Cyber ReliantCyber ReliantCyber ReliantCyber Reliant
  • TECHNOLOGY
    • Our Technology
    • Certifications
  • COMPANY
    • Company Profile
    • Board Members
  • Case Scenario
  • Data Sheet

Cyber Reliant Provides Next Generation Data Protection on Rugged Devices

    Home resource Cyber Reliant Provides Next Generation Data Protection on Rugged Devices
    Trivalent Data Protect for Military

    Cyber Reliant Provides Next Generation Data Protection on Rugged Devices

    By Carla Baldwin | | Comments are Closed | 6 May, 2018 | 0

    Challenge

    Military branches rely on ruggedized devices for mission critical and covert communications in high-risk or hostile military operating environments. Although field operators may have limited or no network connectivity, they must still be able to securely store and access sensitive data, in runtime, on the device.

    Commercially available and traditional endpoint security is not sufficient. The data protection solution must meet rigorous NSA security requirements to minimize exposure of classified or sensitive data.

    Solution: Cyber Reliant Data Protection

    Cyber Reliant’s Data Protection is the only NSA Commercial Solutions for Classified (CSfC) certified data-at-rest (DaR) solution. It is developed exclusively with the warfighter in mind to securely handle Top Secret and below data.

    The Cyber Reliant Data Protection Process

    Cyber Reliant’s unique process of encryption, data shredding, secure storage, and authorized file reconstitution ensures that only authorized users can access the secured data.

    Cyber Reliant Data Protection Benefits

    • Security always stays with the data. Both at rest and runtime.
    • Authorized data usage. Only authorized users can access their secured data whenever needed.
    • Data Shredding. Data is transformed and rendered useless to unauthorized users.
    • Easy to deploy and seamless. Integrates seamlessly with other mission essential applications and with existing end-user workflows.
    • Supports Windows and Android
    • Does not require network connectivity. Developed to provide data security and policy enforcement for the warfighter across multiple operational boundaries, in both dismounted and disconnected operations.
    • Groundbreaking and operator-friendly. Patent-pending solution incorporates tactical operator feedback from live implementations to meet warfighter requirements.
    • Centrally Administered for service efficiencies.

    Case Scenario

    Data Compromise during Operation Red Wings1 In the Kunar Province of Afghanistan, Coalition Forces launched Operation Red Wings . Part of the mission of this highly sensitive operation was to disrupt hostile local anti-coalition activity.

    A four-man Navy SEAL reconnaissance and surveillance team was dispatched to gain intelligence on key personnel to assist with upcoming operations. The team relied on a mobile ruggedized device to collect and store critical data and to communicate back to their command.

    Shortly after insertion, the team engaged in a ferocious firefight, which ultimately took the lives of three brave SEALs. Unfortunately, the insurgents were able to capture the SEALs’ weapons and equipment. Their seized equipment included operational items such as weapons, night vision goggles and their ruggedized laptop. The laptop contained classified and sensitive information that the enemy could now leverage for hostile actions.

    The insurgents proceeded to remove the hard drive. Next they were able to successfully access the data from critical files that were on the laptop which contained the data. Without authorized access, they could then easily view, use and distribute the classified and sensitive government data that was on the seized laptop.

    Result:
    Next Generation Data Protection Must Always Stay with the Data Military data requires security that stays with data at all times and can only be accessed by authorized users. The added instrumentation of data security on the device makes a lost or stolen device worthless to the enemy.

    1Operation Red Wings became the basis of the New York Times best selling novel and full-motion picture hit: “Lone Survivor”

     

     

    DOWNLOAD CASE SCENARIO
    No tags.

    Recent

    • Cyber Reliant Data Defender Plugin
    • Cyber Reliant Supports EU General Data Protection Regulation (GDPR)
    • Cyber Reliant Provides Next Generation Data Protection on Rugged Devices
    • Cyber Reliant Mobile Data Defender SDK
    • Cyber Reliant Secure Apps

    Browse Resources

    • Case Scenario
    • Data Sheet
    Download the CYBER RELIANT EDGEGUARD Datasheet

    Have Questions

    Get in touch.

    180 Admiral Cochrane Drive, STE 310
    Annapolis, Maryland 21401
    CONTACT@CYBERRELIANT.COM

    Cyber Reliant Icon

    • Company
    • Careers
    • Privacy Policy
    • Terms of Use
    © Cyber Reliant Corp. All Rights Reserved
    • Home
    • Technology
      • Certifications
    • Company
      • Board Members
    • Case Scenario
    • Data Sheet
    Cyber Reliant