Corporate Overview - PowerPoint PPT Presentation

About This Presentation
Title:

Corporate Overview

Description:

Dynamic Encryption Inc, NXCONN Wireless LLC, and Horizon Wi-Fi.com LLC ... Bill Tabor Director & CTO Dynamic Encryption Tunnel Inc ... – PowerPoint PPT presentation

Number of Views:54
Avg rating:3.0/5.0
Slides: 39
Provided by: irenet
Category:

less

Transcript and Presenter's Notes

Title: Corporate Overview


1
Corporate Overview
PROTEXX Inc. - A Joint Venture of Dynamic
Encryption Inc, NXCONN Wireless LLC, and Horizon
Wi-Fi.com LLC Our Network Operations Center NOC
is located in Plainview New York with additional
offices in Florida and Connecticut For
information Call 561 306 0605
2
The Management Team
Peter Letizia Director Founder Dynamic
Encryption Tunnel Inc Bill Tabor Director CTO
Dynamic Encryption Tunnel Inc Don Bonafazio
Director President NXCONN Wireless LLC Mark L
Myers Director Partner Horizon Wi-Fi Gene
Feher Director Partner Horizon Wi-Fi Ken
McClenithan Director Partner Horizon Wi-Fi
3
Problem Statement
  • Dramatic Issues Facing our World Successful and
    Costly attacks upon life, property and
    information!!
  • These attacks include
  • Terrorism
  • Theft of data
  • Identity theft
  • Denial of service
  • Transaction redirection
  • Misuse of data
  • Fraud
  • Theft of service

4
These issues resulted from
  • Absence of positive, persistent identification
    of an
  • individual due to
  • Weak, poorly designed or absence of
    authentication
  • (identification) systems
  • Inadequate local operating system/distributed
    server
  • protection of user names, key files and
    password files
  • Inadequate application and data security due to
  • Inadequate authorization controls (local and
    remote)
  • protecting corporate assets
  • Local information sitting unprotected in text
    files and
  • database records (tables)

5
Our Vision
  • Enable our customers to be absolutely sure of
    three things
  • To whom they grant access (positive
    identification of the
  • requestor)
  • The services permitted once access is granted
    (exactly those
  • services required by the requestor to
    complete a task no
  • more, no less)
  • Application, infrastructure and data security

6
Our Approach
  • VMS For Outward Facing Systems
  • VMS with DCE For Integration Connectivity
  • Apache Pass-through Sign-in to DCE
  • DCE Single Sign On
  • DCE GUI Administration Terminal (Under
    Development)

7
Single Site Secure Access
8
Multiple Site Security
9
Secure System Provider
  • Biometric Secure Identification
  • Secure Instant Messaging and File Transfer
  • Public Key Infrastructure (PKI) Services
  • Custom Software Services
  • Consulting Services
  • Educational Services

10
Partner with Compaq
  • CSA Partner
  • Global Systems Reseller (PCs and Alpha)
  • Value Added Reseller
  • Technology Partner
  • Consulting Partner
  • OpenVMS Systems Integrator

11
Following Markets Focus
  • Medical/Pharmaceutical/Healthcare
  • Telecommunications Service Providers
  • Government (DOD)
  • Financial
  • Security
  • Legal

12
Enterprise Security Perspective
  • Secure the Computing and Facilities Perimeters
  • Secure Information at Rest
  • Secure Information in Transit
  • Enable Digital Rights Management of Information

13
Value Add for Partners
  • Senior Staff Member Expertise
  • Secure Software Architecture, Design and
    Development
  • Network Configuration and Management
  • Biometric Engineering
  • Systems Integration and Consulting
  • SyntheSys Products Built on or Ported to Compaq
    Platforms
  • Exceptionally Strong OpenVMS Base
  • Exceptionally Strong Compaq Hardware Base
  • One of Twelve OpenVMS System Integrators
  • CSA Partner

14
PROTEXX Secure Products
  • Biometric Fingerprint Authentication Card
  • JabCast Secure Realtime Communications (SRC)
    Suite
  • JabCast Low Bandwidth Monitoring
  • PKI Trust Centers (idTRUST)

Generate a Public/Private Key Pair
15
Biometric Secure ID
Protexx Biometric Card Features and
Characteristics
  • Credit card sized Smart Card with on-card
    crypto processor
  • Maintains protected storage for public/private
    keys, Digital
  • Certificates and Digital Signatures to be used
    during
  • authentication process
  • Executes Cryptographic Operations on Card
    (verifies fingerprint)
  • works in conjunction with Card
  • Operating System (COS)

16
Biometric Secure ID Card
Biometric On-Card Components
32-bit Microprocessor (Microcontroller)
ISO 7816 Family of Smart/Crypto Card Standards,
i.e., power, Clock I/O Bus
RAM 2K Bytes
Crypto Accelerator (Processor)
ROM 32K Bytes
EEPROM 64K Bytes
17
Biometric Secure ID Card
The Biometric Card Process
  • User enrolls in the Biometric process
  • Card maintains encrypted hash copy of users
    fingerprint in
  • EEPROM
  • To authenticate user places the correct finger
    on the optical reader
  • The fingerprint is scanned, hashed and encrypted
  • The crypto processor compares the fingerprint
    sample to the stored value
  • Card will return success or failure status to
    system

18
Biometric Secure ID Card
Immediate Uses for Biometric Smart Card
Authenticate and Prove Absolute Identity of Card
Holder
Potential Future Biometric Smart Card Uses
  • Passports (via Distributed Information
    Databases)
  • Credit Card Verification Approval
  • Storage of Loyalty Points (frequent flyer, etc.)
  • Pharmaceutical/Medical History
  • Credit or Debit Bankcard
  • Drivers License

19
Biometric Secure Identity Card
Example
Control signal Open door/authorization failure
Secured testing room door
Authentication information
door controller
authorization database
20
Biometric Secure Identity Card
Card Customization Capabilities
  • Multiple processors (4, 6, 8, etc.)
  • Mix and match 8, 16 and 32 bit processors for
  • focused tasks
  • Memory (Inter-processor and processor specific)
  • Multiple custom data structure (application and
  • processor)
  • Potentially contact-based and contact-less cards

21
JabCast SRC Product Features
  • Secure realtime communications protocol IP
    based
  • Secure realtime instant message delivery
  • Secure realtime file delivery
  • Senders address hidden from view path hiding
  • Presence management (follow the user approach)
  • Architected on XML/Open Source Jabber protocol
  • Integration of JabCast protocol into application
  • infrastructures

22
JabCast SRC Product Features
  • Multi-platform support Compaq servers
  • ProLiant
  • OpenVMS
  • TRU64 UNIX
  • Full range of client devices
  • Desktops ? Laptops
  • Hand Helds
  • Cell Phones
  • Installation and technical support services
  • Training and documentation services

23
JabCast SRC Implementation Example
24
Protexx PKI Product Suite
  • idTRUST (PKI) suite of applications required
    to securely
  • manage business processes
  • idSEND verifies receipt and successful
    delivery of
  • messages
  • idSIGN XML based secure application ensuring
  • immutability of e-documents and forms through
    use of
  • digital signatures
  • idDOC work flow management tool enabling
    creation,
  • access and tracking of e-documents

25
Protexx PKI Product Suite
  • idSAFE platform to ensure transport and
    management
  • of data in transit (VPN)
  • idVOTE a product enabling Internet voting via
    secure
  • voter authentication
  • idSEAL smart encryption tool enabling the user
    to
  • encrypt and decrypt individual files

26
Why Use Cryptography?
  • Cryptography can be applied to the following
    information categories
  • Information at Rest
  • Information in Transit
  • Cryptography is used to enable information
  • Privacy information cannot be read
  • Integrity information cannot be modified
  • Authentication information proof of ownership
  • Non-repudiation cannot deny involvement in
  • transaction

27
Asymmetric Key Cryptography
Different keys (secrets) are used for both the
encryption and decryption processes
Asymmetric key cryptography is characterized by
the use of two independent but mathematically
related keys
28
Public/Private Key Generation
Local Application Browser Remote Server
29
idTRUST PKI Infrastructure
Why is a PKI Infrastructure Necessary?
  • Optional key generation
  • Validate initial identities
  • Issuance, renewal and termination of
    certificates
  • Certificate validation
  • Distribution of certificates
  • Secure archival and key recovery
  • Generation of signatures and timestamps
  • Establish and manage trust relationships

30
idTRUST PKI Infrastructure
What has blocked PKI from global use?
  • Cost
  • PKI Integration with vertical application base
  • CA portability and interoperability

31
Trust Center Hierarchy
32
idTRUST Customer Options
  • On-Site Purchase
  • On-Site Lease
  • Service Agreement (Application Service Provider
  • Model)

33
Protexx Professional Services
  • Biometric Smart Card, Trust Center and PKI
    Integration
  • Secure Application Design, Development and
    Implementation
  • Enterprise Security Services
  • Custom Software and Consulting Services
  • Technical Support (Hotline and On-site)
  • Project Management
  • Training and Education

34
Security Services
  • Security Inventory Service
  • Security Policies and Procedures Guide
    Development
  • Security Audit/Assessment Service
  • Security Vulnerability Service
  • Security Implementation Service
  • Disaster Recovery Services

35
Security Audit Service
Task
Review existing corporate security practices
pertaining to
  • Day-to-day enterprise computing
  • Perimeter security (authentication, identity and
    authorization)
  • Information at rest
  • Information in transit (distributed computing,
    file transfer, etc.)
  • Business applications software and email usage
  • mobile computing
  • Management security directives
  • Corporate security policy and procedure
    guidelines
  • Compliance with appropriate legislation

36
Security Audit Service
Deliverables
Deliver documents declaring existing security
preparedness
  • An inventory document defining the current sate
    of
  • enterprise security methods, techniques,
    corporate
  • compliance and usage
  • A document defining next steps in the overall
    process of
  • defining a current corporate security strategy
    and
  • implementation plan
  • Requirements Analysis document
  • Security Architecture document
  • Security Products and Implementation plan

37
Educational Services Tech Training
  • Modern Security Practices
  • Authentication/Perimeter Security
  • Trust Center and PKI Integration
  • Secure Distributed Architectures
  • Secure Middleware Integration
  • CORBA
  • DCE
  • Programming Languages
  • C
  • Java/JavaScript
  • Perl

38
Protexx Inc.
Concerned ! Dedicated ! Confident !
Thank You!
www.ProtexxInc.com 203 559 9860
Write a Comment
User Comments (0)
About PowerShow.com