MicroTech CEO Delivers Keynote Address at Guidance Software Federal Summit

Thu, 2013-03-14 18:07 -- nitrous

The frequency of cyber attacks is increasing while the sophistication required of attackers is decreasing.
–Tony Jimenez, MicroTech President & CEO

In this age of big data and 'too much information (TMI)' being shared via social media from friends, family, and co-workers, the process of securing data is getting lost in the fray. Indeed, the culture shock of transitioning from older, strict communication channels to younger, millennial style data sharing and collaboration efforts in business, is somewhat overwhelming—especially to many business professionals. However, with forums like today’s Guidance Software Federal Summit on Data Visibility, technology, enterprise, and federal leaders had the opportunity to gather to discuss thought leadership, best practices, and brainstorm answers to questions like how community data sharing and cyber security can co-exist.

“Our goal again this year was to simply create an opportunity for the experts from many agencies as well as federal employees in related roles to come together for one problem-solving day,” wrote Lisa Ragusa, Federal Marketing Manager, Guidance Software.

Victor Limongelli, Guidance Software President & CEO, welcomed the nearly 100 summit participants to the Crowne Plaza National Airport Hotel in Arlington, Virginia. Proceeding Victor’s welcome, MicroTech President & CEO, Tony Jimenez, was the event’s Industry Keynote.

Jimenez’ presentation focused on “End-Point Visibility across the Enterprise,” and the issue of end-point (PC, smartphone, tablet) user secure data sharing. He specifically highlighted the relationship between two recent phenomenons: the decrease in sophistication of hacking and the increase in sharing information through social media.

“This correlated relationship combined with the increasing availability of data,” Jimenez said, “creates a very real problem for the government contracting industry.” He explained, “Endpoint Security and visibility across the networks becomes even more difficult when those endpoints are required to connect to multiple networks with varying security classifications. These endpoints range from integrated room systems and tactical systems to desktops, and possibly tablets and smartphones, which will all have to have the necessary audio, video, and data to traverse securely among the different networks.”

Endpoints can manually or automatically transfer from one network to another; however, current DoD policy requires a cleansing process, known as periods processing through the DISA community, which prevents information leaks between the networks. Although necessary, this required physical separation increases cost to the user because each channel needs acquisition, logistics, deployment, operation, and maintenance.

What Jimenez proposed to the Summit attendees and speakers including Director of the National Cybersecurity and Communications Integration Center (NCCIC), Larry Zelvin; CISO and Director of Information Assurance, NATO, Curtis Levinson; and former CISO of the Defense Intelligence Agency, Matthew McCormack, is an alternative innovative solution to that physical separation.

He advocated, “If used, this solution will need to satisfy stringent security, logistic, architectural, functional, design, and implementation requirements. MicroTech does this by vigorously encrypting each domain to separate the information which can then be transported over a single network infrastructure.”

Jimenez cited examples of cross-domain solutions like MicroTech’s DISA-approved Multiclass Secure Switching Solution, Multiclass S3®, which ensures complete isolation between classified and unclassified networks while securing simultaneous switching on both IP and ISDN networks.

Jimenez also introduced the option of using Virtual Dispersive Networking. This technology allows virtual machines to control network traffic. Businesses can build off of VDN by creating private networks. Even though this would be an open infrastructure, with software it can also be secured. Like the virtual machines, this open infrastructure can control how traffic is routed onto the open network.

The technologies he spoke about in his address further secure users by outfitting them with the weaponry required to fight the ever increasing battle between sharing data willingly and having data stolen.

More Images: 
Website Security Test