April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

January 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

From access control to preventing data leakage: How agencies can secure their infrastructure from the inside out

Dmitry Kagansky

Faced with a new generation of network threats, the government now spends an equal amount of attention and resources on cybersecurity and physical security. With the Federal Identity, Credential, and Access Management (FICAM) roadmap passing the one-year mark, identity and access management is a top concern for federal CIOs.

Agencies are no longer only battling a rogue individual trying to “brute force” a firewall password or hack into a single perimeter system, but a long-term, sustained attack or penetration attempt by organized cyber criminals. Cyber attacks are much more sophisticated. They often look to exploit systems through a combination of methods, (including some that are non-computer-related), such as social engineering, telephone interception, etc. Because of this, organizations are looking to reduce their “attack surface” and one effective way of doing this is by securing communications, ensuring that those accessing the systems from the outside are known and trusted. 

One of the challenges in securing government IT systems is providing secure access for those outside the organization and authenticating non-native users who are accessing the IT system. In many cases, the entire supply chain is receiving more scrutiny, down to small suppliers. In other cases, there is concern that partner organizations may be weak links, with state and local governments, healthcare organizations and other groups being subjected to increased review and screening. 

To address these vulnerabilities, agencies are trying to develop a comprehensive view of the sources of security breaches, beyond password management and provisioning. To that end, when deploying the next-generation of cyber solutions, federal CIOs will be looking for technologies that offer a holistic approach to securing their government systems. 

Currently, there is a strong shift toward logical access controls (LACs) to secure the IT infrastructure from internal data leakages and outside breaches. The shift is not only driven by the FICAM roadmap, but also because most federal users have already been issued a Common Access Card (CAC) or Personal Identity Verification (PIV) card. Initially, those cards provided the ability to authenticate the user, but were used for PACs (Physical Access Control). The cards provide a set of encryption keys, which can be used not only to establish the user’s identity, but also to secure the data being sent to and from the user’s account. Thus, agencies are using the smart cards to ensure logical access control and provide secure communications after the authentication is performed. 

 

Recent Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and gates, access networks and services, and make cashless payments using phones and other mobile devices. ...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile forensics hardware and software, and certifies you to testify in court. Read this white paper to learn how to evaluate mobile forensics training...
PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video analytics leverage thermal cameras, radars and other perimeter sensors to detect, geo-locate, classify, and...
PureTech Systems is a technology leader in the use of geospatial video, focusing on perimeter security.  When combining geospatial capabilities with video analytics and PTZ camera control, managers of critical facilities can benefit by allowing the video management system to aid them in the process...