security of your network data.

NSA Awards Unisys Stealth EAL-4

Page 4: Unisys Stealth Black

Unisys STEALTH solution for data security

1. Introduction

To deliver the right information to the right people at the right time, defense agencies need to overcome the challenge of securing a collaborative environment.

There are, however, inhibitors to achieving this vision. Many defense agencies have specific regulations for multi-level security. They have environments across the world where the networks are often unpredictable and at times unreliable.

NSA Awards Unisys Stealth EAL-4

Page 5: Unisys Stealth Black

Unisys STEALTH solution for data security

1. Introduction

As a result, defense agencies are forced to field multiple independent global and regional networks to provide services to individuals who need access to controlled unclassified information (CUI), secret, and top-secret data.

Access to more than one of these networks requires multiple LANs and PCs for the user. Simultaneously, the demand is growing to share information across these networks

NSA Awards Unisys Stealth EAL-4

Page 6: Unisys Stealth Black

Unisys STEALTH solution for data security

1. Introduction

Physical security, such as maintaining separate LANs, is one way defense agencies are securing data. By keeping the data physically separated, certain security objectives can be achieved, but at what cost?

There are challenges related to duplication of infrastructure, higher maintenance costs, and information sharing among communities of interest, such as coalition partners

The Unisys Stealth Solution for Network is designed specifically to overcome this challenge and targets the SBU and classified domains

NSA Awards Unisys Stealth EAL-4

Page 7: Unisys Stealth Black

Unisys STEALTH solution for data security

2. Description

The Stealth Solution for Network is a transformational solution that secures data-in-motion and controls the sharing of information within or across networks by employing an innovative cloaking technique – all while vastly simplifying the infrastructure.

The Stealth Solution assures security by cryptographically transforming information using a bit-level, data-splitting algorithm that weaves the data into the very fabric of the network.

NSA Awards Unisys Stealth EAL-4

Page 8: Unisys Stealth Black

Unisys STEALTH solution for data security

2. Description

The Stealth Solution for Network:

Protects the confidentiality, integrity, and availability of data-in-motion and data-at-rest

Allows multiple communities of interest to share the same network securely

Cloaks Stealth Solution-equipped devices from unauthorized eyes

NSA Awards Unisys Stealth EAL-4

Page 9: Unisys Stealth Black

Unisys STEALTH solution for data security

2. Description

For defense and agency networks: It protects the security and integrity of data on a single network by preventing unauthorized access

For coalition operations: It allows nations to selectively control the sharing of information across a common coalition network or between a coalition network and a national network

For privacy concern: It creates communities of interest that control access to information based upon user roles and responsibilities

NSA Awards Unisys Stealth EAL-4

Page 10: Unisys Stealth Black

Unisys STEALTH solution for data security

2. Description

For cross-domain information sharing: It permits data classified at different levels to coexist on a single network, enabling the consolidation of different networks into a single IT infrastructure. It offers users access only to the information they are authorized.

Permitting the consolidation of NIPR, SIPR, and JWICS-connected LANs into a single IT infrastructure

NSA Awards Unisys Stealth EAL-4

Page 11: Unisys Stealth Black

Unisys STEALTH solution for data security

2. Description

The Stealth Solution for Network employs a Unisys-developed information management architecture that fundamentally alters the approach to data protection by directing and controlling parsed data “slices”

The solution consists of appliances (with in-built software) that are deployed throughout the network at key locations. Software also resides on workstations and servers in the network.

NSA Awards Unisys Stealth EAL-4

Page 12: Unisys Stealth Black

Unisys STEALTH solution for data security

2. Description -

NSA Awards Unisys Stealth EAL-4

Typical Agency Multi-Layered Infrastructure

Page 13: Unisys Stealth Black

Unisys STEALTH solution for data security

2. Description -

NSA Awards Unisys Stealth EAL-4

Unisys Stealth Solution Infrastructure

The Stealth Solution consolidates installation networks into one infrastructure and offers a single interface to the Global Information Grid

Page 14: Unisys Stealth Black

Unisys STEALTH solution for data security

2. Description

The Unisys Stealth Solution for Network:

- Splitting and encryption embedded in the Stealth Solution

- Stealth endpoint runs in every workstation, server, and gateway

- Splits IP packets and controls access to data

- User workgroup keys control packet splitting and access to servers

The result is a cloaked network that secures data-in-motion and hides servers and PCs in plain sight

NSA Awards Unisys Stealth EAL-4

Page 15: Unisys Stealth Black

Unisys STEALTH solution for data security

2. Description

The Stealth Solution for SAN:

Unisys is the only solution that enables data classified at different security levels to coexist on a single storage area network while vastly improving availability of stored data.

Plus for SANs, it eliminates the need for complex and expensive remote mirror data replication software.

NSA Awards Unisys Stealth EAL-4

Page 16: Unisys Stealth Black

Unisys STEALTH solution for data security

2. Description

The Stealth Solution for SAN:

NSA Awards Unisys Stealth EAL-4

Multiple communities of interest (or domains) can safely share storage

Page 17: Unisys Stealth Black

Unisys STEALTH solution for data security

2. Description

The Stealth Solution for SAN:

NSA Awards Unisys Stealth EAL-4

Even when local storage disks are unavailable,data can be read from other storagedevices, re-assembled, and decrypted For unique “always-on” capabilities

Page 18: Unisys Stealth Black

Unisys STEALTH solution for data security

2. Description

The Stealth Solution for SAN:

Protects the confidentiality, integrity, and availability of data-at-rest

Allows multiple communities of interest to share the same storage network securely

Provides “always-on” data availability

NSA Awards Unisys Stealth EAL-4

Page 19: Unisys Stealth Black

Unisys STEALTH solution for data security

2. Description

The Stealth Solution for SAN:

For defense and agency networks: It protects the security and integrity of data on a single network or SAN by preventing unauthorized access

For coalition operations: It allows nations to selectively control the sharing of information across a common coalition network or SAN or between a coalition infrastructure and a national infrastructure

NSA Awards Unisys Stealth EAL-4

Page 20: Unisys Stealth Black

Unisys STEALTH solution for data security

2. Description

The Stealth Solution for SAN:

For privacy concerns: It creates communities of interest that control access to information based upon user roles and responsibilities

For cross-domain information sharing: It permits data classified at different levels to coexist on a single network or SAN, enabling the consolidation of different networks and SAN into a single infrastructure. It offers users access only to the information they are authorized

NSA Awards Unisys Stealth EAL-4

Page 21: Unisys Stealth Black

Unisys STEALTH solution for data security

3. Implementation

Unisys Corporation was tasked, to demonstrate and validate a Cryptographic Bit Splitting Technology (CBST) solution

The goal was to determine possible benefits for :

Joint Improvised Explosive Device Defeat Organization (JIEDDO) field operations

United States Joint Forces Command (USJFCOM)

Joint Transformation Center – Intelligence (JTC-I)

Joint Intelligence Laboratory (JIL) network convergence, and other applications.

NSA Awards Unisys Stealth EAL-4

Page 22: Unisys Stealth Black

Unisys STEALTH solution for data security

3. Implementation – U.S. Special Operations Command

Unisys Corporation was tasked, under Defense Information Systems Agency (DISA) Encore II to analyze the existing United States Special Operations Command (USSOCOM) Tactical Local Area Network (TACLAN) infrastructure, and subsequently develop and demonstrate a prototype solution integrating Unisys Stealth Solution for Network and Stealth Solution for Storage Area Network (SAN) into the TACLAN Version 9.0 system. The customer for the project is the USSOCOM-TACLAN Program Management Office (PMO).

The goal of the project is to provide a prototype that will enhance overall TACLAN operability by allowing for a smaller footprint, distributed and secure data storage, and easy integration into the current spiral development track of the TACLAN program

NSA Awards Unisys Stealth EAL-4

Page 23: Unisys Stealth Black

Unisys STEALTH solution for data security

4. Certificate

NSA Awards Unisys Stealth EAL-4

Page 24: Unisys Stealth Black

Unisys STEALTH solution for data security

4. Certificate

Unisys Stealth Solution for Networks Certified by NSA to Protect Classified Government Data

Patent-pending Unisys solution provides encrypted "virtual communities of interest" to protect data across any public or private network

BLUE BELL, Pa., April 13, 2011 /PRNewswire/ -- Unisys today announced that the Unisys Stealth Solution for Network achieved EAL-4+ certification from the National Security Agency (NSA) as a secure solution for protection of data-in-motion across any network -- private or public. This qualifies Stealth to protect U.S. Defense Department data classified up to the "secret" level.

NSA Awards Unisys Stealth EAL-4

Page 25: Unisys Stealth Black

Unisys STEALTH solution for data security

5. Conclusion

The Unisys Stealth Solution: Securing Networks and SANs

Splitting and encryption embedded in the Stealth Solution

Stealth management software controls access to data within a community of interest

User workgroup keys control access to a specific community of interest

The result is a cloaked network or SAN that secures data-in-motion and data-at-rest and hides data in plain sight

NSA Awards Unisys Stealth EAL-4

Page 26: Unisys Stealth Black

Unisys STEALTH solution for data security

5. Conclusion

Revolutionary Security - With Stealth, you have a much simpler and more cost-effective consolidated infrastructure, vastly increased data availability for mission critical applications, and enhanced security and privacy of your data

Unisys Stealth Solution - Secure Solutions for Defense Agencies

The Stealth Solution enables you to get the right information to the right people at the right time, SECURELY!

NSA Awards Unisys Stealth EAL-4

Page 27: Unisys Stealth Black

Unisys STEALTH solution for data security

Content:1. Introduction

2. Description

3. Implementation

4. Certificate

5. Conclusion

QUESTIONS ?

NSA Awards Unisys Stealth EAL-4


Recommended