Top Banner
SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS 2002 Vindicator Technologies SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS NDIA SECURITY EXPO - 2003 MISSION CRITICAL PROCESSING MISSION CRITICAL PROCESSING Presentation Presentation Daniel Skret Daniel Skret Vindicator Technologies, Inc Vindicator Technologies, Inc
10

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS © 2002 Vindicator Technologies SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS NDIA SECURITY EXPO - 2003 MISSION.

Jan 02, 2016

Download

Documents

Meryl Anderson
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS © 2002 Vindicator Technologies SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS NDIA SECURITY EXPO - 2003 MISSION.

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

NDIA SECURITY EXPO - 2003

MISSION CRITICAL PROCESSINGMISSION CRITICAL PROCESSING

PresentationPresentation

Daniel SkretDaniel Skret

Vindicator Technologies, IncVindicator Technologies, Inc

Page 2: SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS © 2002 Vindicator Technologies SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS NDIA SECURITY EXPO - 2003 MISSION.

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

Mission Critical ProcessingMission Critical Processing

Enforcing Security Policy

Situational Awareness

Automatic Behaviors

Systems Integration

Page 3: SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS © 2002 Vindicator Technologies SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS NDIA SECURITY EXPO - 2003 MISSION.

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

Mission ExecutionMission Execution

Reduce PC’s Role to User Interface

Perform Mission via Security Appliances

Page 4: SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS © 2002 Vindicator Technologies SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS NDIA SECURITY EXPO - 2003 MISSION.

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

Platform EvolutionPlatform Evolution

Page 5: SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS © 2002 Vindicator Technologies SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS NDIA SECURITY EXPO - 2003 MISSION.

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

ArchitecturesArchitectures

Security Application and User Interface

ActiveX ATL

Native & 3rd Party DLL

OLE ADO OLE-DB ODBC DAO

DirectXGDI

.NET

NetBIOS

TCP/IP

RPC WinSock

NetBEUI IPX DLC

Windows API

Native & 3rd Party Device Drivers

Security Application

RTOS Network(TCP/IP)

FileSystem

Platform Device Drivers

DataBase

Office Suite Data Base System

1000MB

180 to420 MB

<10 MB

Typical PC Environment

Security Appliance

HTTPServer

Page 6: SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS © 2002 Vindicator Technologies SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS NDIA SECURITY EXPO - 2003 MISSION.

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

Software ComparisonSoftware Comparison

Security Appliance Personal Computer

Mission-Specific General Purpose

RTOS-Based OS-Based

Low Virus Vulnerability Extremely Vulnerable

<10 MB Code >1,000 MB Code

Stable Platform Constantly Changing

Page 7: SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS © 2002 Vindicator Technologies SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS NDIA SECURITY EXPO - 2003 MISSION.

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

Hardware ComparisonHardware Comparison

Security Appliance Personal Computer

Low Power (20W) LV UPS

200-1500W Mains UPS

100% Solid State Fans & Disks

>100,000 hr MTBF <10,000 hr MTBF

Hardened I/O External Adapters

Page 8: SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS © 2002 Vindicator Technologies SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS NDIA SECURITY EXPO - 2003 MISSION.

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

Attack VulnerabilityAttack Vulnerability

Security Appliance Personal Computer

Mission-Specific Protocols “Unused” GP Protocols

Cannot Host Programs Raison d’être…Scripts, Macros, Programs, etc.

Application-Level Encryption External VPN

Page 9: SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS © 2002 Vindicator Technologies SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS NDIA SECURITY EXPO - 2003 MISSION.

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

Enterprise DeploymentEnterprise Deployment

WAN

Site LAN

Site LAN

Site LAN

Site w/oLAN

HumanResourcesDepartment

Access Control

Local Management

Remotely Managed

Boston

Tampa

RS-485

RS-485

RS-485

RS-485

RS-485

RS-485

London

Los Angeles

Router

Router

RouterRouter

Alarm Management

Page 10: SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS © 2002 Vindicator Technologies SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS NDIA SECURITY EXPO - 2003 MISSION.

SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS

© 2

002

Vin

dica

tor

Tec

hnol

ogie

s

Systems SummarySystems Summary

Core Processing via Appliances

PC’s for User Interface + Clerical Work

Questions?

Daniel [email protected]