SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
gSNAP Primer
Kevin Mayo
–Chief Architect – Global Government
●Sun Microsystems, Inc.
●
Introduction – What is gSNAP?
• (government) Secure Network Access Platform
• Reference Architecture for secure collaboration at
the desktop
■ “70% solution” developed specifically for govt
customers
• Competitive advantage for Sun in specific markets
■ Sun unique products and technology
■ CSO technical engagements
■ Complimentary partner products and integration
Sun Confidential: Internal or Partner Use Only
How We Use IT is Also Changing
Dynamic Coalition and
Interoperability
Formation
Standards

Best of Class
Threat of Global
Security
Terrorism

Access Anytime

Technology As Major
Anywhere
Element of Operations

Sun Confidential: Internal or Partner Use Only
gSNAP Market Drivers
• Government agencies have increasing need to collaborate
■ Within agency
■ With other agencies
■ With trusted partners (suppliers, research centres)
■ With agencies of other nations
• Government users have increasing need to access
information from anywhere, anytime
• Security and privacy are key requirements
• Sources of information are increasingly diverse

Sun Confidential: Internal or Partner Use Only
gSNAP Market Positioning
• Government agencies with collaboration needs
■ Defence (NATO)
■ Public security/ public safety (Interpol)
■ Emergency response (central, provincial, city)
■ Public health (CDC, WHO)
■ Government research centres and universities

Sun Confidential: Internal or Partner Use Only
Government System Requirements
• Trusted computing environment
• Single Virtual Switch to Multiple Networks
■

■

Single desktop with connections to multiple security
domains implemented as physically separated networks
(without enabling intra-domain routing)
End-users have controlled access to domains based on
security level, compartmentalization

• Secure Inter-Domain Data Transfer
■

Automated and manual auditing based on pre-defined
policies and procedures

• Remote Access Protocol Options
■

Tarantella, Citrix, RDP, X Windows or Browser.
Sun Confidential: Internal or Partner Use Only
Changing the Game—
Single Multi-Tiered Secure Communications
SINGLE-POINT FOR INFO ASSURANCE

Secure Domain A, Apps 1,2,3

Secure Domain B, Apps 4,5,6

Secure Domain C, Apps 7,8,9

Secure Domain D, Apps 10,11

Secure Domains A to Z
On ONE Terminal
With data assurance across security
domains
Sun Confidential: Internal or Partner Use Only
Desktop Consolidation:
Ultra-Thin Client Front-End
Before:

After:

To ensure a high level of security
physically isolated clients were
deployed often resulting in up to 10
different Desktops in a single office

Full Session Mobility enabled by a
single stateless Sun Ray TM frontend and protected by a Trusted
Solaris TM based back-end

Sun Confidential: Internal or Partner Use Only
The Sun Solution:
Secure Network Access Platform
User
Community
A
Switch

User
Community
B

Switch

Switch

User
Community
C

User
Community
D

Switch

Switch

Trusted Solaris
● Sun Ray Session
● Server
●

Switch

Switch

Switch
●
●

●

●

●

24/7 remote management

Sun Ray stateless
Clients Java
Card identity

Network attached storage
for audit logs
Sun Jumpstart Software
for automated site replication

Sun Confidential: Internal or Partner Use Only

• Highly scalable
• Multi-network
consolidation
• Ultra secure
• Identity/Role-based
access
• Audit ability
• Session mobility
Secure Network Access Platform for
Government Solution
3rd Party Security
Extensions

TCS, TNE, AC Tech,
Cryptek, Tenix, RSA, Maxim, etc.

Integration to Legacy
Systems

Tarantella, Citrix, RDP, Thinsoft

Java Ultra-Thin Client
Environment

SunRay 1G, 170; Sun Ray Session Server,
Trusted CDE, Java Cards

Government Accredited
Trusted Operating Env

Trusted Solaris Certified EAL4 (B1):
CAPP, LSPP, RBPP
Sun Solaris
Enterprise StorEdge ™ 9

RAS Compute Platform
Consulting, Training,
and Support Services

Sun Servers

Sun Open Work Practice, Workshop, POC,
Architecture and Implementation + Training
and Support

Sun Confidential: Internal or Partner Use Only
Trusted Solaris Direction
Trusted Solaris

BSM

Solaris
Solaris
2.3

Trusted Networking
Trusted Desktop

RBAC

Trusted
Solaris
layered
on Solaris

Process Attributes
Device Allocation
Virtualization
Privilege Policy

Solaris
8/9
Sun Confidential: Internal or Partner Use Only

Solaris 10
Secure Foundation of Dramatic Improvements
Solaris 10 Security
Digital Certificates Everywhere
Secure Execution
User Rights Management
Process Rights Management
Cryptographic Framework
IPFilter
Kerberos Single Sign On
Easily Activated Security Profiles
Sun Confidential: Internal or Partner Use Only
Multi-Level Labeled Security
Trusted Extensions
Adds labeled security to Solaris 10
Multi-level networking, printing
Multi-level CDE GUI
Leverages User & Process RM
Uses Containers
Compatible with all Solaris apps
Target of CAPP, RBACPP, LSPP @
EAL 4+
Available 1HCY2006
Sun Confidential: Internal or Partner Use Only
Sun Confidential: Internal or Partner Use Only
Based on Best
Practices From
Innovative Customer
Solutions:
DTW—DODIIS Trusted Workstation
●

Proven solution developed at Joint

Intelligence Center Pacific—JICPAC
●

Mandated by DIA as standard secure
desktop access solution for DODIIS
community
Coalition

Sun Confidential: Internal or Partner Use Only

DEA
INS

Circa 2000 seats deployed, multi-year
program managed by JEDI

Sun Network Access Platform
Solution
military
Intelligence

●

Government
Control
Center
DTW Components
JEDI JUMPSTART IMAGE:
Trusted Solaris 8 (12/02)

SunRay Software 2.0 w/Failover Groups
JMDI (JEDI) Extensions
Jumpstart support

- Streamlined User & Host management

Audit Management

- Authorized application Mgmt.

TCS software
●
●
●

SunRay thin Clients with 24” Flat-Panel monitors
Load Balanced Sun Servers
Windows 2003 servers connected via RDP
Sun Confidential: Internal or Partner Use Only

Weitere ähnliche Inhalte

Was ist angesagt?

Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos
 
Presentation fortinet securing the cloud
Presentation   fortinet securing the cloudPresentation   fortinet securing the cloud
Presentation fortinet securing the cloudxKinAnx
 
Sophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Benelux
 
Fortinet Icon Library
Fortinet Icon LibraryFortinet Icon Library
Fortinet Icon LibraryFortinet
 
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionMarketingArrowECS_CZ
 
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraCheck Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraMarketingArrowECS_CZ
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF-Secure Corporation
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityMarketingArrowECS_CZ
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser ProtectionSophos
 
Security as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-SecureSecurity as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-SecurePouria Ghatrenabi
 
Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017Netpluz Asia Pte Ltd
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview GENIANS, INC.
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecGENIANS, INC.
 
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change ProcessesBest Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change ProcessesAdi Gazit Blecher
 
F-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure Corporation
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionGiovanni Giovannelli
 

Was ist angesagt? (20)

Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 
Presentation fortinet securing the cloud
Presentation   fortinet securing the cloudPresentation   fortinet securing the cloud
Presentation fortinet securing the cloud
 
Sophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypes
 
Azure F5 Solutions
Azure F5 SolutionsAzure F5 Solutions
Azure F5 Solutions
 
Sophos XG Firewall
Sophos XG FirewallSophos XG Firewall
Sophos XG Firewall
 
Fortinet Icon Library
Fortinet Icon LibraryFortinet Icon Library
Fortinet Icon Library
 
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud Adoption
 
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraCheck Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and management
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud Security
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
Security as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-SecureSecurity as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-Secure
 
Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 Infosec
 
F5 Cloud Story
F5 Cloud StoryF5 Cloud Story
F5 Cloud Story
 
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change ProcessesBest Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change Processes
 
F-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure E-mail and Server Security
F-Secure E-mail and Server Security
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
 

Andere mochten auch

17 принципов создания идеальной дизайн-концепции
17 принципов создания идеальной дизайн-концепции17 принципов создания идеальной дизайн-концепции
17 принципов создания идеальной дизайн-концепцииDEFA
 
Trusted extensions-gdansk-v1 0
Trusted extensions-gdansk-v1 0Trusted extensions-gdansk-v1 0
Trusted extensions-gdansk-v1 0Kevin Mayo
 
Брифование и проектирование. Важность предварительных этапов
Брифование и проектирование. Важность предварительных этаповБрифование и проектирование. Важность предварительных этапов
Брифование и проектирование. Важность предварительных этаповDEFA
 
Старикам тут не место.
Старикам тут не место.Старикам тут не место.
Старикам тут не место.DEFA
 
Имиджевый аспект государственных сайтов
Имиджевый аспект государственных сайтовИмиджевый аспект государственных сайтов
Имиджевый аспект государственных сайтовDEFA
 
Digital branding: Теория и практика малых дел
Digital branding: Теория и практика малых делDigital branding: Теория и практика малых дел
Digital branding: Теория и практика малых делDEFA
 
3 leccion
3 leccion3 leccion
3 leccion07leo
 
Сайт как инструмент оперативного реагирования
Сайт как инструмент оперативного реагированияСайт как инструмент оперативного реагирования
Сайт как инструмент оперативного реагированияDEFA
 
WorldFree Direct Sales
WorldFree Direct SalesWorldFree Direct Sales
WorldFree Direct SalesWorldFreeds
 
Secure nets-and-data
Secure nets-and-dataSecure nets-and-data
Secure nets-and-dataKevin Mayo
 
Как создать государственный интернет-ресурс
Как создать государственный интернет-ресурсКак создать государственный интернет-ресурс
Как создать государственный интернет-ресурсDEFA
 
Полезные модули DEFA для автоматизации работы интернет-магазина
Полезные модули DEFA для автоматизации работы интернет-магазинаПолезные модули DEFA для автоматизации работы интернет-магазина
Полезные модули DEFA для автоматизации работы интернет-магазинаDEFA
 
Современный музейный сайт
Современный музейный сайтСовременный музейный сайт
Современный музейный сайтDEFA
 
Siadima anastasia 1508 syrigou eythymia 1359
Siadima anastasia 1508 syrigou eythymia 1359Siadima anastasia 1508 syrigou eythymia 1359
Siadima anastasia 1508 syrigou eythymia 1359effiesyr
 

Andere mochten auch (17)

17 принципов создания идеальной дизайн-концепции
17 принципов создания идеальной дизайн-концепции17 принципов создания идеальной дизайн-концепции
17 принципов создания идеальной дизайн-концепции
 
Trusted extensions-gdansk-v1 0
Trusted extensions-gdansk-v1 0Trusted extensions-gdansk-v1 0
Trusted extensions-gdansk-v1 0
 
Брифование и проектирование. Важность предварительных этапов
Брифование и проектирование. Важность предварительных этаповБрифование и проектирование. Важность предварительных этапов
Брифование и проектирование. Важность предварительных этапов
 
Старикам тут не место.
Старикам тут не место.Старикам тут не место.
Старикам тут не место.
 
Имиджевый аспект государственных сайтов
Имиджевый аспект государственных сайтовИмиджевый аспект государственных сайтов
Имиджевый аспект государственных сайтов
 
Skazka pro tochku
Skazka pro tochkuSkazka pro tochku
Skazka pro tochku
 
Digital branding: Теория и практика малых дел
Digital branding: Теория и практика малых делDigital branding: Теория и практика малых дел
Digital branding: Теория и практика малых дел
 
3 leccion
3 leccion3 leccion
3 leccion
 
Сайт как инструмент оперативного реагирования
Сайт как инструмент оперативного реагированияСайт как инструмент оперативного реагирования
Сайт как инструмент оперативного реагирования
 
WorldFree Direct Sales
WorldFree Direct SalesWorldFree Direct Sales
WorldFree Direct Sales
 
Secure nets-and-data
Secure nets-and-dataSecure nets-and-data
Secure nets-and-data
 
Gebeurtenis
GebeurtenisGebeurtenis
Gebeurtenis
 
Как создать государственный интернет-ресурс
Как создать государственный интернет-ресурсКак создать государственный интернет-ресурс
Как создать государственный интернет-ресурс
 
Massage Therapy
Massage TherapyMassage Therapy
Massage Therapy
 
Полезные модули DEFA для автоматизации работы интернет-магазина
Полезные модули DEFA для автоматизации работы интернет-магазинаПолезные модули DEFA для автоматизации работы интернет-магазина
Полезные модули DEFA для автоматизации работы интернет-магазина
 
Современный музейный сайт
Современный музейный сайтСовременный музейный сайт
Современный музейный сайт
 
Siadima anastasia 1508 syrigou eythymia 1359
Siadima anastasia 1508 syrigou eythymia 1359Siadima anastasia 1508 syrigou eythymia 1359
Siadima anastasia 1508 syrigou eythymia 1359
 

Ähnlich wie G snap security-solution

Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Decisions
 
Network Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationNetwork Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationDouglas Gourlay
 
Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus Marketing Team
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_masterdakins090174
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonDigital Catapult
 
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...Xirrus
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupBitglass
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastrukturyPROIDEA
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...TheAnfieldGroup
 
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and SimulinkApplying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and SimulinkGerardo Pardo-Castellote
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud GenerationForcepoint LLC
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraRogerChaucaZea
 

Ähnlich wie G snap security-solution (20)

Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Fortinet_for_SAP
Fortinet_for_SAPFortinet_for_SAP
Fortinet_for_SAP
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Network Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationNetwork Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems Presentation
 
Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
 
Cyber Security for the Connected Car
Cyber Security for the Connected Car Cyber Security for the Connected Car
Cyber Security for the Connected Car
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
 
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and SimulinkApplying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
 

Kürzlich hochgeladen

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 

Kürzlich hochgeladen (20)

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 

G snap security-solution

  • 1. gSNAP Primer Kevin Mayo –Chief Architect – Global Government ●Sun Microsystems, Inc. ●
  • 2. Introduction – What is gSNAP? • (government) Secure Network Access Platform • Reference Architecture for secure collaboration at the desktop ■ “70% solution” developed specifically for govt customers • Competitive advantage for Sun in specific markets ■ Sun unique products and technology ■ CSO technical engagements ■ Complimentary partner products and integration Sun Confidential: Internal or Partner Use Only
  • 3. How We Use IT is Also Changing Dynamic Coalition and Interoperability Formation Standards Best of Class Threat of Global Security Terrorism Access Anytime Technology As Major Anywhere Element of Operations Sun Confidential: Internal or Partner Use Only
  • 4. gSNAP Market Drivers • Government agencies have increasing need to collaborate ■ Within agency ■ With other agencies ■ With trusted partners (suppliers, research centres) ■ With agencies of other nations • Government users have increasing need to access information from anywhere, anytime • Security and privacy are key requirements • Sources of information are increasingly diverse Sun Confidential: Internal or Partner Use Only
  • 5. gSNAP Market Positioning • Government agencies with collaboration needs ■ Defence (NATO) ■ Public security/ public safety (Interpol) ■ Emergency response (central, provincial, city) ■ Public health (CDC, WHO) ■ Government research centres and universities Sun Confidential: Internal or Partner Use Only
  • 6. Government System Requirements • Trusted computing environment • Single Virtual Switch to Multiple Networks ■ ■ Single desktop with connections to multiple security domains implemented as physically separated networks (without enabling intra-domain routing) End-users have controlled access to domains based on security level, compartmentalization • Secure Inter-Domain Data Transfer ■ Automated and manual auditing based on pre-defined policies and procedures • Remote Access Protocol Options ■ Tarantella, Citrix, RDP, X Windows or Browser. Sun Confidential: Internal or Partner Use Only
  • 7. Changing the Game— Single Multi-Tiered Secure Communications SINGLE-POINT FOR INFO ASSURANCE Secure Domain A, Apps 1,2,3 Secure Domain B, Apps 4,5,6 Secure Domain C, Apps 7,8,9 Secure Domain D, Apps 10,11 Secure Domains A to Z On ONE Terminal With data assurance across security domains Sun Confidential: Internal or Partner Use Only
  • 8. Desktop Consolidation: Ultra-Thin Client Front-End Before: After: To ensure a high level of security physically isolated clients were deployed often resulting in up to 10 different Desktops in a single office Full Session Mobility enabled by a single stateless Sun Ray TM frontend and protected by a Trusted Solaris TM based back-end Sun Confidential: Internal or Partner Use Only
  • 9. The Sun Solution: Secure Network Access Platform User Community A Switch User Community B Switch Switch User Community C User Community D Switch Switch Trusted Solaris ● Sun Ray Session ● Server ● Switch Switch Switch ● ● ● ● ● 24/7 remote management Sun Ray stateless Clients Java Card identity Network attached storage for audit logs Sun Jumpstart Software for automated site replication Sun Confidential: Internal or Partner Use Only • Highly scalable • Multi-network consolidation • Ultra secure • Identity/Role-based access • Audit ability • Session mobility
  • 10. Secure Network Access Platform for Government Solution 3rd Party Security Extensions TCS, TNE, AC Tech, Cryptek, Tenix, RSA, Maxim, etc. Integration to Legacy Systems Tarantella, Citrix, RDP, Thinsoft Java Ultra-Thin Client Environment SunRay 1G, 170; Sun Ray Session Server, Trusted CDE, Java Cards Government Accredited Trusted Operating Env Trusted Solaris Certified EAL4 (B1): CAPP, LSPP, RBPP Sun Solaris Enterprise StorEdge ™ 9 RAS Compute Platform Consulting, Training, and Support Services Sun Servers Sun Open Work Practice, Workshop, POC, Architecture and Implementation + Training and Support Sun Confidential: Internal or Partner Use Only
  • 11. Trusted Solaris Direction Trusted Solaris BSM Solaris Solaris 2.3 Trusted Networking Trusted Desktop RBAC Trusted Solaris layered on Solaris Process Attributes Device Allocation Virtualization Privilege Policy Solaris 8/9 Sun Confidential: Internal or Partner Use Only Solaris 10
  • 12. Secure Foundation of Dramatic Improvements Solaris 10 Security Digital Certificates Everywhere Secure Execution User Rights Management Process Rights Management Cryptographic Framework IPFilter Kerberos Single Sign On Easily Activated Security Profiles Sun Confidential: Internal or Partner Use Only
  • 13. Multi-Level Labeled Security Trusted Extensions Adds labeled security to Solaris 10 Multi-level networking, printing Multi-level CDE GUI Leverages User & Process RM Uses Containers Compatible with all Solaris apps Target of CAPP, RBACPP, LSPP @ EAL 4+ Available 1HCY2006 Sun Confidential: Internal or Partner Use Only
  • 14. Sun Confidential: Internal or Partner Use Only
  • 15. Based on Best Practices From Innovative Customer Solutions: DTW—DODIIS Trusted Workstation ● Proven solution developed at Joint Intelligence Center Pacific—JICPAC ● Mandated by DIA as standard secure desktop access solution for DODIIS community Coalition Sun Confidential: Internal or Partner Use Only DEA INS Circa 2000 seats deployed, multi-year program managed by JEDI Sun Network Access Platform Solution military Intelligence ● Government Control Center
  • 16. DTW Components JEDI JUMPSTART IMAGE: Trusted Solaris 8 (12/02) SunRay Software 2.0 w/Failover Groups JMDI (JEDI) Extensions Jumpstart support - Streamlined User & Host management Audit Management - Authorized application Mgmt. TCS software ● ● ● SunRay thin Clients with 24” Flat-Panel monitors Load Balanced Sun Servers Windows 2003 servers connected via RDP Sun Confidential: Internal or Partner Use Only