SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

10
SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS 2002 Vindicator Technologies SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS NDIA SECURITY EXPO - 2003 MISSION CRITICAL PROCESSING MISSION CRITICAL PROCESSING Presentation Presentation Daniel Skret Daniel Skret Vindicator Technologies, Inc Vindicator Technologies, Inc

description

NDIA SECURITY EXPO - 2003. MISSION CRITICAL PROCESSING Presentation Daniel Skret Vindicator Technologies, Inc. SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS. Mission Critical Processing. Enforcing Security Policy Situational Awareness Automatic Behaviors Systems Integration. - PowerPoint PPT Presentation

Transcript of SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

NDIA SECURITY EXPO - 2003

MISSION CRITICAL PROCESSINGMISSION CRITICAL PROCESSING

PresentationPresentation

Daniel SkretDaniel Skret

Vindicator Technologies, IncVindicator Technologies, Inc

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

Mission Critical ProcessingMission Critical Processing

Enforcing Security Policy

Situational Awareness

Automatic Behaviors

Systems Integration

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

Mission ExecutionMission Execution

Reduce PC’s Role to User Interface

Perform Mission via Security Appliances

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

Platform EvolutionPlatform Evolution

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

ArchitecturesArchitectures

Security Application and User Interface

ActiveX ATL

Native & 3rd Party DLL

OLE ADO OLE-DB ODBC DAO

DirectXGDI

.NET

NetBIOS

TCP/IP

RPC WinSock

NetBEUI IPX DLC

Windows API

Native & 3rd Party Device Drivers

Security Application

RTOS Network(TCP/IP)

FileSystem

Platform Device Drivers

DataBase

Office Suite Data Base System

1000MB

180 to420 MB

<10 MB

Typical PC Environment

Security Appliance

HTTPServer

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

Software ComparisonSoftware Comparison

Security Appliance Personal Computer

Mission-Specific General Purpose

RTOS-Based OS-Based

Low Virus Vulnerability Extremely Vulnerable

<10 MB Code >1,000 MB Code

Stable Platform Constantly Changing

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

Hardware ComparisonHardware Comparison

Security Appliance Personal Computer

Low Power (20W) LV UPS

200-1500W Mains UPS

100% Solid State Fans & Disks

>100,000 hr MTBF <10,000 hr MTBF

Hardened I/O External Adapters

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

Attack VulnerabilityAttack Vulnerability

Security Appliance Personal Computer

Mission-Specific Protocols “Unused” GP Protocols

Cannot Host Programs Raison d’être…Scripts, Macros, Programs, etc.

Application-Level Encryption External VPN

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

Enterprise DeploymentEnterprise Deployment

WAN

Site LAN

Site LAN

Site LAN

Site w/oLAN

HumanResourcesDepartment

Access Control

Local Management

Remotely Managed

Boston

Tampa

RS-485

RS-485

RS-485

RS-485

RS-485

RS-485

London

Los Angeles

Router

Router

RouterRouter

Alarm Management

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

Systems SummarySystems Summary

Core Processing via Appliances

PC’s for User Interface + Clerical Work

Questions?

Daniel [email protected]