Agile Coalition Environment (ACE) Freedom within a Framework. Michele McGuire Space & Naval Warfare Systems Command Office of Chief Engineer (056)
|
|
- Silas Taylor
- 6 years ago
- Views:
Transcription
1 Agile Coalition Environment (ACE) Freedom within a Framework Michele McGuire Space & Naval Warfare Systems Command Office of Chief Engineer (056)
2 Points of Contact Sponsor: U.S. Pacific Command Mr. Randall Cieslak, CIO (808) Program Manager: SPAWAR, Office of Chief Engineer: Ms. Michele McGuire, O56 (858)
3 Overview Background Joint Warrior Interoperability Demonstration (JWID) ACE Overview ACE Architecture ACE Capabilities Summary & Questions 2
4 Background Technology evolved during 5 years of development & experimentation Network Centric Q-70 Tech Insertion Program w/ Naval Sea Systems Command Space and Naval Warfare (SPAWAR) System Center San Diego Lab USS Coronado Sea Based Battle Lab (SBBL) Fleet Battle Experiment India (FBE I) Joint Warrior Interoperability Demonstrations (JWID) in 2000, 2001, and Pacific Theater Initiative 2002 U.S. Pacific Command (PACOM) ACE Architecture Development Currently in Spiral Development/ Operational Experimentation Phase 3
5 Basic Architecture Overview VPN 4
6 Experimentation - JWID 03 Camp Smith, HI Pacific Command Headquarters Mail & COP Guards VPN Multi- National Task Force (MTF) CFMCC San Diego CFBL Network CFLCC Dahlgren 10 Eyes VPN Access 6 Eyes VPN Access 10 Eyes Network 6 Eyes Network United Kingdom Canada 6 Eyes Network w/ 10 Eye Tunneling End User Stations Australia New Zealand 10 Eyes Access VPN Device Stateless Dynamic VPN and improves and protects information networks Ultra Thinfrom attack Dual-Domain Access Client 6 Eyes Access Smartcard Single Display Strong I&A 5
7 JWID 2003 Benefits & Results Benefits: Eliminated need for Type 1 devices for data separation Stateless seats coupled to Enhanced Assurance Level (EAL) 4 certified Virtual Private Network (VPN) devices allow access to multiple domains Server-centric construct used to build centralized and manageable Communities of Interest (COIs) Centralized network management with dynamic re-configuration in near real-time Results: Successfully demonstrated data sharing between two domains across 7 sites Successfully provided Coalition Interoperability Successfully provided information sharing between Coalition partners ACE Successfully leverages demonstrated new information ability technology to rapidly to connect reconfigure troops COIs and their operations Successfully demonstrated user access control to the network 6
8 Agile Coalition Environment Technology successfully demonstrated during previous JWIDs Network Centric Computing (NCC) plus VPN s & Trusted Solaris (TSol) to consolidate networks & enhance flexibility for rapid reconfiguration Integrate High Assurance VPNs onto existing, ubiquitous networks Data domain separation Centralized, policy driven network access control tied to strong 2-factor Identification & Authentication (I&A) Appropriate data encryption for separation vs. confidentiality: Type 2 where appropriate and Type 1 where necessary 7
9 Consolidation & Simultaneous Visualization Single Display Visualization of many Desktops 8
10 ACE Architectural Direction Coalition WAN Centralized, policy driven network access controllers Positioned in U.S. spaces Type 1 devices eliminated for data separation U.S. PCs Fastlane Fastlane U.S. NOC Coalition Network Security Controller DVPN Traditional clients supported via tunneling Coalition Enclave Traditional PCs And Servers HA VPN for selective inclusion of users with need via GW connect U.S. Network Security Controller DHCP TSOL Session Gateway EAL4 Certified VPN/Firewall 10 EYES APP Servers ACE leverages new information technology Swappable to connect troops and their operations Disk Drives Trusted Session Se Low BW stateless clients coupled to HA VPN access control Trusted Gateway provides Access via secure VPN 9
11 Risk Reduction: Global WAN STEP 1 Vulnerability Risk GLOBAL WAN Risk Reduction SPECIFIC VPN/COI User Population 10
12 Data Separation on Network Type 2 3DES Tunnels 6 Eyes Type 1 Network 6 Eyes 10 Eyes 10 Eyes Concept introduced in Global Information Grid (GIG) Tested at Joint Interoperability Test Center & SPAWAR, SSC SD Accepted by Coalition Partners ACE leverages EAL4 VPN new subjected information to technology 6+ months to of connect internal troops and their operations NSA and testing improves and and evaluation protects information NSA approved networks for from attack JWID Proof-of-Concept 11
13 High Assurance VPN Objectives & Benefits Objectives: Integrate High Assurance (HA) VPNs onto existing, ubiquitous networks Data domain separation Centralized, policy driven network access control tied to strong 2-factor Identification & Authentication (I&A) Appropriate data encryption for separation vs. confidentiality - IAW CJCSM , DEFENSE-IN-DEPTH: INFORMATION ASSURANCE AND COMPUTER NETWORK DEFENSE Benefits: Secure VPNs provide risk reduction on global WAN Selective inclusion of finite number of nodes Medium robustness encryption for data domain separation within security level Optimizes use of Type 1 encryption for data confidentiality and separation of security levels Very tight network access control ACE Also leverages supports new secure information access technology from legacy to connect state seats troops and their operations Allows Concept and improves of Operations and protects (CONOPS) information to networks maximize from benefit attack of stateless clients for space, weight, power 12
14 Current ACE Status Warfighters, R&D & Acquisition conducting coordinated Spiral Development Lab, JWIDs, etc. PACOM SJFHQ Install & Follow-on Phases CENTRIXS, NMCI, PEO C4I etc. Theater Requirements Now Emerging Technology Development Non-operational Experimentation Operational Experimentation Operational Programs of Record (Globally) 13
15 ACE Standing Joint Forces HQ (SJFHQ) Architecture 3Com 3Com Legend Secure UTC in VPN mode SJFHQ SUTC X 7 DSC-PC X 2 4Eyes FAT GCTF FAT CENTRIXS JPN ROK FAT FAT NSC Security Enclaves -SIPRNET -CENTRIXS ROK -CENTRIXS JPN -4 Eyes DiamondLink in VPN mode DiamondVPN in VPN mode DiamondCentral (VPN Network Security Controller) SIPRNET NMCI Secret B1 NMCI Network NMCI Secret Hawaii NMCI NOC 4 Eyes GCTF CENTRIXS CENTRIXS -GCTF (Global Counter-Terrorism Force) NSC JPN SUTC Trusted Solaris Session Gateway ROK NIS+ Master Private Network 14
16 Secure Ultra Thin Client (SUTC) Integration of SunRay and secure VPN technology Smartcard maintains user profile for access to network & applications Model designed for low-bandwidth ops over WAN Lessons learned from JWID 2003 being incorporated Inexpensive, multiple purpose and secure seat for global coalition ops Simple to manage and operate 15
17 Client Seats Ultrathin: No CPU, no OS, no local storage, proprietary Thin: No local apps/storage, proprietary Fat: locally run apps, local storage entralized Decentralized Diskless Stateless Clients (DSC) Locally run apps, no local storage Non-proprietary Technology 16
18 Diskless Stateless Client (DSC-PC) Network load of OS on boot from single VPN domain No hard drive locally; uses network-attached storage device at servers Local OS for local processing such as audio collaboration Use Common Access Card (CAC) card for authentication and for PKI Certifications Provides access to one security enclave at a time Allows server-centric management and flexibility to host JAVA based applications such as GCCS- 4.x or IWS requiring lots of CPU and memory Hardware VPN Provides EAL4/FIPS certified from seat to server gateways Disk Images Win 98/DO S Linux GOTS Delta GCCS 4.x DSC Server DSC Clients 17
19 ACE Capabilities Provided to the Warfighter Provides improved means to share data, provide situational awareness & collaboration simultaneously Provides a single seat solution for Multiple COIs Multiple Operating Systems & Applications Provides ability to rapidly reconfigure network globally and in near-real time Dynamic Encryption & Data Labeling Strong I&A Network Centric Computing (NCC) Architecture 18
20 ACE Capabilities Provided to the Warfighter Reduced Total Ownership Costs (TOC) Ease of Scalability to Meet Operational Requirements Provides Right Information to the Right Person at the Right Place at the Right Time to Make the Right Decision 19
21 Current ACE Status Have received Secret and Below Information (SABI) Ticket # Cross Domain Appendix (CDA) has been reviewed and approved by NETWARCOM and PACOM System Security Authorization Agreement (SSAA) in Draft form Have started Pre-CT&E (Certification Test and Evaluation) Two groups at NSA have started to review overall architecture and individual component documentation 20
22 Summary ACE team will continue development & implementations based on: Warfighter Requirements Enhancing Coalition Warfare Capabilities Network Centric Warfare Concepts GIG Standards Cross-Theater/Organization/Agency Information Sharing Provide the right information, to the right person, at the right place, at the right time to make the right decision 21
23 ??? Questions??? 22
Multi-National Information Sharing Briefing
Multi-National Information Sharing Briefing AFCEA TechNet Mr. Donald Parker DISA Multinational Information Sharing (MNIS) Division 2 Nov 2017 Current DISA-Managed Coalition Information Sharing Systems
More informationDefense Information Systems Network (DISN) Test and Evaluation Network (DTEN)
Defense Information Systems Network (DISN) Test and Evaluation Network (DTEN) Mr. Dan Knodle Strategic Planning and Engineering Division Joint Interoperability Test Command 16 June 2011 Background Proliferation
More informationUNCLASSIFIED. Exhibit R-2, RDT&E Budget Item Justification Date February 2007 Appropriation/Budget Activity RDT&E Defense-Wide, BA 7
Exhibit R-2, RDT&E Budget Item Justification Date February 2007 Appropriation/Budget Activity RDT&E Defense-Wide, BA 7 R-1 Item Nomenclature: Net Centricity PE 0305199D8Z Cost ($ in millions) FY 2006 FY
More informationVerizon Software Defined Perimeter (SDP).
Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.
More informationNet-centric Characteristics
Net-centric Characteristics Heterogeneous Variety is essential and inevitable basis for healthy evolutionary growth and survival within dynamic threat environment Parallel Multiple implementation and concurrent
More informationWeb Enabled Navy. NMCI Industry Symposium 17 June Captain Skip Hiser, Task Force Web
Web Enabled Navy NMCI Industry Symposium 17 June 2003 Captain Skip Hiser, Task Force Web 757-836-3817 skip.hiser@navy.mil Task Force Web In April 2001, the Chief of Naval Operations chartered TFW to lead
More informationAvionics Cyber T&E Examples Testing Cyber Security Resilience to support Operations in the 3rd Offset Environment
Avionics Cyber T&E Examples Testing Cyber Security Resilience to support Operations in the 3rd Offset Environment 26 January 2017 Presented by: Mr. Chad Miller NAVAIR Cyber T&E What: Replicate Cyber Battlespace
More informationDesktop Virtualization Briefing Maryland Intelligence Center s Center for Innovation 25 June Innovation Center Contacts:
Desktop Virtualization Briefing Maryland Intelligence Center s Center for Innovation 25 June 2008 Innovation Center Contacts: Skip Boddy Bob Murray 443-445-8421 443-445-7122 email: fboddy@csc.com email:
More informationGSAW Information Assurance in Government Space Systems: From Art to Engineering
GSAW 2006 Information Assurance in Government Space Systems: From Art to Engineering Charles Lavine The Aerospace Corporation 310-336-1595 lavine@aero.org 1 Toward the Global Information Grid Toward the
More informationThe Perfect Storm Cyber RDT&E
The Perfect Storm Cyber RDT&E NAVAIR Public Release 2015-87 Approved for public release; distribution unlimited Presented to: ITEA Cyber Workshop 25 February 2015 Presented by: John Ross NAVAIR 5.4H Cyberwarfare
More informationUNCLASSIFIED // FOUO Pegasus 101 Brief
Pegasus 101 Brief Multi-National Information Sharing Program Management Office March 2015 2 Outline Pegasus Defined Pegasus Requirements Pegasus Today Product / Service update Pegasus Improved Service
More informationStreamlining User, Data and Network Defense in a Multi-Level Environment Steve Stratton Sr. Director Product Management
Streamlining User, Data and Network Defense in a Multi-Level Environment Steve Stratton Sr. Director Product Management Copyright 2016 Forcepoint. All rights reserved. CYBER TRENDS Increasing Connectivity
More informationCorporate Capabilities
Corporate Capabilities 2017 Summary Thomas Edison stated, "there's a way to do it better find it." intellisolutions is 3 rd party certified as a Woman-Owned Small Business (WOSB)*. Founded in 2006 in San
More informationNCES Program Overview. Rita Espiritu NCES Program Manager
NCES Program Overview Rita Espiritu NCES Program Manager Components of Net-Centric Warfare DoD Net-Centric Data Strategy Information Assurance Strategy Global Connectivity (Transformational Communications)
More informationHigh Assurance Platform (HAP) High Assurance Challenges. Rob Dobry Trusted Computing NSA Commercial Solutions Center 04 & 05 August 2009
High Assurance Platform (HAP) High Assurance Challenges Rob Dobry Trusted Computing NSA Commercial Solutions Center 04 & 05 August 2009 What is HAP? HAP is being developed to provide users with two primary
More informationTowards Effective Cybersecurity for Modular, Open Architecture Satellite Systems
SSC16-IV-6 Towards Effective Cybersecurity for Modular, Open Architecture Satellite Systems Presented to: 30 th Annual AIAA/USU Conference on Small Satellites August 2016 Presented by: Geancarlo Palavicini
More informationSecuring the End Node in a Cloud World
Securing the End Node in a Cloud World Approved for Public Release: RY-11-0022, 88 ABW-11-0375 Lt Col Ken Edge, PhD Electronic & Net-Centric Warfare Division Air Force Research Laboratory Of Clouds and
More informationto-end System Test Architecture
End-to to-end System Test Architecture Sr. Manager, Lockheed Martin SSC masuma.ahmed@lmco.com (408) 742-2553 2553 1 Net-Centric Mission Operations Features Fully Synchronized Interoperable, of ed Systems
More informationThe Collaboration Cornerstone
E-Mail: The Collaboration Cornerstone On Demand Insurance Business Problems 1. We lose customers because we process new policy applications too slowly. 2. Our claims processing is time-consuming and inefficient.
More informationMatthew Fisher Ed Goforth Progeny Systems Corporation. March 28th, Part Number: P006660, Rev: -
A Universal Gateway Architecture Results from the 2011 ONR/PEO IWS/PEO C4I Combat System (CS)/Command and Control (C2) Limited Technology Experiment (LTE) Matthew Fisher Ed Goforth Progeny Systems Corporation
More informationWhite paper. Combatant command (COCOM) next-generation security architecture
Combatant command () next-generation security architecture using NSA Suite B Table of Contents Combatant command () next-generation security architecture using NSA Suite B NSA Commercial Solution for Classified
More informationThe SafeNet Security System Version 3 Overview
The SafeNet Security System Version 3 Overview Version 3 Overview Abstract This document provides a description of Information Resource Engineering s SafeNet version 3 products. SafeNet version 3 products
More informationTeam Capabilities and Specializations
Team Capabilities and Specializations X-Feds, The Small Business headquartered in San Diego, CA with satellite offices located in Virginia, Indiana, Charleston and the National Capital Region. Established
More informationCyber Perspectives. Science and Technology Roadmap
Cyber Perspectives Science and Technology Roadmap NDIA S&T Conference 14 April 2010 Pat Sullivan SSC Pacific Cyber Warfare Capabilities, Opportunities and Challenges Capabilities: Global, 24x7 Network
More informationNavy Cyber Resilience
Unclassified Navy Cyber Resilience 20160614 Mr. Troy Johnson From cybersecurity to cyber resilience 2 Disconnected response through stove-piped assessments & initiatives across the enterprise: Operation
More informationCloud-based Open Architecture Approach for Common Enterprise Ground Services
Cloud-based Open Architecture Approach for Common Enterprise Ground Services GSAW Conference Feb. 29-March 3, 2016 2016 by Booz Allen Hamilton. Published by The Aerospace Corporation with permission. Agenda
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) COST ($ in Millions)
More informationDIACAP and the GIG IA Architecture. 10 th ICCRTS June 16, 2005 Jenifer M. Wierum (O) (C)
DIACAP and the GIG IA Architecture 10 th ICCRTS June 16, 2005 Jenifer M. Wierum (O) 210-9252417 (C) 210-396-0254 jwierum@cygnacom.com OMB Circular A-130 (1996) OMB A-130 required systems and applications
More informationTransforming Hierarchical C2 into Collaborative C2
Transforming Hierarchical C2 into Collaborative C2 Rich Byrne Vice President, The MITRE Corporation 24 September 2007 For Internal MITRE Use Chat Server BPM Server Web Server Portal Server App Server DB
More informationDoD Identity & Access Management (IdAM) Portfolio Overview
DoD Identity & Access Management (IdAM) Portfolio Overview UNCLASSIFIED DISA Enterprise Services Directorate (ESD) 17 July 2013 Overview IdAM Concepts & IdAM Portfolio 7/15/13 UNCLASSIFIED 1 IdAM Overview
More informationCoalition C2/Multinational Information Sharing: Current Capabilities and Challenges
Coalition C2/Multinational Information Sharing: Current Capabilities and Challenges 16 th International Command and Control Research and Technology Symposium (ICCRTS) June 21-23, 2011 Mr. Ronald W. Pontius
More informationHeadquarters U. S. Air Force
Headquarters U. S. Air Force US AWACS Airborne IP Networking Information Assurance Challenges Distribution Statement A: Approved for public release; distribution is unlimited. Mr. David Setser 551 ELSG/XRN
More informationThe Joint Live Virtual Constructive Data Translator Framework Interoperability for a Seamless Joint Training Environment
Framework Interoperability for a Seamless Joint Training Environment Warren Bizub Technical Division Chief US Joint Forces Command Joint Warfighting Center warren.bizub@jfcom.mil Derek Bryan Experimentation
More informationJOINT MISSION ENVIRONMENT TEST CAPABILITY (JMETC)
JOINT MISSION ENVIRONMENT TEST CAPABILITY (JMETC) Cyber T&E Initiatives AJ Pathmanathan JMETC Deputy PM for Engineering NCR Technical Director November 14, 2013 GET CONNECTED to LEARN, SHARE, and ADVANCE
More informationNaval Surface Warfare Center,
CAPT Brian R. Durant Commander NSWCDD Technical Director - (540) 653-8103 Dennis M. McLaughlin Technical Director Naval Surface Warfare Center, Dahlgren Naval Undersea DivisionWarfare Center The The Leader
More informationDEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND Joint Interoperability Test Command (JTE) 14 Apr 15
DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND 20755-0549 IN REPLY REFER TO: Joint Interoperability Test Command (JTE) 14 Apr 15 MEMORANDUM FOR DISTRIBUTION SUBJECT: Extension of
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE
Exhibit R-2, RDT&E Budget Item Justification: PB 2014 Air Force DATE: April 2013 COST ($ in Millions) # ## FY 2015 FY 2016 FY 2017 FY 2018 Program Element - 0.000 0.000 5.853-5.853 5.961 6.181 6.290 6.404
More informationHigh Assurance Challenges
A Robustness Strategy High Assurance Challenges United States Central Command LtCol Diana L. Staneszewski DSN: 651-6638/2319 stanesdl@centcom.mil Coalition Information Sharing Challenge We Need to Share
More informationCyber, Command, Control, Communications, and Computers Assessments Division (C5AD)
Cyber, Command, Control, Communications, and Computers Assessments Division (C5AD) 1 C5AD Presentation (Approved for Public Release: 20150219) ITEA 26 March 2019 Greg Curth J6/DDC5I/C5AD/ENG Cyber Capability
More informationJoint Information Environment
Joint Information Environment 28 May 14 1 Agenda JIE Necessity DISA s JIE Focus Takeaways Introduction of Breakout Session Leads DoD IT Future: Joint Information Environment A secure joint information
More informationSecuring Content in the Department of Defense s Global Information Grid
Securing Content in the Department of Defense s Global Information Grid Secure Knowledge Workshop State University of New York - Buffalo 23-24 September 2004 Robert W. McGraw Technical Director IA Architecture
More informationCombat Effectiveness Testing of System of Systems in the Face of Cyber Threat
Combat Effectiveness Testing of System of Systems in the Face of Cyber Threat Presented at National Defense Industrial Association Conference March 3, 2010 Jon Payne USJFCOM IO Range 256.842.0156 Jonathon.payne@jfcom.mil
More informationSpace and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP)
Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP) SSC Atlantic is part of the Naval Research & Development Establishment (NR&DE) Information Warfare Research Project
More informationSD-WAN. Bringing Scale, Agility and Robustness to Enterprise Networks
1 SD-WAN Bringing Scale, Agility and Robustness to Enterprise Networks WAN technology, has evolved significantly over the last decade, with new products, new technology and new business models. However,
More informationitexamdump 최고이자최신인 IT 인증시험덤프 일년무료업데이트서비스제공
itexamdump 최고이자최신인 IT 인증시험덤프 http://www.itexamdump.com 일년무료업데이트서비스제공 Exam : CISA Title : Certified Information Systems Auditor Vendor : ISACA Version : DEMO Get Latest & Valid CISA Exam's Question and
More informationRSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief
Providing Secure Access to Corporate Resources from BlackBerry Devices Leveraging Two-factor Authentication Augmenting the BlackBerry Enterprise Solution BlackBerry devices are becoming ubiquitous throughout
More informationDepartment of Defense Fiscal Year (FY) 2013 IT President's Budget Request Defense Technical Information Center Overview
Mission Area Department of Defense Business System Breakout Appropriation All Other Resources 19.083 EIEMA 19.083 RDT&E 19.083 FY 2013 ($M) FY 2013 ($M) FY 2013 ($M) FY12 to FY13 Comparision ($M) FY2012
More informationDISN Evolution. TDM Elimination. Mr. Jessie L. Showers, JR., SES Infrastructure Executive (IE) 15 June 2017 UNITED IN SERVICE TO OUR NATION
DISN Evolution TDM Elimination Mr. Jessie L. Showers, JR., SES Infrastructure Executive (IE) 15 June 2017 The IT Combat Support Agency RESOURCING ACQ/PROC DEV/TEST IMPLEMENTATION OPERATIONAL ENVIRONMENT
More informationUpdate. HFIA Conference 3 February Page 1 HFIA 16 Jan 03 (JLM)
HF in the US Navy Update HFIA Conference 3 February 2005 Page 1 Briefing Outline Present Battle Force Email 66 Status Service Level & Program Infrastructure Upgrades Incremental I.T. updates & Adaptive
More informationTechnology for a Changing World
Technology for a Changing World Cisco Expo 2009 Axel Clauberg Director, Solutions & Architectures, Emerging Markets, Cisco Systems November 10, 2009 1 VISION Changing the way the World Lives, Works, Plays
More informationEnd User Device Strategy: Interoperability Standards
End User Device Strategy: Interoperability Standards This document defines the target architecture for cross government interoperability standards and interfaces between a government End User Device and
More informationPresentation Title 11/13/2013
Enable Secure Information Sharing Right Data-Right People-Right Time MILCIS 2013 George Kamis RTCS Chief Technology Officer Kamis@TrustedCS.com +1 703-537-4310 EXIM Approval #IIS2013-268 Copyright 2013
More informationInternational SOF Coordination Center (ISCC)
International SOF Coordination Center (ISCC) 19 th ICCRTS 17 June 2014 Paper ID 004 Mr. Ken D. Teske Mr. Michael D. Tisdel Mr. William C. Fleser 1 Agenda The Concept The OV-1 View Required Capabilities
More informationNational Information Assurance Partnership (NIAP) 2017 Report. PPs Completed in CY2017
National Information Assurance Partnership (NIAP) 2017 Report NIAP continued to grow and make a difference in 2017 from increasing the number of evaluated products available for U.S. National Security
More informationUBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT
2018 Viasat White Paper August 27, 2018 UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT With Hybrid Adaptive Networking By Craig Miller Vice President, Chief Technical Officer
More informationOptimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution
DATASHEET Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution Features & Benefits Best-in-class VPN and vadc solutions A single point of access for all
More informationCOMBINED FEDERATED BATTLE LABORATORIES NETWORK (CFBLNet)
UNCLASSIFIED COMBINED FEDERATED BATTLE LABORATORIES NETWORK (CFBLNet) PUBLICATION 1 ANNEX I GLOSSARY OF TERMS Version 8.0 July 2015 UNCLASSIFIED DOCUMENT CONTROL AND TRACKING METADATA Security Classification
More informationCrewstation-over-IP. Real-time mission-critical remote multi-desktops. Esterline Control & Communication Systems. Content
Esterline Control & Communication Systems Crewstation-over-IP Real-time mission-critical remote multi-desktops Content Introduction Benefits of remote HMIs Critical needs for mission systems Commercial
More informationDEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND Joint Interoperability Test Command (JTE) 26 Mar 13
DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND 20755-0549 IN REPLY REFER TO: Joint Interoperability Test Command (JTE) 26 Mar 13 MEMORANDUM FOR DISTRIBUTION SUBJECT: Extension of
More informationWHITEPAPER. Embracing Containers & Microservices for future-proof application modernization
WHITEPAPER Embracing Containers & Microservices for future-proof application modernization The need for application modernization: Legacy applications are typically based on a monolithic design, which
More informationPMW 790 Shore And Expeditionary Integration Program Office NDIA San Diego Fall Industry Forum
PEOC4I.NAVY.MIL Program Executive Office Command, Control, Communications, Computers and Intelligence (PEO C4I) PMW 790 Shore And Expeditionary Integration Program Office NDIA San Diego Fall Industry Forum
More informationMODEL-DRIVEN DEVELOPMENT OF COMMAND AND CONTROL CAPABILITIES FOR JOINT AND COALITION WARFARE
9 TH International Command and Control Research & Technology Symposium MODEL-DRIVEN DEVELOPMENT OF COMMAND AND CONTROL CAPABILITIES FOR JOINT AND COALITION WARFARE Robert Jacobs Computer Systems Center
More informationSecuring emerging wireless networks and services
Securing emerging wireless networks and services 4 th ESTI security workshop, 13-14 January 2009 - ETSI, Sophia Antipolis, France Ganesh Sundaram, Distinguished Member of Technical Staff Wireless Advanced
More informationMitigating Branch Office Risks with SD-WAN
WHITE PAPER Mitigating Branch Office Risks with SD-WAN 1 M itigating Branch Office Risks with SD-WAN Branch Security Overview The branch or remote office stands out as a point of vulnerability in an increasingly
More informationSnapServer Family (XSD & XSR)
SnapServer Family (XSD & XSR) Simple, expandable enterprise storage for high-performing resilient environments SnapServer family offers enterprise class unified block and file storage that is workload
More informationJava Card Technology-based Corporate Card Solutions
Java Card Technology-based Corporate Card Solutions Jack C. Pan, Leader and Sr. Architect Hervé Garcia, Tech. Project Manager econsumer Emerging Technologies, Citibank Overall Presentation Goal The objectives
More informationIMPLEMENTING MICROSOFT CREDENTIAL GUARD FOR ISO 27001, PCI, AND FEDRAMP
IMPLEMENTING MICROSOFT CREDENTIAL GUARD FOR ISO 27001, PCI, AND FEDRAMP North America Latin America Europe 877.224.8077 info@coalfire.com coalfire.com Coalfire sm and CoalfireOne sm are registered service
More informationSD-WAN orchestrated by Amdocs
SD-WAN orchestrated by Amdocs What is software-defined wide area network? SD-WAN determines the most cost-effective and efficient way to route enterprise traffic to remote locations over ubiquitous broadband
More informationTransforming IT: From Silos To Services
Transforming IT: From Silos To Services Chuck Hollis Global Marketing CTO EMC Corporation http://chucksblog.emc.com @chuckhollis IT is being transformed. Our world is changing fast New Technologies New
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete
More informationService-Oriented Architecture for Command and Control Systems with Dynamic Reconfiguration
Service-Oriented Architecture for Command and Control Systems with Dynamic Reconfiguration Raymond A. Paul Department of Defense Washington, DC raymond.paul@osd.mil 2004-5-22 1 Outlines Motivation Dynamic
More informationFeatures. HDX WAN optimization. QoS
May 2013 Citrix CloudBridge Accelerates, controls and optimizes applications to all locations: datacenter, branch offices, public and private clouds and mobile users Citrix CloudBridge provides a unified
More informationIRIS JCTD Overview. (JCTD - Joint Capabilities Technology Demonstration) 2006 Cisco Systems, Inc. All rights reserved. 1
IRIS JCTD Overview (JCTD - Joint Capabilities Technology Demonstration) 2006 Cisco Systems, Inc. All rights reserved. 1 JCTD/ DoD Joint Capabilities Technology Demonstration (JCTD) to be conducted in 2009/2010
More informationT&E IN CYBERSPACE (UCR TESTING)
T&E IN CYBERSPACE (UCR TESTING) TRACK CHAIR COL Joe Puett CDR, JITC PRESENTER Richard Delgado Jr. TECHNOLOGY for RAPID ACQUISITION AND TEST Unified Capabilities Requirements (UCR) Testing Mr. Richard Delgado
More informationMultinational Information Sharing (MNIS) Protection Profile (PP) For Networked Information Systems. Version 1.0
Multinational Information Sharing (MNIS) Protection Profile (PP) For Networked Information Systems Version 1.0 25 September 2002 Foreword This system level Protection Profile (PP) was developed at the
More informationDepartment of Homeland Security Science & Technology
Department of Homeland Security Science & Technology Overview to the US National Committee on Theoretical and Applied Mechanics, April 22, 2016, Washington DC Dr. Kevin L. Brown Chief Scientist, DHS/S&T
More informationHow does your organization manage Privileged Users?
How does your organization manage Privileged Users? A GOVERNMENT & MILITARY SOLUTION GUIDE IONsales@apitech.com www.apitech.com Tel: +1 908-546-3900 Who is ION Networks? ION Networks The most trusted name
More informationDoDD DoDI
DoDD 8500.1 DoDI 8500.2 Tutorial Lecture for students pursuing NSTISSI 4011 INFOSEC Professional 1 Scope of DoDD 8500.1 Information Classes: Unclassified Sensitive information Classified All ISs to include:
More informationNet-Centric Enterprise
N65236-ENGOPS-BRIEF-0012-1.0 Training Your Systems Engineering Workforce Michael T. Kutch, Jr. Chief Engineer Code 70 E Intelligence & Information Warfare Systems Department Director Engineering Operations
More informationSimplifying the Branch Network
Simplifying the Branch Network By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Aruba, a Hewlett Packard Enterprise company Executive Summary A majority of IT organizations are experiencing
More informationCOTS, Subversions, and the Foreign Supply Chain issues for DoD Systems. Dr. Ben A. Calloni, P.E. Lockheed Martin Fellow, Software Security
Superior Products Through Innovation COTS, Subversions, and the Foreign Supply Chain issues for DoD Systems Dr. Ben A. Calloni, P.E. Lockheed Martin Fellow, Software Security Research Program Manager and
More informationIntegrated C4isr and Cyber Solutions
Integrated C4isr and Cyber Solutions When Performance Matters L3 Communication Systems-East provides solutions in the C4ISR and cyber markets that support mission-critical operations worldwide. With a
More informationOverview of Infrastructure for Cyber, Interoperability, and Distributed Test
Overview of Infrastructure for Cyber, Interoperability, and Distributed Test For LTC Richard Dixon Mission Control Complex, Bde Modernization Command The JMETC Mission JMETC provides the persistent, robust
More informationA comprehensive security solution for enhanced mobility and productivity
A comprehensive security solution for enhanced mobility and productivity coupled with NetScaler Unified Gateway and StoreFront lets organizations upgrade their business security beyond usernames and passwords,
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Network Boundary and The Network Boundary and for an Enterprise is essential; it provides for an understanding of
More informationCompTIA Exam CAS-002 CompTIA Advanced Security Practitioner (CASP) Version: 6.0 [ Total Questions: 532 ]
s@lm@n CompTIA Exam CAS-002 CompTIA Advanced Security Practitioner (CASP) Version: 6.0 [ Total Questions: 532 ] Topic break down Topic No. of Questions Topic 1: Volume A 117 Topic 2: Volume B 122 Topic
More informationRemote Connectivity for SAP Solutions over the Internet Technical Specification
Remote Connectivity for SAP Solutions over the Technical Specification June 2006 Remote Connectivity for SAP Solutions over the page 2 1 Introduction SAP offers secure connections over the for support
More informationNetworking Drivers & Trends
NSA Series Overview Agenda Networking Drivers & Trends New Risks & Challenges Current Solutions Introducing SonicWALL S NSA Series Product Specs Competition Launch Notes Networking Drivers & Trends Business
More informationPartner Webinar. AnyConnect 4.0. Rene Straube Cisco Germany. December 2014
Partner Webinar AnyConnect 4.0 Rene Straube Cisco Germany December 2014 Agenda Introduction to AnyConnect 4.0 New Licensing Scheme for AnyConnect 4.0 How to migrate to the new Licensing? Ordering & Migration
More informationDavidson Technologies: A Medium Sized Business Experience with DFARS 7012/NIST
Davidson Technologies: A Medium Sized Business Experience with DFARS 7012/NIST 800-171 Davidson Technologies Founded in 1996 by Dr. Julian Davidson Father of Missile Defense in America Sen. Jeff Sessions
More informationRealizing the Army Net-Centric Data Strategy (ANCDS) in a Service Oriented Architecture (SOA)
Realizing the Army Net-Centric Data Strategy (ANCDS) in a Service Oriented Architecture (SOA) A presentation to GMU/AFCEA symposium "Critical Issues in C4I" Michelle Dirner, James Blalock, Eric Yuan National
More informationNimble/Cisco SmartStack Integrated Infrastructure for Enterprise-class Oracle Workloads
Nimble/Cisco SmartStack Integrated Infrastructure for Enterprise-class Oracle Workloads Nimble Storage Overview 2015 NIMBLE STORAGE CONFIDENTIAL: DO NOT DISTRIBUTE 2 Redefining the Storage Market with
More informationCerteon s acelera Virtual Appliance for Acceleration
Certeon s acelera Virtual Appliance for Acceleration Product Brief Dr. Jim Metzler Ashton, Metzler & Associates Rolf McClellan McClellan Consulting June 2008 Certeon s acelera Virtual Appliance for Acceleration
More informationSPAWAR FLEET READINESS DIRECTORATE STRATEGIC PLAN STATEMENT A: Approved for public release, distribution is unlimited (JANUARY 2017)
SPAWAR FLEET READINESS DIRECTORATE STRATEGIC PLAN 2017-2021 STATEMENT A: Approved for public release, distribution is unlimited (JANUARY 2017) 2 STRATEGIC PLAN 2017-2021 A MESSAGE FROM THE DEPUTY COMMANDER
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More informationDefense Information Systems Agency (DISA) Department of Defense (DoD) Cloud Service Offering (CSO) Initial Contact Form
Defense Information Systems Agency (DISA) Department of Defense (DoD) Cloud Service Offering (CSO) Initial Contact Form Page 1 of 5 Submitted to DISA s DoD Cloud Support Office by: Signature (Prefer CAC
More informationLevel 1 Technical Firewall Traversal & Security. Level 1 Technical. Firewall Traversal & Security. V2 Page 1 of 16
Level 1 Technical Firewall Traversal & Security V2 Page 1 of 16 Contents 1 - Introduction... 3 Introduction... Error! Bookmark not defined. Available Resources... 8 2 - Overview... 4 Level 1 Recap... Error!
More informationUnmanned Air Systems Issues and Challenges to C4I INCOSE San Diego
PEOC4I.NAVY.MIL Program Executive Office Command, Control, Communications, Computers and Intelligence (PEO C4I) Unmanned Air Systems Issues and Challenges to C4I INCOSE San Diego 30 Oct 2010 CAPT John
More informationIntelligent Solutions for the most Rigorous IT Security Requirements
Intelligent Solutions for the most Rigorous IT Security Requirements 1 2 1 2 3 Information Security from the Architects of Modern Encryption Systems SINA (Secure Inter-Network Architecture) enables the
More informationSECURING MOBILITY. Through the Canadian Medium Assurance Solutions Program. ICMC May Greg Hills Director, Architecture and Technology Assurance
SECURING MOBILITY Through the Canadian Medium Assurance Solutions Program ICMC May 2016 Greg Hills Director, Architecture and Technology Assurance PAGE 1 INTRODUCTION Basic, Medium, and High Assurance
More information