General Version 8 Jul 09
description
Transcript of General Version 8 Jul 09
Granite Gate Corporation™
Corporate Capabilities PresentationContent Security
ForSecure Information Sharing
& Application Integration
Copyright ©2009 Granite Gate Corporation all rights reserved.
July 8, 2009
Briefing Overview
Mission and Standards-Based Offering 1Protecting Content is the Future of Cybersecurity 2The Integrated Cyber Solution (ICS) & 3Application*SECURE* Consulting and Training 7Granite Gate Officers and Organization 8Conclusion 9
Corporate Capabilities Presentation
i
Granite Gate Corporation™
Granite Gate Corporation™
Granite Gate’s mission is to provide innovative cyber security products and services that address content security.
1
MissionProvide innovative
cybersecurity capabilities that facilitate secure content sharing
Granite Gate Corporation™
Granite Gate Standards-based Content Security Offerings
Computer-based Content Security Training
Cyber Security Services
Integrated Cyber Secure (ICS)*SECURE* Content Applications
Granite Gate Corporation™
The future of cybersecurity is to supplement network security with protection of the content.
2
The President’s Cyberspace Policy Review Report of May 25, 2009 - Cyberspace touches practically everything and everyone. It provides a platform for innovation and prosperity and the means to improve general welfare around the globe. But with the broad reach of a loose and lightly regulated digital infrastructure, great risks threaten nations, private enterprises, and individual rights. The government has a responsibility to address these strategic vulnerabilities
Lawrence H. Summers, senior White House economic adviser, is pushing for the National Economic Council to have a key role in cybersecurity …
It is a key government responsibility to help secure private-sector networks It discusses the need to provide incentives for greater data sharing and risk management There exists a plethora of security-in-a-box products on the market, but few address
content security in detail.
110th Congress, 2d Session, H, CON. RES September 24, 2008, 425TH, by Republican Rep. Michael Burgess and Democrat Rep. Chuck Gonzalez of Texas cites a litany of losses, exposures and shortfalls in protecting personal information, and notes that 36 states already have taken the lead in passing their own data security legislation.
Nevada law NRS 597.970 of Title 52 of the state code. It says that, 'A business in this State shall not transfer any personal information of a customer through an electronic …unless the business uses encryption to ensure the security of electronic transmission.
Granite Gate Corporation™
Granite Gate provides the Integrated Cyber Secure (ICS) for secure information sharing and secure application integration.
A key product is Application*SECURE*
3
Dedicated Applications
Enterprise Application
Networks
Website
Desktop Applications
Vulnerable
Architecture
Secure
Architecture
Constructive Keys
Secure Rule Data
Privilege Mgt.
ID of Merit
SecureInformation
SharingApplication*SECURE*
Secure Rule Based
Applications
Secure Data at Rest & Datain Motion
Secure Key Management
Positive ID & Privilege
Management
Granite Gate Corporation™
Network, Internet, or
Connection
Secure Server
(DOD rated B2/C2)
Workstation
(Windows, Mac, Linux)
Access Control Devise
(ID card, biometric, etc.)
Hardware Dependent Graphics
Hardware Dependent inputs
X-Protocol, X-Server, X-Display
Identity of Merit
Constructive Key
Management (CKM®TECSEC )
Privilege Management
Business Logic
Rule-Based Applications
Open Office *SECURE*
& Other
Applications
Encrypted Data
Encrypted Data
X-Toolkit, X-Intrinsics, X-Lib ,
X-Protocol
IQware DomainTecSec Domain
Integrated Environment Granite Gate Domain
Granite Gate’s Integrated Cyber Secure including Application*SECURE* is based on proven technologies
from TecSec and IQware
4
Granite Gate Corporation™
Network, Internet, or Connection
Secure Server(DOD Rated B2/C2)
Workstation(Windows, Mac, Linux)
Access Control Devise(Card, biometric, etc.)
Authoring (key strokes)
Assignment of Privileges by Role by Author
Open Office*SECURE* & Other
Applications on Server
Encrypted Info on Secure Server
Encrypted Info on Secure Server
Requested Data Deciphered Based on Approved Role
Identity of Merit
Encrypted Data
Encrypted Data
Encrypted Data
Constructive Key Management
& Encryption
Rule-Based
Applications
Architecture
Process
Technology
Integrated Environment
Granite Gate’s Integrated Cyber Secure addresses serious vulnerabilities in government and commercial markets.
5
Granite Gate Corporation™
TecSec Proprietary
Components
IQware Proprietary
Components
Patented US #7,322,028Rule Based App Component
“cuts the business logic from the workstation and hosts it on the secure server”
“the application is controlled by rules not hard coded logic”
Provides for application integration
38 US Patents
Secure access control card
CKM ®TECSEC
CKM ®TECSEC Enabled Smart
Card
Privilege management
Data encryption
Granite Gate Proprietary
ComponentsIntegration with Open Office
Open Office*SECURE* is the first Application*SECURE* Product
Integration of IQware and TecSec technologies
Other rule-based applications
6
TecSec and IQware are Granite Gate shareholders providing access to patented technologies.
Granite Gate Corporation™
Computer-based Training
ICS
TecSec Technologies
IQware Technologies
Security Policy & Practices
Application*SECURE*
Role-Based Application
Cyber Security Services
ICS Implementation
Audit and Assessment
Management and Policy
Technical Implementation
Program Management
Role-Based Application Development
Application Integration
Granite Gate’s services and training capabilities are focused on the Integrated Cyber Secure product, TecSec and IQware Technologies.
7
Granite Gate Corporation™
Granite Gate is lead by a team of highly qualified professionals.
8
John Keihm
Board of Directors
Chief ExecutiveEdward Merrill
DirectorFederal Sales
DirectorMarketing
DirectorPR and Programs
DirectorEngineering
DirectorConsulting
DirectorTraining
Executive Vice President Business Development
Bernadette Corjay
Executive Vice President Engineering & Operations
Tom Verbeck (BG Ret)
Pending
Bruce Bohn (BG Ret)
Board of Advisors - ChairmanWilliam Donahue (LtG Ret)
John Keihm
Pending
Granite Gate Corporation™
In Conclusion, Granite Gate is focused on being the leader in secure cyber content products and services. Granite Gate’s offerings are
customer focused and represent best of breed component technologies.
Experience and committed leadership Key shareholders bring patented technologies to Granite Gate State of the art technologies: ICS and Application*SECURE* Compelling computer-based cyber security training content Products and services supplement network security and operate
within the existing infrastructure Standards based processes and products (ANSI, NIST, ITIL,
FIPS, HIPAA, CISSP, and CMMI Level 2 (pending) TS Facility Clearance (pending)
9
All elements are synergistic.Together, they create a compelling offer for
our customers, partners, and investors.