翻訳と辞書
Words near each other
・ Inzai
・ Inzai-Makinohara Station
・ Inzamam-ul-Haq
・ Inzar
・ Inzari
・ Inzauk Razawin
・ Inzel River
・ Inzele
・ Inzell
・ Inzenhof
・ Inzensky
・ Inzensky District
・ Inzer Bass Wyatt
・ InZer0
・ Inzerillo Mafia clan
InZero Systems
・ Inzersdorf
・ Inzersdorf (Vienna)
・ Inzersdorf im Kremstal
・ Inzersdorf-Getzersdorf
・ Inzhavinsky District
・ Inzhich-Chukun
・ InZhyr
・ Inziana River
・ Inzigkofen
・ Inzing
・ Inzinzac-Lochrist
・ Inzlingen
・ Inzlingen Castle
・ Inzombia


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

InZero Systems : ウィキペディア英語版
InZero Systems

InZero Systems (“InZero”) is the registered trade name of GBS Laboratories, LLC, a Herndon, Virginia (US), research and development firm dedicated to embedded computer security solutions. It has created innovative technologies to provide “hardware-enforced” security. Among its technologies, it has created a patented, DARPA-validated and FIPS-certified “(Gateway )”, a small device connected to a laptop or desktop that receives and retransmits incoming data to a laptop or desktop in video or converted data format, preventing malware from executing in the endpoint computer. It has created a “Security Key,” a USB device with its own CPU that creates, stores and transmits authentication data to avoid the need for storage in the connected computer, preventing access by malware.
The company’s latest technology is “WorkPlay Technology” for endpoint security. WorkPlay Technology creates Hardware-Separated Operating Systems (“HSOS”) with a single SoC, each OS having its own resources (kernel, RAM, flash, memory and drivers). Each OS is inaccessible to another OS, including to any malware introduced in another OS.
WorkPlay Technology Validation, Adaptation, Use and Compatibility. The Technology can be adapted to any mobile device or laptop having an (ARM )-based CPU with (TrustZone ) capabilities. The validity of the Technology has been confirmed by an independent evaluation made by (Cygnacom Solutions ), Inc. of McLean, Virginia, an authorized (NIST )-certifying laboratory. The Technology is embodied in various product models of mobile devices and laptops (including triple-OS model), and integrated into chipsets of different chipmakers.
(WorkPlay Technology is user-friendly ). Switching between OS’s takes usually between 1–3 seconds. On switching between OS’s, one OS is activated the other OS/OS’s placed in sleep mode; on activation, an OS resumes exactly where it previously left off. The Technology offers an “Open Platform,” without restriction on downloading and use of apps as any typical endpoint computer. WorkPlay Technology is compatible with existing device security and does not otherwise affect device use. It simply offers significantly enhanced security without compromising device features or usability.
(Firmware-Embedded MDM ). The Technology also provides, if desired, a firmware-embedded Mobile Device Management (MDM) solution, which can be embodied in any of the HSOS’s. The MDM allows an IT administrator to fully control remote access by the OS, and cannot be circumvented by user activity. It assures an enterprise that only authorized remote resources, such as the enterprise Virtual Private Network (VPN), are accessed.
Absolute Data Separation to Prevent Phishing-attack Access to Network Data. Phishing attacks continue to plague Government and large enterprise networks. Major data breach attributed to successful endpoint phishing attacks reported since 2014 include: (JPMorgan Chase ), (Target ), (Home Depot ), (Anthem ), the U.S Government (DHS, White House, and reportedly the OPM), and other governments (“Operation Pawn Storm/ APT28.) WorkPlay Technology provides Absolute Data Separation at the endpoint, unavailable from other methods to separate data (e.g., container, hypervisor) which continue to remain vulnerable to malware that can still gain access to all endpoint data, including access to connected networks.
VPNs and VDI’s: Using WorkPlay Technology to Provide Network Lockdown Security Without Affecting (User Experience ). By providing HSOS’s, WorkPlay Technology allows the enterprise to implement a secure VPN or VDI connection, and allow all other activity in a separate OS (or in two other OS’s.) There is no need to risk access to network data by malware from untrusted activity, yet no restrictions need to be imposed on use to do so.
Leadership. Privately owned, InZero Systems (InZero) is led by its Chairman and investor Louis Hughes. Mr. Hughes’ career includes extensive major corporate international management, including positions as President of GM International and Lockheed Martin. He also served as Chief of Staff for the U.S. State Department Afghanistan Reconstruction. Currently, he serves on the Board of Directors of ABB, Alcatel-Lucent and AkzoNobel. InZero’s Director of Partnering is Charles Brooks, who formerly served with the DHS and Xerox. The company relies on (Dr. Santosh Chokhani ), CEO of (Cygnacom Solutions, Inc )., Mclean, VA (USA), the third oldest authorized NIST-certifying laboratory, who validated the Technology, for government secrecy matters.
== References ==
How to Hack and Crash the Stock Market
(http://workplacetablet.com/2015/06/21/how-to-hack-and-crash-the-stock-market/)
Millions of Government Employees Have Personal Information Compromised in Stage One of Chinese Cyber Attack. Get Ready for Stage Two
(http://workplacetablet.com/2015/06/05/millions-of-government-employees-personal-information-compromised-in-stage-one-of-chinese-cyber-attack-get-ready-for-stage-two/)
Why is The Department of Veteran’s Affairs Experiencing a Massive Cyber Attack?
(http://workplacetablet.com/2015/05/18/why-is-the-department-of-veterans-affairs-experiencing-a-massive-cyber-attack/)
When Appliances Attack…and Sometimes Kill
(http://workplacetablet.com/2014/05/12/when-appliances-attackand-sometimes-kill)
How to Hook the Big Government Fish: Salmon Phishing Revisited
(http://workplacetablet.com/2014/04/01/how-to-hook-the-big-government-fish-salmon-phishing-revisited)
To Boldly Go Where Google Cannot Go: Why Businesses Should Know about the Deep Web
(http://workplacetablet.com/2014/04/07/to-boldly-go-where-google-cannot-go-why-businesses-should-know-about-the-deep-web)
The Deep Web Part II: Shady Deals in the Gray Market
(http://workplacetablet.com/2014/04/14/the-deep-web-part-ii-shady-deals-in-the-gray-market)

https://gsnmagazine.com/article/40142/inzero_introduces_tech_solution_byod_security_dile
http://www.foxbusiness.com/technology/2015/04/03/businesses-brace-for-cyber-attacks/

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「InZero Systems」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.