EmptyPixel
White Papers
EmptyPixel

The following white papers are available from INTEGRITY Global Security.

Introducing INTEGRITY Secure Consolidated Client
INTEGRITY Global Security and Intel work together to deliver secure virtual machine desktops, providing enterprises and governments with a cost-effective, easy-to-manage solution that protects the most valuable resources against even the most sophisticated cyber threats.

Request a copy via email: info@integrityglobalsecurity.com

The Gold Standard for Operating System Security: SKPP
The operating system bears a tremendous burden in achieving security. Because the operating system controls the resources (e.g. memory, processing time, devices) of the computer, it has the power to prevent unauthorized access to these resources and information flowing through them. Conversely, if the operating system fails to prevent or limit the damage resulting from unauthorized access, disaster can result. With the recent NSA evaluation of INTEGRITY to the Common Criteria SKPP standard, there now exists, for the first time in history, an operating system that can be trusted to protect corporate intellectual property, financial records, private customer information, national secrets, and critical control systems such as the power grid. This white paper will discuss the SKPP, now the gold standard for operating system security.

Request a copy via email: info@integrityglobalsecurity.com

Secure Separation Architecture
The world has become accustomed to the fail-first, patch-later mentality of insecure software and computing infrastructure. As Michael Vatis, a former director of the FBI's National Infrastructure Protection Center, has said: "The vulnerabilities are endemic because we have whole networks and infrastructures built on software that's insecure. Any given day, some new vulnerability pops up." Thus, much of the world's critical infrastructure, financial networks, medical information systems, telecommunications gear, and portable mobile devices are open to compromise by determined individuals, corporations, organized crime, and nation states.

While the world spends untold billions on snake-oil solutions - firewalls, filters, and Patch Tuesdays — security experts know full well that the only true path to security is through high assurance. Users of high assurance software can have high confidence in the ability of that software to securely perform its intended function. Almost all of the world's commercial software is low assurance, and our confidence level in its security matches. Yet recent developments have proven that high assurance software can be practical, even for complex applications such as operating systems. INTEGRITY Global Security has developed and applied an architecture — the Secure Separation Architecture — to create a wide variety of highly secure components, applications, and complete systems. This architecture should help computer and security professionals as well as the average consumer understand what is meant by high assurance. The architecture prescribes a set of five principles to be used in the creation of secure software and systems.

Request a copy via email: info@integrityglobalsecurity.com.

Hypervisor Architecture Comparison: Type‐1, Type‐2, Separation Kernel
Hypervisors are growing in popularity in servers, PCs, and mobile devices, due to the promise for improved cost efficiency, enhanced security, and compelling new computing usage models. Variations in hypervisor architecture have a tremendous impact on the ability to deliver on these promises. This white paper describes and compares the major hypervisor approaches in use today: Type-1, Type-2, and Separation Kernel.

Request a copy via email: info@integrityglobalsecurity.com

TCO Analysis for Multi-Network Desktop Consolidation
Desktop consolidation – in which desktop environments are virtualized within data centers and then accessed with remote interaction software - is a hot trend due to the demand for green IT and reduced desktop Total Cost of Ownership (TCO). Some organizations, however, are unable to take advantage of this transition. One reason is that the lightweight thin clients used to access virtualized desktops are unable to meet end user demands, for example high-end graphics performance or local storage for private information. A second key reason is a requirement to use distinct hardware platforms accessing distinct networks ("air gap"); commercial desktop consolidation products are not suitable for providing high assurance isolation of those back-end virtualized desktops and networks.

Request a copy via email: info@integrityglobalsecurity.com

The following white paper is available from the American National Standards Institute:

The Financial Impact of Cyber Risk — 50 Questions Every CFO Should Ask
Cyber security is vital to America's economic well-being. Its importance was underscored in 2008 by U.S. Homeland Security Secretary Michael Chertoff, who named it one of the nation's four priority security issues, alongside border security. Corporations use cyber systems to accomplish real-time tracking of supply chains, manage inventory, improve employee efficiency, generate on-line commerce, and more. Virtually every corporation has, by now, calculated the positive aspects of digitalization into its immediate and long-term business plans. Unfortunately, corporations have often failed to properly account for the financial downside resulting from the risks of cyber systems.

EmptyPixel
© INTEGRITY Global Security    |    Site Map    |    Contact Us