EmptyPixel
Government

Government:

Securing the Defense Department from Cyber Attack

In order to protect and defend the United States, the Department of Defense must shield its information technology equipment, software and data from attack. It's no easy task. Critical information must be shared across a Global Information Grid that is vulnerable to exploitation and denial of service. Factors that contribute to this vulnerability include:

  • Increased reliance on commercial information technology and services
  • Increased complexity and risk propagation through interconnection
  • The extremely rapid pace of technological change
  • A distributed and non-standard management structure
  • The relatively low cost of entry for adversaries

Because complete confidence in the trustworthiness of information technology, users, and interconnections cannot be fully achieved, the Department of Defense must manage risks. This is done by balancing the importance of the information and supporting technology to DoD missions against documented threats and vulnerabilities, the trustworthiness of users and interconnecting systems, and the effectiveness of Information Assurance (IA) solutions.

War fighters, DoD Leaders, and Information Technologists, all have to deal with the simultaneous protection and sharing of information, from a variety of classified and unclassified sources, while meeting all of the requirements of the DoD Information Assurance Certification and Accreditation Process (DIACAP), like those requirements outlined in DoD Instruction 8500.2.

Now there is a complete solution for DoD users. The INTEGRITY operating system protects classified and unclassified information on the same computer while facilitating secure sharing of information across the GIG:

  • INTEGRITY has been certified to EAL6+ High Robustness, the only software to ever achieve that level
  • INTEGRITY enables the writing of enterprise-wide and system level security policies that control information system access and functionality
  • INTEGRITY-based solutions can be applied across the total GIG, from desktop to server to network to mobile device and more

Featured Solution

INTEGRITY Secure Consolidated Client—ISCC

Imagine not having to change your network or backend to support a consolidated desktop and enjoy the cost savings of eliminating multiple computers on each desk. Learn more...

In achieving EAL6+ High Robustness, the INTEGRITY software system was certified through an exhaustive process:

  • The INTEGRITY separation kernel was formally modeled and mathematically proven to be correct in enforcing all required security functionality as specified in the SKPP. This modeling and proof was performed by an unbiased third party.
  • The INTEGRITY separation kernel and associated support software were thoroughly analyzed and proven to mitigate all covert channels (storage and timing)
  • The INTEGRITY software platform was exhaustively tested by an independent Common Criteria Test Laboratory (CCTL), and a complete set of software life cycle design and test documentation was produced
  • The INTEGRITY software platform was comprehensively penetration tested by the National Security Agency

INTEGRITY Global Security offers the following solution set based on the INTEGRITY software system. These solutions will enable the Department of Defense to implement its IA strategy quickly and cost-effectively.

To learn more about how INTEGRITY Global Security can secure and consolidate your IT infrastructure, please call 805.882.2500 or send email.

EmptyPixel
© INTEGRITY Global Security    |    Site Map    |    Contact Us