Extending Full Spectrum Dominance to CyberspaceGuardtime offers its defense and aerospace partners next-generation anti-tamper hardware, solutions for defending critical networks from nation-state level attackers, designing and tailoring network defense or providing end to end data-centric security for sensor platforms.
Our Value Proposition Modern security is based on the need to search for vulnerabilities. That search can be in the form of firewalls scanning each packet that enters the network, signature-based malware detection schemes, of using sandboxes (or multi-vector virtual execution) to run code inside a protected environment. These are very sophisticated technologies but they all suffer from one fundamental problem: they can’t guarantee that they are working. They might work but then again they might not and it only takes one successful breach to have your most critical IP compromised. Users of these technologies have to rely on trust, and trust without verification is a failed and failing strategy.
KSI makes a different assumption: That the state of a network can be independently verified with mathematical certainty. The key word is “independently”. It means that the configuration of every switch and router, the state of every event log and data item in data stores can be verified without the need for trusted administrators or in the procedures that define the security of the network.
The implication is that if you can guarantee the state of your network then any unauthorized change in the state of that network represents an attack, the impact of which can be mitigated. This is a fundamentally different assumption and is the difference between searching for needles in a haystack and having real-time situational awareness of every stalk of hay.
KSI is the equivalent of tag, track and locate for every individual asset and automated actions can be taken when that asset is out of compliance - it can provide cyber-domain awareness and attribution at the scale needed for modern networks, enabling the extension of full spectrum dominance to cyberspace and the guaranteed security of networked digital assets, both military and commercial.
Solutions for System Integrity: Guardtime’s Black Lantern appliance is the cutting edge of Anti-Tamper (AT) technology, or the systems engineering activities intended to prevent and/or delay exploitation of critical technologies weapon systems.
Black Lantern Anti-Tamper Appliance
Designed for the world’s most austere environments Black Lantern ensures that every component, configuration, and digital asset within a network can be tagged, tracked, and located with real-time situational awareness no matter where that asset is transmitted, stored, or received.
Read more : Black Lantern Appliance
Solutions for Insider Threat:KSI Insider Threat Services deliver three core elements; all built to DoD standards to address new regulatory Risk Management Framework guidance for continuous monitoring of cyber assets (see NIST SP 800-53, CNSSI 1253, and ICD 503):
Real-time Mitigation with Native Forensics
- Real-time monitoring and detection of insider threat activity across even the largest enterprises
- Fully portable forensic evidence and chain of custody of the suspect(ed) activity and attribution.
- KSI Training and Education services dedicated to Insider Threat Detection, Reporting, Mitigation, and Eradication
Read more: Insider Threat Mitigation Solutions
Solutions for Sensor PlatformsIn a world of connected machines there are a myriad of interacting devices, customer transactions, user activities, access, authentication and ‘handoff’ automation, virtualization and application launches, software deliveries, data from API interactions and their associated messages, as well as sensor data from remote devices.
KSI provides chain of custody and auditability for the lifetime of the data from sensor fusion, ingest and analytics across data lakes hosted in different environments administered by different organizations. Without it one compromise anywhere in the chain and the reliability of the data being collected and any conclusions derived thereof will be suspect.
Read more: IoT Assurance Solutions
Solutions for Cloud AssuranceDriven by proven cost-efficiencies, cloud solutions remain in demand by Federal agencies, however cybersecurity concerns remain one of the largest hurdles to cloud implementation. While FedRAMP security standards are gaining acceptance, the standards focus on protecting the network instead of security gaps from insider threats and protection of the data itself.
KSI, integrated into the cloud infrastructure provides a level of assurance not previously possible, providing complete traceability, accountability and transparency for the cloud. Entities who are either using or administrating the cloud can be held responsible for their actions, regulators get to audit all processes and everyone involved can verify what happened when.
Read more: Cloud Assurance Solutions