10
SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS 2002 Vindicator Technologies SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS NDIA SECURITY EXPO - 2003 MISSION CRITICAL PROCESSING MISSION CRITICAL PROCESSING Presentation Presentation Daniel Skret Daniel Skret Vindicator Technologies, Inc Vindicator Technologies, Inc

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

Embed Size (px)

DESCRIPTION

NDIA SECURITY EXPO - 2003. MISSION CRITICAL PROCESSING Presentation Daniel Skret Vindicator Technologies, Inc. SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS. Mission Critical Processing. Enforcing Security Policy Situational Awareness Automatic Behaviors Systems Integration. - PowerPoint PPT Presentation

Citation preview

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

NDIA SECURITY EXPO - 2003

MISSION CRITICAL PROCESSINGMISSION CRITICAL PROCESSING

PresentationPresentation

Daniel SkretDaniel Skret

Vindicator Technologies, IncVindicator Technologies, Inc

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

Mission Critical ProcessingMission Critical Processing

Enforcing Security Policy

Situational Awareness

Automatic Behaviors

Systems Integration

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

Mission ExecutionMission Execution

Reduce PC’s Role to User Interface

Perform Mission via Security Appliances

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

Platform EvolutionPlatform Evolution

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

ArchitecturesArchitectures

Security Application and User Interface

ActiveX ATL

Native & 3rd Party DLL

OLE ADO OLE-DB ODBC DAO

DirectXGDI

.NET

NetBIOS

TCP/IP

RPC WinSock

NetBEUI IPX DLC

Windows API

Native & 3rd Party Device Drivers

Security Application

RTOS Network(TCP/IP)

FileSystem

Platform Device Drivers

DataBase

Office Suite Data Base System

1000MB

180 to420 MB

<10 MB

Typical PC Environment

Security Appliance

HTTPServer

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

Software ComparisonSoftware Comparison

Security Appliance Personal Computer

Mission-Specific General Purpose

RTOS-Based OS-Based

Low Virus Vulnerability Extremely Vulnerable

<10 MB Code >1,000 MB Code

Stable Platform Constantly Changing

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

Hardware ComparisonHardware Comparison

Security Appliance Personal Computer

Low Power (20W) LV UPS

200-1500W Mains UPS

100% Solid State Fans & Disks

>100,000 hr MTBF <10,000 hr MTBF

Hardened I/O External Adapters

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

Attack VulnerabilityAttack Vulnerability

Security Appliance Personal Computer

Mission-Specific Protocols “Unused” GP Protocols

Cannot Host Programs Raison d’être…Scripts, Macros, Programs, etc.

Application-Level Encryption External VPN

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

Enterprise DeploymentEnterprise Deployment

WAN

Site LAN

Site LAN

Site LAN

Site w/oLAN

HumanResourcesDepartment

Access Control

Local Management

Remotely Managed

Boston

Tampa

RS-485

RS-485

RS-485

RS-485

RS-485

RS-485

London

Los Angeles

Router

Router

RouterRouter

Alarm Management

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

Systems SummarySystems Summary

Core Processing via Appliances

PC’s for User Interface + Clerical Work

Questions?

Daniel [email protected]