Operating in today's coalition-rich environments demands that appropriate data and information can be shared across security boundaries without fear of compromise.
Tresys pioneered the use of Linux for CDS and brings deep expertise to bear on the unique security challenges posed by connecting differing security domains. Tresys has extensive experience in the development of multi-level clients and servers, custom guards, and one-way message transfer devices. Areas of expertise include: specific CDS security requirements (e.g., DCID 6/3, DOD 8500.2, DOD Instruction 8510.01 – DIACAP) for appropriate operating environment / networks (e.g., Top Secret, Secret, and Coalition classifications); operational CDS objectives (e.g., system monitoring, integrity measurement, auditing); administrative role separation and functional/compliance review of CDS applications; and CDS data flows and rules development techniques.
Organizations that require secure connection of multiple security domains can tolerate zero errors or disruption in the handling of highly sensitive information...very few companies can meet that challenge.
Proliferation of virus software and/or malware via removable media, such as USB thumb drives and other USB peripheral devices, has exposed the enterprise to yet another attack vector.
Mission critical environments need to share information quickly and securely, and they need to do it every time without interruption.
- High integrity security by using a proven technology that secures some of the most demanding environments in the world.
- Maximum protection by leveraging OS security in application design that is otherwise not possible in Microsoft Windows.
- Flexible security integration by using Flexible MAC and SELinux enabled tools and the intent for knowledge transfer for developers.
- Recognized expertise by Red Hat, NSA, IBM, and others for advancing the best technologies for high security environments.
- All of our solutions are designed to enable quick development, deployment, and certification.
Tresys white papers & customer profiles contain more detail about our Assured Information Sharing expertise. They can be found in our Library.Read More
XD Air ™ (USG program known as FiST) enables the immediate use of USB devices for mission critical environments. Before introducing a USB device into an operational system, FiST identifies, isolates, removes, and stores (for forensic analysis) malicious content, including viruses and malware, as well as other threat vectors from USB devices.Learn More
XD Bridge ™ offers a low-cost PL5 uni- or bi-directional cross domain bridge appliance in a rack-mounted or tactical form factor.Learn More
XD Mail ™ (USG program known as eMIST) provides deep content inspection of email traffic – specifically designed to mitigate any attacks originating from email messages.Learn More
XD Router ™ (USG program known as TurretGate) is a secure, high performance DCID 6/3 PL4 CDS appliance that assures the routing, filtering, and delivery of message-oriented middleware data. TurretGate enables faster operational responsiveness with high throughput and low latency for safe dissemination of traffic across multiple security domains.Learn More
XD Elements ™ is a set of software libraries and tools used to build secure cross domain solutions and add more robust deep content inspection – specifically designed to integrate new AIS advancements onto existing products.Learn More