Military and defense sectors are working hard to lock down data storage

Security threats are increasing from the past few years and so Military and Defense sectors located all around the world are working hard to lock down data storage, even as it faces the challenge of making information readily accessible via a growing number of devices.

Defense and Military sectors have a set of unique challenges, said Greg Gardner, former deputy CIO of US Intelligence Community. Greg added that the defense and military sector must not only protect and secure data and fend off cyber attacks, but it also faces a challenge from the flexibility factor which is required to deal with data from the infrastructure core to the tactical edge. Gardner added that apart from these challenges, the Defense and Military sector also needs to stay with the data flows across the battlefield through mobile devices, across land, sea and air domains and in the cyberspace of data center and headquarters offices.

Taking the security factor into account the defense and military sectors also face a security challenges seen similar in corporate world, only on a much wider scale and with a need for stronger user access controls. This means, data must be secured, not only across levels of security and access, but also at rest and in motion- say through wireless technologies and all the stuff.

Dynamic Network Factory CEO and President Mo Tahmasebi addresses this requirement with secure multi-tenancy ritual- an architecture where a single instance of a software application serves multiple organizations, and makes defense and military sectors embrace it with a fondness, as it allows cost effectively virtualize storage in a highly secure manner.

Mr. Mo added that as IT Infrastructures are transforming, the challenge is to maintain the same level of standards, policy and compliance while adapting data to cloud and mobile infrastructures within classified and unclassified environments.

To make stored data both secure, yet still accessible to users holding different levels of security clearances, DOD uses several approaches. “There are high-assurance platforms (HAPs) that have multiple operating systems running inside of virtual machines on a single desktop computer, each with access to a different level of data,” explained Ty Lindteigen, chief technology officer of Cummings Engineering, a mobile encryption technology provider located in Chandler, Ariz.

Another approach is to use servers deployed inside a protected infrastructure featuring strong data-separation mechanisms, such as virtual machine technology and trusted guard functions between access levels, Lindteigen added.

Securely transporting multiple levels of data to the mobile edge will be another issue to deal with. But it can be accomplished via a virtual desktop technology that sends an interactive video stream of the desktop over a secure and authentic connection to a mobile user.

To make data both more secure and shareable between services, industry partners and other government agencies, the military is transitioning to the Joint Information Enterprise (JIE), an integrated structure that combines multiple existing networks. Upon its completion, JIE will enable every user to get onto an approved device, anywhere — at home, at work or on the move — and get the information they need in a secure, reliable fashion.

Whilst JIE build, Defense and Military sectors will be addressing data security in three separate ways-

  • First is by clustering storage devices, data availability will be 100% and systems never have to be shut down for technology upgrades or refreshes.
  • Meanwhile, storage operating systems are rapidly being virtualized. This means they can be run on a variety of different types of hardware, often with very small form factors. This enables data to be brought under control at the tactical edge- on ground or aerial vehicles.
  • Cyber security will be the third option to consider for defense and military sector until JIE comes into existence. This will help security analysts to carefully find and deter external threats and to identify and counter threats and user errors taking place internally.

To address the growing challenge of protecting data on commercial off-the-shelf (COTS) devices, the National Security Agency (NSA) has created the Commercial Solutions for Classified (CSFC) program.

“This process is intended to accelerate the certification timeline and create integration options of multiple vendors’ offerings into a single solution that is secure enough to protect classified data,” Lindteigen said. “This enables a new range of solutions to protect sensitive information, but it also raises the bar on commercial technology to meet the higher standard.”

As defense sector starts relying on commercial off-the-shelf (COTS) devices, it will expect vendors serving defense and military industries with data storage solutions to shoulder more of the data security burden by supplying strong protection technologies along with their devices.

DNF Defense is one such company which offers data storage solutions as per specified industry standards. The products which are apt to serve Defense and Military sectors are its IP SAN Appliances, Rugged NAS appliances, Rugged Server Appliances, Next Generation OS Rugged Server Appliances and NEBS Complaint Systems.

This company has been a supplier of rugged and extreme environment IT systems for nearly two decades. Its hardware and expertise have been used in threat detection & recognition systems, Deployed command & control systems for naval defense, information warfare technology, and advanced countermeasure systems.

Today’s defense industrial base is under pressure from state budget threats, diluted & commercialized innovation hubs, and complex political environments.

DNF is here to help by offering reliable, cost–effective and highly secure solutions.

Just call 510.265.1122 or click on DNF contacts page

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s