Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

USB cleansing appliance for government use

Tresys Technology : 21 May, 2009  (New Product)
Tresys has developed a rugged, laptop based kiosk for screening and cleansing USB devices prior to use at locations with a high IT security risk
Tresys Technology has announced the successful development of a security solution for the recent threat to critical government information systems posed by 'dirty' USB devices. The widespread and complex threat resulted in USB devices being banned by many government organizations. In response to the threat, Tresys rapidly customized and delivered a rugged, laptop-based Kiosk appliance built on open source software to mitigate that threat and make USB devices safe for use, even in very sensitive applications and locations.

"Government computers and networks face a constant barrage of inventive attacks," said Frank Mayer, CTO of Tresys Technology. "Given the pace and diversity of these attacks, it is critical to make use of agile, open technologies to build and deploy a new generation of security solutions in real time."

The Tresys approach conclusively validates the advantages of integrating strong government off-the-shelf (GOTS) and commercial off-the-shelf (COTS) security on an open source platform. The USB 'cleansing' appliance was built on Red Hat's certified (EAL 4) RHEL 5 platform, combining GOTS software with Tresys' advanced, secure virtualization technology to effectively eliminate the dirty device threat. The formula of combining proven open source security technologies like SELinux with other customizable software allowed Tresys to address the security threat in real-time. The development life-cycle from initial requirements to working prototype was less than 10 days, and a field-ready solution was available within 90 days.

"Organizations need to quickly solve these kinds of mission critical security threats," said Tresys Technology's Director of Linux Security Practices, Karl MacMillan. "But it is difficult to do using typical proprietary software development approaches. Tresys disrupts the conventional frameworks that surround strictly proprietary solutions by combining the best of proprietary and open source technologies. We're proud to be a part of solving such a critical security challenge."
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo