1 Secure Interoperability within the Defence Supply Chain Colin Nash – Business Development...
-
Upload
elwin-maurice-cook -
Category
Documents
-
view
215 -
download
0
Transcript of 1 Secure Interoperability within the Defence Supply Chain Colin Nash – Business Development...
1
Secure Interoperability within the
Defence Supply Chain
Colin Nash – Business Development Manager
Thursday 28th October 2010
Introduction
• How Deep-Secure have used the Transglobal Secure Collaboration
Programme (TSCP) specification to enable interoperability within the
Defence Supply Chain.
• The UK MOD sponsored the demonstration of secure information exchange
in the supply chain at CWID 2010
– Based on a Deep-Secure interoperability demonstration incorporating
BAE Systems and TSCP (CertiPath)
– Helping to understand applicability of the solutions to enable better
sharing of information between MOD and supply chain organisations
2
Secure Interoperability within the Defence Supply Chain
• The aim of TSCP is provide a secure means of exchanging
information between Aerospace and Defence Companies and the
Government Organisations they deal with, such as UK MOD, US
DOD and NL MOD
• This is achieved through the adoption of common standards for
secure email and document labelling
• Deep-Secure is a Silver Member of TSCP
33
Deep-Secure Mail Guard
www.tscp.org
Aim of the CWID 10 Trial
To demonstrate secure messaging capabilities using the TSCP specification
Enabled by the Deep-Secure Mail and Directory Guard
Configured for: Encryption and Decryption of SMIME messages Secure Storage of certificates Organisational security policy enforcement Virus scanning Content Analysis Release Control Label checking and transformation Certificate LDAP Lookup
4
Summary
• By adopting common standards this approach allows members of the Supply Chain
community to:
– Securely Collaborate with partners
• Assured enforcement of consistent Security Policies
• Controlled release of information with strong message checking
• Enhanced security with the use of desktop encryption
• Adoption of Federated Identity and Access Management
• Integration of Public Key Infrastructure
– Reduce risk
• Data loss, Export Control transgressions, IPR breaches
– Improve efficiency
• Reduce cost for delivery and operational support
• Improve and align with the tempo of operations
15
18
Key Contacts
Deep-Secure Limited
1 Nimrod House
Sandy’s Road
Malvern
Worcestershire
WR14 1JJ
+44 (0)1684 217070
www.deep-secure.com
Colin Nash
Business Development Manager
Telephone: +44 (0)7918 053 897
Email: [email protected]
Robin King
Head of Sales and Marketing
Telephone: +44 (0)7918 053 878
Email: [email protected]