Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • Networking
    • Storage

    IT Giants Collaborate on DOD Security Project

    By
    Chris Preimesberger
    -
    July 10, 2007
    Share
    Facebook
    Twitter
    Linkedin

      Three IT giants — Cisco Systems, EMC and Microsoft — have formed an alliance to create a new common IT architecture for sharing and protecting sensitive government or business information, representatives from all three companies told eWEEK July 9.

      The alliance was born of a shared project with the Department of Defense, during which the companies designed and engineered the so-called SISA (Secure Information Sharing Architecture), a new security-enhanced, end-to-end information-sharing design framework. The nature of the DOD project was not revealed.

      SISA combines applications (Microsoft SharePoint, Exchange, identity management and others), storage infrastructure from EMC, and networking and data protection products from Cisco Systems to move and protect the flow of sensitive information in the DOD project.

      This SISA blueprint will trickle down into other government projects and eventually into enterprise IT, a SISA spokesperson said.

      Historically, government information protection has been enforced in individual systems, creating islands of protected data. Some government agencies have problems providing role-based access to sensitive information within their own organizations, and the problems become much more difficult when sharing sensitive content across different agencies, the spokesperson said.

      “As we got into the project, and some time had gone by, we all realized that we were working separately on something that we really needed to do together,” Mas Nawaz, federal manager at Cisco Systems told eWEEK.

      “This project was definitely bigger than just any one company. We realized that we needed a common framework to make this work, and we all had the different expertise to do it.”

      They (the DOD) knew what they needed, but they hadnt written the requirements around it, said Francie Kress, partner manager at EMC.

      “We had to do a proof of concept in a lab, then walk though scenarios, etc. Even though they needed to do it, they hadnt really thought through a lot of that,” Kress said.

      The SISA architecture offers a consistent method for moving data across old organizational and jurisdictional IT infrastructure boundaries, so that sensitive human resources, financial and other critical information can have increased protection and be shared among authorized communities more effectively than if they were not to deploy SISA.

      Data is secured even before its created, Nawaz said. “The security starts as the user comes onto the network; SISA makes sure the authentications are correct for accessing portions of the network from the beginning,” he said.

      “The information that would be used in this system is for critical decisions; it will be medical records, life-critical information, or acquisition information, for example,” Eric Rosenkranz, industry manager for e-government at Microsoft, told eWEEK.

      /zimages/6/28571.gifTo read about what goes on inside the mind of a hacker, click here.

      “It might be used, say, in the bidding for an aircraft-building project, or other very sensitive government and business undertaking that needs to be highly protected yet shared among those who need to see it.”

      Rosenkranz also said that SISA also will enable data downloaded onto USB drives by employees to be controlled. “This data can be protected by putting a SISA policy enforcement in place that would stop the user from putting data onto a USB drive,” he said.

      By utilizing the SISA blueprint, government agencies can more easily set up security-enhanced, virtual networks for different authorized users and communities to access sensitive files stored in different information protection systems, the spokesperson said.

      For example, in the future SISA could be deployed to allow public health officials to monitor confidential data on pandemics found in different government agencies and private sector databases, and coordinate necessary response efforts with both government agencies and critical private sector partners, the spokesperson said.

      While government is attempting to break down the barriers between organizations to enable information sharing, it is also struggling with numerous high-profile data loss incidents, said Steve Cooper, former chief information officer for the Department of Homeland Security.

      “Breaking down barriers between government and partner organizations will require better confidence in the ability to keep information in the hands of only the appropriate users,” Cooper said.

      /zimages/6/28571.gifCheck out eWEEK.coms for the latest news, reviews and analysis on enterprise and small business storage hardware and software.

      Chris Preimesberger
      https://www.eweek.com/author/cpreimesberger/
      Chris J. Preimesberger is Editor Emeritus of eWEEK. In his 16 years and more than 5,000 articles at eWEEK, he distinguished himself in reporting and analysis of the business use of new-gen IT in a variety of sectors, including cloud computing, data center systems, storage, edge systems, security and others. In February 2017 and September 2018, Chris was named among the 250 most influential business journalists in the world (https://richtopia.com/inspirational-people/top-250-business-journalists/) by Richtopia, a UK research firm that used analytics to compile the ranking. He has won several national and regional awards for his work, including a 2011 Folio Award for a profile (https://www.eweek.com/cloud/marc-benioff-trend-seer-and-business-socialist/) of Salesforce founder/CEO Marc Benioff--the only time he has entered the competition. Previously, Chris was a founding editor of both IT Manager's Journal and DevX.com and was managing editor of Software Development magazine. He has been a stringer for the Associated Press since 1983 and resides in Silicon Valley.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×