尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Granite Gate Corporation™ Corporate Capabilities Presentation Content Security For Secure Cloud Computing &  Application Development and Integration September 21, 2009 Copyright ©2009 Granite Gate Corporation all rights reserved.
Corporate Capabilities Presentation Briefing Overview Mission and Standards-Based Offering	1 Differentiators	2 Protecting Content and Processes is the Future of Cybersecurity 	3 The Integrated Cyber Solution (ICS) &	4 Application*SECURE* 	  ICS – TecSec	9 ICS – IQware	14 Consulting and Training 	18 Granite Gate Officers and Organization	19 Conclusion 	20 Copyright Information  ©2009 Granite Gate Corporation. All rights reserved. Produced in the United States of America. All trademarks, service marks, and trade names referenced in this material are the property of their respective owners.  • TecSec and CKM are registered trademarks of TecSec, Inc. • IQware is the registered trademark of IQware, Inc. i Granite Gate Corporation™
Granite Gate is a game changer providing a disruptive technology that addresses that address content security and virus immune rule-based applications.  Granite Gate Corporation™ Granite Gate Standards-based Content Security Offerings Mission Integrated Cyber Secure (ICS) *SECURE* Content Applications Provide innovative cybersecurity capabilities that facilitate secure content sharing and secure applications Cyber Security Services Computer-based Content Security Training 1 Granite Gate Corporation™
Granite Gate’s content security differentiators: ,[object Object]
Standards Based ANSIX9.69, X9.73, X9.84, X9.96, and others
Fits within existing infrastructure and is scalable
Secures data at rest and data in motion over time
Enhances PKI
Integrates secure “front-end” technologies with a secure rule-based system “back-end”
The front-end components provide role-based access control (RBAC), privilege management, ID authentication, key management, and encryption,
The back-end components provides a virus-immune, rule-base, cross-platform software system and business intelligent engine.
Delivers an application platform that is agile, rule based, updates made in real-time, and hacker proof & virus immune.
Cross platform – supports Windows, Apple, Unix, and small format devises.Granite Gate’s INTEGRATION ties the front-end and back-end = “turn-key secure system”  2 Granite Gate Corporation™
Recent events validate our market - the future of cybersecurity is to supplement network security with protection of the content.  The President’s Cyberspace Policy Review Report of May 25, 2009 - Cyberspace touches practically everything and everyone. It provides a platform for innovation and prosperity and the means to improve general welfare around the globe. But with the broad reach of a loose and lightly regulated digital infrastructure, great risks threaten nations, private enterprises, and individual rights. The government has a responsibility to address these strategic vulnerabilities  Lawrence H. Summers, senior White House economic adviser, is pushing for the National Economic Council to have a key role in cybersecurity … ,[object Object]
It discusses the need to provide incentives for greater data sharing and risk management
There exists a plethora of security-in-a-box products on the market, but few address content security in detail. 110th Congress, 2d Session, H, CON. RES September 24, 2008,  425TH, by Republican Rep. Michael Burgess and Democrat Rep. Chuck Gonzalez of Texas cites a litany of losses, exposures and shortfalls in protecting personal information, and notes that 36 states already have taken the lead in passing their own data security legislation. Nevada law NRS 597.970 of Title 52of the state code. It says that, 'A business in this State shall not transfer any personal information of a customer through an electronic …unless the business uses encryption to ensure the security of electronic transmission. 3 Granite Gate Corporation™
Granite Gate provides the Integrated Cyber Secure (ICS) for secure information sharing and secure application development and integration.  A key product is Application*SECURE* Next Twenty Five Years Last Twenty Five Years Secure Key Management Positive ID & Privilege Management Desktop  Applications Constructive Keys Dedicated Applications Secure Information Sharing Application *SECURE* Secure Rule Data Vulnerable Architecture Enterprise Application Privilege Mgt. Networks ID of Merit Website Secure Rule Based Applications Secure Data at Rest & Data in Motion Secure Server Granite Gate Corporation™ 4 Granite Gate Corporation™
Granite Gate’s Integrated Cyber Secure (ICS) including Application*SECURE* is based on proven technologies from corporate partner TecSec (www.tecsec.com) and shareholder IQware (www.iqware.us) Access Control Devise (ID card, biometric, etc.) Workstation (Windows, Mac, Linux) Network, Internet, or Connection Secure Server (DOD rated  B2/C2) X-Toolkit, X-Intrinsics, X-Lib ,  X-Protocol X- Server, X-Protocol, X-Display Identity of Merit Role Based  Access Control Privilege Management Business Logic Rule-Based Applications Open Office *SECURE*   & OtherApplications Encrypted Data Constructive Key  Management (CKM®TECSEC )  Encrypted Data TecSec Domain IQware Domain Hardware Dependent Graphics Hardware Dependent inputs Granite Gate Domain Integrated Cyber Secure (ICS) Framework 5 Granite Gate Corporation™
Granite Gate’s Integrated Cyber Secure addresses serious vulnerabilities in government and commercial markets.  Secure Server (DOD Rated  B2/C2) Access Control Devise (Card, biometric, etc.) Workstation (Windows, Mac, Linux) Network, Internet, or Connection Architecture Open Office*SECURE*  & OtherApplications on Server Encrypted Data Authoring (key strokes) Process Assignment of Privileges  by Role & by Author Virus Immune Rule-based processing Encrypted Data Requested Data Deciphered Based on Approved Role Encrypted Data Encrypted Info on Secure Server Technology Constructive Key Management   & Encryption Rule-Based  Applications Identity of Merit Integrated Environment  6 Granite Gate Corporation™
TecSec, a Granite Gate partner, provides patented, standards-based technologies that manages credentials and key management.  Secure Server (DOD Rated  B2/C2) Access Control Devise (Card, biometric, etc.) Workstation (Windows, Mac, Linux) Network, Internet, or Connection Architecture Open Office*SECURE*  & OtherApplications on Server Encrypted Data Authoring (key strokes) Process Assignment of Privileges  by Role & by Author Virus Immune Rule-based processing Encrypted Data Requested Data Deciphered Based on Approved Role Encrypted Data Encrypted Info on Secure Server Technology Constructive Key Management   & Encryption Rule-Based  Applications Identity of Merit Integrated Environment  7 Granite Gate Corporation™
TecSec, a Granite Gate partner provides patented technologies approved by NSA. Information  Sharing IA Objectives CKM – ANSI X9.69 CKM – a Flexible Solution Assured Information Sharing Cornerstone Provide ability to dynamically share information at multiple classification levels among U.S., allied, and coalition forces.Information access is based on mission need, information sensitivity (value), service being requested, entity’s identity and privileges, and level of protection provided by an entity’s environment. ,[object Object]
Includes people, devices, services, and information

More Related Content

What's hot

Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
scoopnewsgroup
 
Blockchain spreads
Blockchain spreadsBlockchain spreads
Blockchain spreads
Zhengnan Zhao
 
IoT Security
IoT SecurityIoT Security
IoT Security
Peter Waher
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
Kyle Lai
 
What is a blockchain api how can you integrate in your website
What is a blockchain api  how can you integrate in your website What is a blockchain api  how can you integrate in your website
What is a blockchain api how can you integrate in your website
Blockchain Council
 
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
Aharon Aharon
 
Arm the World with SPN based Security
Arm the World with SPN based SecurityArm the World with SPN based Security
Arm the World with SPN based Security
Liwei Ren任力偉
 
The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...
Ulf Mattsson
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
Ivan Carmona
 
Sb fortinet-nozomi
Sb fortinet-nozomiSb fortinet-nozomi
Sb fortinet-nozomi
Ivan Carmona
 
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
SafeNet
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurity
Bob Guimarin
 
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnoxZero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
AccuKnox
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
Harry Gunns
 
Information Security Business Middle East 2011
Information Security Business   Middle East 2011Information Security Business   Middle East 2011
Information Security Business Middle East 2011
Arjun V
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
ForeScout Technologies
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
Trend Micro
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
Advanced Technology Consulting (ATC)
 
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Tony Pearson
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
Block Armour
 

What's hot (20)

Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
Blockchain spreads
Blockchain spreadsBlockchain spreads
Blockchain spreads
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
What is a blockchain api how can you integrate in your website
What is a blockchain api  how can you integrate in your website What is a blockchain api  how can you integrate in your website
What is a blockchain api how can you integrate in your website
 
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
 
Arm the World with SPN based Security
Arm the World with SPN based SecurityArm the World with SPN based Security
Arm the World with SPN based Security
 
The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
 
Sb fortinet-nozomi
Sb fortinet-nozomiSb fortinet-nozomi
Sb fortinet-nozomi
 
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurity
 
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnoxZero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
 
Information Security Business Middle East 2011
Information Security Business   Middle East 2011Information Security Business   Middle East 2011
Information Security Business Middle East 2011
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
 

Similar to General Version 9 21 09

Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
Ulf Mattsson
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
LabSharegroup
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
Amazon Web Services
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
Rishabh Gupta
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
George Wainblat
 
What i learned at gartner summit 2019
What i learned at gartner summit 2019What i learned at gartner summit 2019
What i learned at gartner summit 2019
Ulf Mattsson
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
ssuser57b3e5
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
Microsoft Tech Community
 
Integrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetIntegrated Secure Networking - Fortinet
Integrated Secure Networking - Fortinet
Harry Gunns
 
Kripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdfKripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdf
langkahgontay88
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
Ulf Mattsson
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptx
SonaliG6
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
xKinAnx
 
Z111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910aZ111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910a
Tony Pearson
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
Real-Time Innovations (RTI)
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
Ramy Houssaini
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
International Communications Corporation
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
Divyank Jindal
 
Secure enterprise mobility
Secure enterprise mobilitySecure enterprise mobility
Secure enterprise mobility
DATA SECURITY SOLUTIONS
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the Cloud
Ulf Mattsson
 

Similar to General Version 9 21 09 (20)

Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
 
What i learned at gartner summit 2019
What i learned at gartner summit 2019What i learned at gartner summit 2019
What i learned at gartner summit 2019
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Integrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetIntegrated Secure Networking - Fortinet
Integrated Secure Networking - Fortinet
 
Kripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdfKripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdf
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptx
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Z111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910aZ111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910a
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
Secure enterprise mobility
Secure enterprise mobilitySecure enterprise mobility
Secure enterprise mobility
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the Cloud
 

General Version 9 21 09

  • 1. Granite Gate Corporation™ Corporate Capabilities Presentation Content Security For Secure Cloud Computing & Application Development and Integration September 21, 2009 Copyright ©2009 Granite Gate Corporation all rights reserved.
  • 2. Corporate Capabilities Presentation Briefing Overview Mission and Standards-Based Offering 1 Differentiators 2 Protecting Content and Processes is the Future of Cybersecurity 3 The Integrated Cyber Solution (ICS) & 4 Application*SECURE* ICS – TecSec 9 ICS – IQware 14 Consulting and Training 18 Granite Gate Officers and Organization 19 Conclusion 20 Copyright Information ©2009 Granite Gate Corporation. All rights reserved. Produced in the United States of America. All trademarks, service marks, and trade names referenced in this material are the property of their respective owners. • TecSec and CKM are registered trademarks of TecSec, Inc. • IQware is the registered trademark of IQware, Inc. i Granite Gate Corporation™
  • 3. Granite Gate is a game changer providing a disruptive technology that addresses that address content security and virus immune rule-based applications. Granite Gate Corporation™ Granite Gate Standards-based Content Security Offerings Mission Integrated Cyber Secure (ICS) *SECURE* Content Applications Provide innovative cybersecurity capabilities that facilitate secure content sharing and secure applications Cyber Security Services Computer-based Content Security Training 1 Granite Gate Corporation™
  • 4.
  • 5. Standards Based ANSIX9.69, X9.73, X9.84, X9.96, and others
  • 6. Fits within existing infrastructure and is scalable
  • 7. Secures data at rest and data in motion over time
  • 9. Integrates secure “front-end” technologies with a secure rule-based system “back-end”
  • 10. The front-end components provide role-based access control (RBAC), privilege management, ID authentication, key management, and encryption,
  • 11. The back-end components provides a virus-immune, rule-base, cross-platform software system and business intelligent engine.
  • 12. Delivers an application platform that is agile, rule based, updates made in real-time, and hacker proof & virus immune.
  • 13. Cross platform – supports Windows, Apple, Unix, and small format devises.Granite Gate’s INTEGRATION ties the front-end and back-end = “turn-key secure system” 2 Granite Gate Corporation™
  • 14.
  • 15. It discusses the need to provide incentives for greater data sharing and risk management
  • 16. There exists a plethora of security-in-a-box products on the market, but few address content security in detail. 110th Congress, 2d Session, H, CON. RES September 24, 2008, 425TH, by Republican Rep. Michael Burgess and Democrat Rep. Chuck Gonzalez of Texas cites a litany of losses, exposures and shortfalls in protecting personal information, and notes that 36 states already have taken the lead in passing their own data security legislation. Nevada law NRS 597.970 of Title 52of the state code. It says that, 'A business in this State shall not transfer any personal information of a customer through an electronic …unless the business uses encryption to ensure the security of electronic transmission. 3 Granite Gate Corporation™
  • 17. Granite Gate provides the Integrated Cyber Secure (ICS) for secure information sharing and secure application development and integration. A key product is Application*SECURE* Next Twenty Five Years Last Twenty Five Years Secure Key Management Positive ID & Privilege Management Desktop Applications Constructive Keys Dedicated Applications Secure Information Sharing Application *SECURE* Secure Rule Data Vulnerable Architecture Enterprise Application Privilege Mgt. Networks ID of Merit Website Secure Rule Based Applications Secure Data at Rest & Data in Motion Secure Server Granite Gate Corporation™ 4 Granite Gate Corporation™
  • 18. Granite Gate’s Integrated Cyber Secure (ICS) including Application*SECURE* is based on proven technologies from corporate partner TecSec (www.tecsec.com) and shareholder IQware (www.iqware.us) Access Control Devise (ID card, biometric, etc.) Workstation (Windows, Mac, Linux) Network, Internet, or Connection Secure Server (DOD rated B2/C2) X-Toolkit, X-Intrinsics, X-Lib , X-Protocol X- Server, X-Protocol, X-Display Identity of Merit Role Based Access Control Privilege Management Business Logic Rule-Based Applications Open Office *SECURE* & OtherApplications Encrypted Data Constructive Key Management (CKM®TECSEC ) Encrypted Data TecSec Domain IQware Domain Hardware Dependent Graphics Hardware Dependent inputs Granite Gate Domain Integrated Cyber Secure (ICS) Framework 5 Granite Gate Corporation™
  • 19. Granite Gate’s Integrated Cyber Secure addresses serious vulnerabilities in government and commercial markets. Secure Server (DOD Rated B2/C2) Access Control Devise (Card, biometric, etc.) Workstation (Windows, Mac, Linux) Network, Internet, or Connection Architecture Open Office*SECURE* & OtherApplications on Server Encrypted Data Authoring (key strokes) Process Assignment of Privileges by Role & by Author Virus Immune Rule-based processing Encrypted Data Requested Data Deciphered Based on Approved Role Encrypted Data Encrypted Info on Secure Server Technology Constructive Key Management & Encryption Rule-Based Applications Identity of Merit Integrated Environment 6 Granite Gate Corporation™
  • 20. TecSec, a Granite Gate partner, provides patented, standards-based technologies that manages credentials and key management. Secure Server (DOD Rated B2/C2) Access Control Devise (Card, biometric, etc.) Workstation (Windows, Mac, Linux) Network, Internet, or Connection Architecture Open Office*SECURE* & OtherApplications on Server Encrypted Data Authoring (key strokes) Process Assignment of Privileges by Role & by Author Virus Immune Rule-based processing Encrypted Data Requested Data Deciphered Based on Approved Role Encrypted Data Encrypted Info on Secure Server Technology Constructive Key Management & Encryption Rule-Based Applications Identity of Merit Integrated Environment 7 Granite Gate Corporation™
  • 21.
  • 22. Includes people, devices, services, and information
  • 23. Information labels will define access and protection requirements (Differentiated Quality of Protection)
  • 24. Strong Identification and Authentication of all GIG entities
  • 25. Shift toward object level access control
  • 26. Shift toward policy based Risk Adaptive Access Control (RAdAC) model
  • 27. Mission need, Information policy, and trust level of people, IT and environmental risk factors affect access decision8 Used with permission from TecSec and NSA Granite Gate Corporation™
  • 28.
  • 30. Dynamic, not static, keys9 Used with permission from TecSec and NSA Granite Gate Corporation™
  • 31.
  • 32. Published as ANSI Standards
  • 33. X9.69 Framework For Key Management Extensions
  • 37. Properties of CKM Approach:
  • 38. Key material not specific to individuals
  • 39. Addresses the one-to-many distribution problem of key management
  • 40. Access privileges bound to data via cryptography
  • 41. Built-in key recovery performed by system owner
  • 42. Modeling Role-Based Access Control (RBAC)
  • 44. Complementing PKIC2009 TecSec, Inc. All Rights Reserved 10 Used with permission from TecSec Granite Gate Corporation™
  • 45. Data Protected not the network Encrypted Objects TecSec, a Granite Gate partner provides patented technologies. Information Sharing IA Objectives CKM – ANSI X9.69 CKM – a Flexible Solution CKM is a flexible solution that meets all stated requirements 7 1 Information Created Employees with the correct credentials/ Permissions can read the information and reply in a similar fashion as the original Author. Credentials/Permissions Revocations are controlled by the employees’ organization such as Harris/US Navy/NAVAIR etc. Data remains in an encrypted state indefinitely and always available with the proper permissions. 6 2 Audience Selected *By Content Rule/Description *From Organization’s Taxonomy/Permission Board e.g.Harris/Engineering/Chain/Software Development Active Attributes chart Any server/servers CKM Creates Unique (per object) Confidentiality Wrapper Protects any digital data, text, graphics, audio, video in any transmission format Digital Signature Applied 5 3 CKM Seals the Object 4 Working key is generated C2009 TecSec, Inc. All Rights Reserved 11 Used with permission from TecSec Granite Gate Corporation™
  • 46. IQware, a Granite Gate shareholder, provides virus immune, rule-based & cross platform technology for application development/integration, and master data management/mining . Secure Server (DOD Rated B2/C2) Access Control Devise (Card, biometric, etc.) Workstation (Windows, Mac, Linux) Network, Internet, or Connection Architecture Open Office*SECURE* & OtherApplications on Server Encrypted Data Authoring (key strokes) Process Assignment of Privileges by Role & by Author Virus Immune Rule-based processing Encrypted Data Requested Data Deciphered Based on Approved Role Encrypted Data Encrypted Info on Secure Server Technology Constructive Key Management & Encryption Rule-Based Applications Identity of Merit Integrated Environment 12 Granite Gate Corporation™
  • 47. IQware, a Granite Gate shareholder, provides secure server technologies. Rule - Based Applications Key Features Rule - Specification IQware's Key Features for virus immune applications and data management ● Rule-based Software’s appearance and functionality are 100% controlled by operating rules that can be changed on-the-fly, while the system is running. ● Interoperable Uses thin client (Xlib) architecture (obeys IEEE & POSIX standards) which ensures compatibility with and adaptability to new and emerging hand-held & desktop technologies. ● Secure Solves the ENTIRE security problem by monitoring and controlling all access of subjects to objects. ● Disruptive Forces competitors into uncompetitive and uneconomic tradeoffs. ● Patented US patent awarded for “Method and System for Providing a Virus-Immune, Rule-Based, Cross-Platform Software System”. Additional patents filed. ©2009 IQware, Inc. All Rights Reserved 13 Used with permission from IQware Granite Gate Corporation™
  • 48.
  • 49. We use a TCB (Trusted Computing Base) that is DoD rated B2/C2 for the secure server.
  • 50. We can use any kind of laptop / desktop for the “user input piece” (Windows, Linux, Apple, PDAs, etc.).
  • 51. The client piece is very thin and is available as open source freeware (XLIB).
  • 52. The secure server handles all program logic, decision making and operation execution.
  • 53. All communication to/from client is encrypted.Invention #1: We “cut” the app along this line for interoperability Malware stays here This part of the app runs on ANY client! Business LogicExamine User Input Examine current program state Examine other conditions Make a Decision User InputKey Press Mouse Movement Mouse Click Other Input Invention #2: We put this piece on a DoD-rated secure server for virus-immunity No malware here This part of the app runs on a DoD secure server “Idle Time”Wait for next user input Wait for external event Program ResponsePerform operation(s) Execute routine(s) Terminate © 2009 IQware, Inc. All Rights Reserved 14 Used with permission from IQware Granite Gate Corporation™ C2009 IQware, Inc. All Rights Reserved
  • 54.
  • 55. Planar code is suitable for DoD “A1” level certification and EAL-7 certification.
  • 56. The reference monitor implemented within OVMS handles security at the lowest layer.
  • 57. Two main loops – the “event loop” and the “action loop”.
  • 58. The event loop gathers events which include UIF (user interface) and rule events.
  • 59. The action loop performs all rule-directed actions.
  • 60. Rules are referenced by a unique ID and are executed in the order determined by their configuration.
  • 61.
  • 62. Not all items are relevant for each rule.
  • 63. Rules are graphically configured by an intuitive editor, IQ-Build.
  • 64. Rules may have dependencies on other rules for increased flexibility.© 2009 IQware, Inc. All Rights Reserved 15 Used with permission from IQware Granite Gate Corporation™
  • 65. Granite Gate’s INTEGRATION ties the front-end and back-end to provide the turn-key secure system “ICS” Secure Server (DOD Rated B2/C2) Access Control Devise (Card, biometric, etc.) Workstation (Windows, Mac, Linux) Network, Internet, or Connection Architecture Open Office*SECURE* & OtherApplications on Server Encrypted Data Authoring (key strokes) Process Assignment of Privileges by Role & by Author Virus Immune Rule-based processing Encrypted Data Requested Data Deciphered Based on Approved Role Encrypted Data Encrypted Info on Secure Server Technology Constructive Key Management & Encryption Rule-Based Applications Identity of Merit Integrated Environment 16 Granite Gate Corporation™
  • 66.
  • 67. Integration of IQware and TecSec technologies to form the ICS 1
  • 68.
  • 69. “the application is controlled by rules not hard coded logic”
  • 70.
  • 72.
  • 73. Data encryption1Exclusive integration rights 17 Granite Gate Corporation™
  • 74. Granite Gate’s services and training capabilities are focused on the Integrated Cyber Secure (ICS) product, TecSec and IQware Technologies. Cyber Security Services ICS Implementation Audit and Assessment Management and Policy Technical Implementation Program Management Role-Based Application Development Application Integration Computer-based Training ICS TecSec Technologies IQware Technologies Security Policy & Practices Application*SECURE* Role-Based Application 18 Granite Gate Corporation™
  • 75. Granite Gate is lead by a team of highly qualified professionals. John Keihm Board of Directors Board of Advisors - Chairman William Donahue (LtG Ret) Chief Executive Edward Merrill Bruce Bohn (BG Ret) Executive Vice President Engineering & Operations Tom Verbeck (BG Ret) John Keihm(Dir DIA Ret) Vice President Business Development B. J. Penn*(SECNAV Ret) Pending Director Federal Sales Director Engineering Director Marketing Director Consulting Director PR and Programs Director Training * Pending 19 Granite Gate Corporation™
  • 76.
  • 77. Key corporate shareholder and partner bring technologies to Granite Gate
  • 78. State of the art technologies: ICS and Application*SECURE*
  • 79. Disruptive technologies (makes all others uncompetitive and uneconomical)
  • 80. Compelling computer-based cyber security training content
  • 81. Products and services supplement network security and operate within the existing infrastructure
  • 82. Standards based processes and products (ANSI, NIST, ITIL, FIPS, HIPAA, CISSP,) (and CMMI Level 2 pending)
  • 83. TS Facility Clearance (pending)All elements are synergistic within the ICS framework. Together, they create a compelling offer for our customers, partners, and investors. 20 Granite Gate Corporation™
  翻译: