cloudbrokerage.in

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 31 August 2009

Pentagon Reviews Unisys Stealth

Posted on 05:00 by Unknown
According to a Newtworkworld.com article, the United States Joint Forces Command (USJFC) is currently evaluating Unisys Stealth technology at the Joint Transformation Command for Intelligence (JTC-I) in Suffolk, Virginia.

"Unisys Stealth Solution for Network lets an organization set up “communities of interest” through a group policy using Microsoft Active Directory, with session-specific encryption keys scrambling data that can only be decrypted by those belonging to each group. Stealth works to “bit-split” data into multiple packets and re-assemble it to authorized users, which alone can decrypt it."

A Unisys press release further states that USJFCOM will be testing "cryptographic bit-splitting" as a way to converge DoD Global Information Grid networks operating at different security levels into a single network infrastructure.

"This technology can address a longstanding challenge for the Department of Defense and other government agencies: how to simplify their networks without sacrificing security, while delivering significant cost savings," said Jim Geiger, managing partner, Department of Defense, Unisys Federal Systems. "Unisys will draw upon its extensive experience with the Unisys Stealth Solution for Networks to support the Joint Forces Command and the Joint Transformation Command for Intelligence in this pioneering effort to promote secure data and information sharing among various communities within the DoD. This solution is now the double-encryption security mechanism protecting the Unisys Secure Cloud solution."

In my December 2008 post I described cryptographic bit splitting as a new approach for securing information. Its advantages inclue:
  • Enhanced security from moving shares of the data to different locations on one or more data depositories or storage devices (different logical, physical or geographical locations
  • Shares of data can be split physically and under the control of different personnel reducing the possibility of compromising the data.
  • A rigorous combination of the steps is used to secure data providing a comprehensive process of maintaining security of sensitive data.
  • Data is encrypted with a secure key and split into one or more shares
  • Lack of a single physical location towards which to focus an attack
My company, Dataline LLC, is also leveraging this technology during the Trident Warrior '10 fall lab experimentation period. As I posted in US Navy Experiment With Secure Cloud Computing, the Secure Cloud Computing experiment has been designed to explore the use of a commercial Infrastructure as a Service (IaaS) platform as a viable means of supporting a specified subset of US Navy mission requirements for global connectivity, server failover and application access. Goals for the experiment include:
  • Demonstrating the establishment and use of trusted communication paths on a global public computing infrastructure; and
  • Demonstrating dynamic, mission driven, provisioning of information via trusted communication paths on a global public computing infrastructure
I'll keep you posted on the outcome of both DoD activities.

( Thank you. If you enjoyed this article, get free updates by email or RSS - KLJ )
Email ThisBlogThis!Share to XShare to Facebook
Posted in cloud computing, GovCloud | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Government still wary of cloud computing
    Federal News Radio interviewed Ron Markezich, a corporate vice president of Microsoft, Mike Bradshaw, president of Google federal, and Mich...
  • NRRC Video Series - Video 5 : Boeing Ozone Dashboards for Emergency Management
    In September, the NCOIC delivered the Geospatial Community Cloud (GCC) demonstration . Sponsored by the National Geospatial-Intelligence Ag...
  • So what kind of consultant are you?
    Yesterday over lunch, a good friend of mine from the Limelight Marketing Group and I started talking about my recent transition. As you can...
  • Cloud Computing as a Strategic Asset
    For some reason, this week seems to have more in it than most. While the steady stream of briefing request seem to be increasing, the post b...
  • Iranian Protests Showcase Twitter, Facebook, YouTube (and Cloud Computing) !
    In covering unfolding events in Iran, the world's most powerful news outlets have been entirely dependent on the Twitter-provided flow o...
  • Vivek Kundra Nominated for Federal CIO
    Mr. Kundra's quote from the Wall Street Journal says it all: “I’m a big believer in disruptive technology. If I went to the coffee shop,...
  • MIT Survey: What A Response !!
    We've been quite surprised by the number of survey responses we've received.  THANK YOU !!   That subset of the cloud computing comm...
  • Robert Duffner Interviews Chris Kemp, NASA, and Kevin Jackson, NJVC, on GovCloud
    Recently, I had the pleasure of being interviewed by Mr. Robert Duffner , director of Product Management for Windows Azure , as part of his ...
  • BISNOW Data Center Event Highlight's Cloud
    A big thank you to BISNOW and my fellow panel members for an outstanding discussion and very informative event, last week's Data Center ...
  • CSC and Terremark target US Government with Cloud Computing
    Today's announcement by CSC reinforced the strong wave of cloud computing towards the Federal space. Ranked by Washington Technology Ma...

Categories

  • 3Tera
  • 451
  • A. K. Cebrowski
  • ACT
  • ACT-IAC
  • adhoc information system
  • Air Force Maj. Gen. David Edgington
  • ajax
  • Akamai
  • Akamai Boeing Company
  • All Things Considered
  • amazon
  • Amazon Web Services
  • Amazon.
  • ambient awareness
  • American Council for Technology
  • Andres Seabrook
  • Andrew McLaughlin
  • Animoto
  • Appirio
  • Appistry
  • AppJet
  • AppLogic
  • Apptis
  • Army
  • ASD NII
  • Assistant Secretary of Defense
  • ATT
  • auto-scaling
  • Avner Algom
  • Azure
  • BAE Systems
  • BAH
  • Ballmer
  • Balmer
  • bandwidth auction
  • bandwidth cloud
  • bandwidth-on-demand
  • barack obama
  • Battle for Clicks
  • battlegroup cloud
  • Berkely Cloud Computing
  • BerkelyDB
  • Bigtable
  • bill clinton
  • Bill Gerety
  • blue business platform
  • BMC
  • Bob Gourley
  • Bob Lozano
  • Bob Marcus
  • Boeing
  • Booz Allen Hamilton
  • Brand Niemann
  • budgeting process
  • CANES
  • capital expenditures
  • carl ichan
  • CDC
  • Center for Strategic and International Studies
  • Centers for Disease Control and Prevention
  • child development group of mississippi
  • children's defense fund
  • China
  • Chirag Mehta
  • Chris Capossela
  • chris kemp
  • Chris Pearson
  • Christian Science Monitor
  • Christophe Bisciglia
  • Chrome
  • chuck mehle
  • CIA
  • Cinematic Artificial Intelligence
  • cio 2.0
  • CIO Survey
  • Cisco
  • cloud broker
  • cloud broker; cloud computing
  • cloud computing
  • cloud computing benefits
  • Cloud Computing Center
  • cloud computing concerns
  • Cloud Computing Decision
  • cloud computing dictionary
  • cloud computing events
  • Cloud Computing Expo
  • cloud computing group
  • Cloud Computing Guides
  • Cloud computing journal
  • Cloud Computing Marketplace
  • Cloud computing offerings
  • cloud computing portal
  • cloud computing research
  • cloud computing security
  • cloud computing survey
  • cloud computing taxonomy
  • Cloud Computing Twiki
  • Cloud computing use
  • Cloud computing value
  • Cloud Computing War Game
  • Cloud Computing Wargame
  • Cloud Economic Models
  • cloud interoperability
  • cloud rating
  • cloud redundancy
  • cloud reliability
  • Cloud Security
  • cloud services
  • cloud spectator
  • cloud standards
  • cloud vendors
  • CloudCamp
  • CloudCamp Federal
  • CloudCamp: Federal
  • Cloudera
  • CloudExpo
  • CloudNow
  • CNBC
  • CNET
  • Cohesiveft
  • Col. Vincent Valdespino
  • Colin McNamara
  • Collabnet
  • Controlled Unclassified Information
  • COOP
  • correlative analysis
  • Cryptographic data splitting
  • CSC
  • cubit
  • CUI
  • Customs and Border Patrol
  • Cybersecurity
  • Daoli
  • Dark Cloud
  • data center
  • Dataline
  • Dave Douglas
  • Dave Stegon
  • David Douglas
  • David Lindquist
  • David Mihelcic
  • David Ryan
  • Dawn Leaf
  • DDOS
  • defense
  • Defense Intelligence Agency CTO
  • definition operations
  • Dell
  • Department of Interior
  • DHS
  • Diane Bryant
  • DICOM
  • Dion Hinchcliffe
  • DISA
  • DISA CTO
  • Dissemination
  • DoD
  • DoD Cloud Computing
  • Dr. Brand Niemann
  • EAGLE
  • Earth Builder
  • Earthbuilder
  • ebook
  • EC2
  • Elastic Block Store
  • Elastra
  • EMC
  • Enomaly
  • Enomoly
  • enStratus
  • eric schmidt
  • Eurocloud
  • European Defense Agency
  • eweek
  • Exchange
  • Explaining Cloud Computingchristopher Barnatt
  • Exploitation
  • FBI
  • fccI
  • Fedcloud
  • Federal
  • Federal CIO
  • Federal Cloud Computing Wiki
  • Federal News Radio
  • Federal SOA Community of Practice
  • FedRAMP
  • FIPS
  • FirstChoice
  • FISMA
  • Forrester
  • FOSE 2009
  • gaming cloud
  • gartner
  • GEOINT
  • george bush
  • george mason university
  • George Reese
  • George W. Casey
  • Georgia
  • Geva Perry
  • Glenn Dasmalchi
  • Global Content Delivery Service
  • Go Grid
  • Golden Phoenix
  • Goldman
  • Google
  • Google Docs
  • google mindshare
  • google trends
  • GovCloud
  • Government
  • government cloud computing
  • Gravitant
  • green cloud computing
  • Greg Boss
  • grid computing
  • GSA
  • GSA FedRAMP Apps.gov
  • GSAW
  • HaaS
  • Hadoop
  • Harrison Donnelly
  • Henry Sienkiewcz
  • Hewlett Packard
  • high performance computing
  • hillary clinton
  • HL7
  • home depot
  • homeland security
  • HP
  • hype cycle
  • IaaS
  • IAC
  • IBM
  • IGT
  • Implemetation of Network-Centric Warfare
  • Industry Advisory Council
  • information
  • information operations
  • Information Sharing
  • Information Sharing Environment
  • Information Week
  • Inforworld
  • inmobile
  • intel
  • intelligence community
  • intelligence support
  • intelligence support information operations
  • intellipedia
  • Irving Wladasky-Berger
  • Israel
  • IT budget
  • Japan
  • Jason Miller
  • java
  • Jeff Barr
  • Jeffrey A. Sorenson
  • Jeremy Geelan
  • Jill Singer
  • Joe McKendrick
  • John Dvorak
  • John Foley
  • John Garing
  • John Grimes
  • john mccain
  • joint forces command
  • joint intelligence laboratory
  • Joint Warfighting Conference 08 (JWC 08)
  • jott
  • Juniper Networks
  • JWICS
  • Katie Lewin
  • Kevin Jackson
  • KMI Media
  • LANDWARNET
  • Larry Ellison
  • latency
  • Lauren States
  • law enforcement
  • Leslie Lenert
  • Letitia long
  • library of national intelligence
  • LinkedIn Answers
  • location based services
  • MaaS
  • maneuver warfare
  • marian wright edelman
  • MashupOS
  • McKinsey
  • MEDWEB
  • mentat
  • Michael Farber
  • Michael Vizard
  • microsoft
  • Midori
  • Mike Bradshaw
  • Mike Cameron
  • Mike Krieger
  • Military information technology
  • military secure mobile communications
  • MIT
  • MIT Survey
  • mobile
  • MobileMe
  • Mongo
  • National Defense University. IRM College
  • National Office for Cyberspace
  • National Public Radio
  • National Science Foundation
  • national security
  • NATO
  • NATO Communications and Information Systems Services Agency
  • Navy
  • Navy CIO Robert Carey
  • Navy Marine Corps Intranet
  • Navy Next Generation Enterprise Network
  • NC3
  • NCES
  • NCIC
  • NCOIC
  • NCOIC Plenary Session
  • NCSA
  • net-centric warfare
  • Netcentric Corporation
  • Network Centic Operations Industry Consortium
  • Network Centric Operations Industry Consortium
  • Networx
  • NextGen
  • Nexus
  • NGA
  • NGEN
  • Nicholas Carr
  • NIPRNet
  • NIST
  • NJVC
  • NLETS
  • NMCI
  • North Carolina
  • Northrop Grumman
  • Northrop Grumman Mission Systems
  • NPR
  • NRO
  • NSA
  • NSG
  • NVTC
  • O'Reilly Media
  • Office Commuincations
  • Office of Force Transformation
  • OMB
  • On The Frontlines
  • ontology
  • operational expenditures
  • Oracle
  • Oracle On Demand
  • oral history
  • OSD Cloud ComputingD
  • PaaS
  • Parabon
  • Parker Harris
  • Paul Strassmann
  • Pauline Healy
  • PED
  • Peter Coffee
  • Peter Nickolov
  • Petra Mayer
  • platform-as-a-service
  • plenary
  • PlugIntoTheCloud.com
  • PostPath
  • private clouds
  • Processing
  • project hydrazine
  • public - private clouds
  • Q-layer
  • RACE
  • Rackspace
  • RAID
  • Ramat Gan
  • Randall Stross
  • Red Herring
  • relational databases
  • Republican National Convention
  • Reuven Cohen
  • Richard Martin
  • RightScale
  • RNC
  • Rob Vietmeyer
  • robert brewin
  • Robert Carey
  • robert duffner
  • Rod Fontecilla
  • Roger Baker
  • Ron Markezich
  • Russia
  • SaaS
  • Sachs
  • SAIC
  • salesforce.com
  • SAP
  • scalability computing
  • Scott Lowe
  • secure cloud computing
  • security
  • security risk
  • Sensitive But Unclassified
  • Servervault
  • service level agreements
  • shane robinson
  • SharePoint
  • SinpleDB
  • SIPRNet
  • SISO
  • situational awareness
  • six degrees of separation
  • SLA
  • SOA
  • SOA Predictions
  • SOA-R
  • SOA-R Interactive Network Group
  • solar powered mobile communications
  • Soraya Correa
  • sourceforge
  • space situational awareness
  • speech
  • stateless computing
  • Steam Cloud
  • Steve Mills
  • steve stroh
  • Steven L Armentrout
  • Stevie Clifton
  • sun
  • Susanne Balle
  • SYS-CON
  • tactical cloud
  • tactical simulations
  • TECH Bisnow Washington
  • technology
  • TechWeb
  • Terremark
  • Terremark Worldwide
  • Terry Morgan
  • The Big Switch
  • The Economist
  • TIC
  • Tim May
  • Tivoli
  • Todd Wiseman
  • TPM
  • trademark
  • Traditional vs. Cloud
  • transcloud
  • Transition Study Group
  • Trezz Media
  • Tsinghua University
  • Twitter
  • UAV
  • USJFCOM
  • USPTO
  • utility computing
  • Valiant Angel
  • Valve
  • VanRoekel
  • VDC-OS
  • Verizon
  • Veteran's Administration
  • Virtual Network Link
  • virtualization
  • Virtustream
  • Vista
  • Vivek Kundra
  • Vivwk Kundra
  • VMware
  • voiceinteraction
  • Wall Street Journal
  • Walt Mossberg
  • web2.0
  • Werner Vogels
  • White House
  • William Forrest
  • wireless
  • Wohl Centre
  • World Summit of Cloud Computing
  • XCalibre
  • XEN
  • yahoo
  • ZeroNines

Blog Archive

  • ►  2013 (39)
    • ►  December (7)
    • ►  November (7)
    • ►  October (2)
    • ►  September (2)
    • ►  August (3)
    • ►  July (3)
    • ►  June (2)
    • ►  May (3)
    • ►  April (4)
    • ►  March (3)
    • ►  February (3)
  • ►  2012 (27)
    • ►  December (2)
    • ►  November (4)
    • ►  October (4)
    • ►  September (2)
    • ►  August (3)
    • ►  July (3)
    • ►  May (2)
    • ►  April (1)
    • ►  March (4)
    • ►  February (1)
    • ►  January (1)
  • ►  2011 (32)
    • ►  December (1)
    • ►  November (2)
    • ►  October (6)
    • ►  September (4)
    • ►  August (1)
    • ►  July (2)
    • ►  June (2)
    • ►  May (2)
    • ►  April (4)
    • ►  March (3)
    • ►  February (1)
    • ►  January (4)
  • ►  2010 (54)
    • ►  December (4)
    • ►  November (3)
    • ►  October (4)
    • ►  September (3)
    • ►  August (5)
    • ►  July (3)
    • ►  June (5)
    • ►  May (4)
    • ►  April (3)
    • ►  March (5)
    • ►  February (5)
    • ►  January (10)
  • ▼  2009 (115)
    • ►  December (1)
    • ►  November (6)
    • ►  October (6)
    • ►  September (7)
    • ▼  August (10)
      • Pentagon Reviews Unisys Stealth
      • "Cash for Clunkers" Should Have Used the Cloud!
      • US Navy Experiments With Secure Cloud Computing
      • GSA To Present On Cloud Initiative at NCOIC Plenary
      • FAA CIO Focuses on Cybersecurity
      • DHS Asst. Secretary Addresses Cybersecurity Priori...
      • US DoD Chief Security Officer on Cybersecurity Pri...
      • Twitter Under Denial of Service Attack
      • NCOIC Holding Full Day Cloud Computing Session
      • Sevatec a New Player in the Federal Cloud Computin...
    • ►  July (13)
    • ►  June (10)
    • ►  May (8)
    • ►  April (11)
    • ►  March (13)
    • ►  February (14)
    • ►  January (16)
  • ►  2008 (200)
    • ►  December (19)
    • ►  November (22)
    • ►  October (23)
    • ►  September (23)
    • ►  August (23)
    • ►  July (30)
    • ►  June (26)
    • ►  May (34)
Powered by Blogger.

About Me

Unknown
View my complete profile