CYBER ISOLATION, DEFENSE, AND MANAGEMENT OF A INTER-/INTRA- ENTERPRISE NETWORK
First Claim
1. A method, comprising:
- enabling each of a plurality of individual contractors to obtain cyber protections, the cyber protections including at least one of cross-domain security, trusted communication, secure communications, DoD weapons-grade cyber protection, DoD approved cyber protection, application and network management, smartphone defense, smartphone protection, and active, 24/7/365 NOG-level management.
1 Assignment
0 Petitions
Accused Products
Abstract
Methodologies, tools and processes for the cyber isolation, defense, and management of an inter-/intra-enterprise network utilizing NSA-approved Type-1 encryptors to first completely isolate all HardNet fixed and mobile participants from the logical internet. Secondly, to enable inter-corporation traffic exchange while maintaining the established security barrier. Next, to create a network demarcation point through which all traffic shall enter or exit HardNet, and through which all traffic shall be inspected with DoD grade cyber security and information assurance (IA) capabilities. Effective net end result is a weapons-grade cyber security shield and cyber management capability for the business, educational, non-profit, governmental and all other enterprises.
8 Citations
7 Claims
-
1. A method, comprising:
enabling each of a plurality of individual contractors to obtain cyber protections, the cyber protections including at least one of cross-domain security, trusted communication, secure communications, DoD weapons-grade cyber protection, DoD approved cyber protection, application and network management, smartphone defense, smartphone protection, and active, 24/7/365 NOG-level management. - View Dependent Claims (2, 3, 4, 5, 6, 7)
Specification