General Version 8 Jul 09

11
Granite Gate CorporationCorporate Capabilities Presentation Content Security For Secure Information Sharing & Application Integration Copyright ©2009 Granite Gate Corporation all rights reserved. July 8, 2009

description

GRANITE GATE ...what we are about

Transcript of General Version 8 Jul 09

Page 1: General Version 8 Jul 09

Granite Gate Corporation™

Corporate Capabilities PresentationContent Security

ForSecure Information Sharing

& Application Integration

Copyright ©2009 Granite Gate Corporation all rights reserved.

July 8, 2009

Page 2: General Version 8 Jul 09

Briefing Overview

Mission and Standards-Based Offering 1Protecting Content is the Future of Cybersecurity 2The Integrated Cyber Solution (ICS) & 3Application*SECURE* Consulting and Training 7Granite Gate Officers and Organization 8Conclusion 9

Corporate Capabilities Presentation

i

Granite Gate Corporation™

Page 3: General Version 8 Jul 09

Granite Gate Corporation™

Granite Gate’s mission is to provide innovative cyber security products and services that address content security.

1

MissionProvide innovative

cybersecurity capabilities that facilitate secure content sharing

Granite Gate Corporation™

Granite Gate Standards-based Content Security Offerings

Computer-based Content Security Training

Cyber Security Services

Integrated Cyber Secure (ICS)*SECURE* Content Applications

Page 4: General Version 8 Jul 09

Granite Gate Corporation™

The future of cybersecurity is to supplement network security with protection of the content.

2

The President’s Cyberspace Policy Review Report of May 25, 2009 - Cyberspace touches practically everything and everyone. It provides a platform for innovation and prosperity and the means to improve general welfare around the globe. But with the broad reach of a loose and lightly regulated digital infrastructure, great risks threaten nations, private enterprises, and individual rights. The government has a responsibility to address these strategic vulnerabilities

Lawrence H. Summers, senior White House economic adviser, is pushing for the National Economic Council to have a key role in cybersecurity …

It is a key government responsibility to help secure private-sector networks It discusses the need to provide incentives for greater data sharing and risk management There exists a plethora of security-in-a-box products on the market, but few address

content security in detail.

110th Congress, 2d Session, H, CON. RES September 24, 2008, 425TH, by Republican Rep. Michael Burgess and Democrat Rep. Chuck Gonzalez of Texas cites a litany of losses, exposures and shortfalls in protecting personal information, and notes that 36 states already have taken the lead in passing their own data security legislation.

Nevada law NRS 597.970 of Title 52 of the state code. It says that, 'A business in this State shall not transfer any personal information of a customer through an electronic …unless the business uses encryption to ensure the security of electronic transmission.

Page 5: General Version 8 Jul 09

Granite Gate Corporation™

Granite Gate provides the Integrated Cyber Secure (ICS) for secure information sharing and secure application integration.

A key product is Application*SECURE*

3

Dedicated Applications

Enterprise Application

Networks

Website

Desktop Applications

Vulnerable

Architecture

Secure

Architecture

Constructive Keys

Secure Rule Data

Privilege Mgt.

ID of Merit

SecureInformation

SharingApplication*SECURE*

Secure Rule Based

Applications

Secure Data at Rest & Datain Motion

Secure Key Management

Positive ID & Privilege

Management

Page 6: General Version 8 Jul 09

Granite Gate Corporation™

Network, Internet, or

Connection

Secure Server

(DOD rated B2/C2)

Workstation

(Windows, Mac, Linux)

Access Control Devise

(ID card, biometric, etc.)

Hardware Dependent Graphics

Hardware Dependent inputs

X-Protocol, X-Server, X-Display

Identity of Merit

Constructive Key

Management (CKM®TECSEC )

Privilege Management

Business Logic

Rule-Based Applications

Open Office *SECURE*

& Other

Applications

Encrypted Data

Encrypted Data

X-Toolkit, X-Intrinsics, X-Lib ,

X-Protocol

IQware DomainTecSec Domain

Integrated Environment Granite Gate Domain

Granite Gate’s Integrated Cyber Secure including Application*SECURE* is based on proven technologies

from TecSec and IQware

4

Page 7: General Version 8 Jul 09

Granite Gate Corporation™

Network, Internet, or Connection

Secure Server(DOD Rated B2/C2)

Workstation(Windows, Mac, Linux)

Access Control Devise(Card, biometric, etc.)

Authoring (key strokes)

Assignment of Privileges by Role by Author

Open Office*SECURE* & Other

Applications on Server

Encrypted Info on Secure Server

Encrypted Info on Secure Server

Requested Data Deciphered Based on Approved Role

Identity of Merit

Encrypted Data

Encrypted Data

Encrypted Data

Constructive Key Management

& Encryption

Rule-Based

Applications

Architecture

Process

Technology

Integrated Environment

Granite Gate’s Integrated Cyber Secure addresses serious vulnerabilities in government and commercial markets.

5

Page 8: General Version 8 Jul 09

Granite Gate Corporation™

TecSec Proprietary

Components

IQware Proprietary

Components

Patented US #7,322,028Rule Based App Component

“cuts the business logic from the workstation and hosts it on the secure server”

“the application is controlled by rules not hard coded logic”

Provides for application integration

38 US Patents

Secure access control card

CKM ®TECSEC

CKM ®TECSEC Enabled Smart

Card

Privilege management

Data encryption

Granite Gate Proprietary

ComponentsIntegration with Open Office

Open Office*SECURE* is the first Application*SECURE* Product

Integration of IQware and TecSec technologies

Other rule-based applications

6

TecSec and IQware are Granite Gate shareholders providing access to patented technologies.

Page 9: General Version 8 Jul 09

Granite Gate Corporation™

Computer-based Training

ICS

TecSec Technologies

IQware Technologies

Security Policy & Practices

Application*SECURE*

Role-Based Application

Cyber Security Services

ICS Implementation

Audit and Assessment

Management and Policy

Technical Implementation

Program Management

Role-Based Application Development

Application Integration

Granite Gate’s services and training capabilities are focused on the Integrated Cyber Secure product, TecSec and IQware Technologies.

7

Page 10: General Version 8 Jul 09

Granite Gate Corporation™

Granite Gate is lead by a team of highly qualified professionals.

8

John Keihm

Board of Directors

Chief ExecutiveEdward Merrill

DirectorFederal Sales

DirectorMarketing

DirectorPR and Programs

DirectorEngineering

DirectorConsulting

DirectorTraining

Executive Vice President Business Development

Bernadette Corjay

Executive Vice President Engineering & Operations

Tom Verbeck (BG Ret)

Pending

Bruce Bohn (BG Ret)

Board of Advisors - ChairmanWilliam Donahue (LtG Ret)

John Keihm

Pending

Page 11: General Version 8 Jul 09

Granite Gate Corporation™

In Conclusion, Granite Gate is focused on being the leader in secure cyber content products and services. Granite Gate’s offerings are

customer focused and represent best of breed component technologies.

Experience and committed leadership Key shareholders bring patented technologies to Granite Gate State of the art technologies: ICS and Application*SECURE* Compelling computer-based cyber security training content Products and services supplement network security and operate

within the existing infrastructure Standards based processes and products (ANSI, NIST, ITIL,

FIPS, HIPAA, CISSP, and CMMI Level 2 (pending) TS Facility Clearance (pending)

9

All elements are synergistic.Together, they create a compelling offer for

our customers, partners, and investors.