Over twenty-five years of delivering trusted information exchange solutions
To help you understand the different options for exchanging information securely across domains or networks here are a selection of the trusted solutions we have delivered for our clients.
Due to the sensitive nature of these projects we are not able to disclose the details of the organisations in question within the public domain. If you want to find out more about any of these case studies, please get in touch directly, and we may be able to provide further details.
All case studies at a glance
- An Information Based Security Model
- Communicating between Nations
- Connecting Multiple Networks Securely
- Developing an Email Guard for NATO
- Guarding Military Messages
- Keeping Sensitive Military Information Safe
- Importing Patches to a Secure Network
- Making Communications and Information Systems Flexible and Responsive
- Making your Data Tamper-Proof
- Network Monitoring
- Researching Secure Boot in Linux
- Secure Remote Video Control
- Securely Available Information
- Securing the Connected Car
- True Coalition Interoperability
- Upgrading an Existing System
Scroll down for summary descriptions of each case study.
The ways we create, store and share information are changing. New ways of keeping this information secure are needed if we want to continue working efficiently in a more open environment. This case study looks at how we took part in a research project that was awarded Best Research Poster at the Annual Symposium of the UK Information Assurance Advisory Council (IAAC). MORE DETAILS
When you are working closely with others, you need to have access to their information and want to give them access to yours – but not necessarily to all of it. You also need to be sure that providing access to legitimate users of your information is not opening your system to unwanted intrusion. This case study looks at how we developed an Information Exchange Gateway solution that allows nations to share information, but without sharing more than desired. MORE DETAILS
Seamlessly moving data between networks is a key requirement for many large organisations to meet their operational needs. A cross-domain gateway and technology integration specialist can help your organisation adopt more modern ways of working in a secure manner. This case study looks at how we were chosen by Lockheed Martin to create a solution for a large European-based programme. MORE DETAILS
NATO needed an email guard that met their specific requirements, with the ability to manage the variations in its members’ systems. Nexor had the expertise to create one: Nexor Sentinel. This case study looks at how we developed an email guard for NATO that could cope with the different message structures of the 28 individual member states. MORE DETAILS
No matter how good your policies and protocols are, human error can mean a message is accidentally sent somewhere (and seen by someone) inappropriate. When you need to ensure your policies are followed, you need an email guard. This case study looks at how we developed a solution which allowed the Navy to easily upgrade their current systems and expand it to meet their requirements. MORE DETAILS
In a military force, the management of information and the security of data transfer are both of paramount importance. Networks have to be kept updated and safe from external threat. A variety of information has to pass between internal networks of differing security classifications. This case study looks at how we used Data Diodes to provide secure network monitoring and system updates to allow the Military organisation to have better management of the different security classified networks. MORE DETAILS
Often you need to transfer patches or system updates from one network to another that have different levels of security. In order to maintain the confidentiality of the downstream server you need to be able to control the flow of data in a secure manner. This case study looks at how a Data Diode solution was used to import updates to a closed classified network at Impact Level 5 (IL5). MORE DETAILS
Making Communications and Information Systems Flexible and Responsive (The Defence Science and Technology Laboratory (Dstl))
The UK security operating environment is becoming increasingly complex with multiple, rapidly-forming coalitions of organisations with differing security classifications. Within this arena, there will always be the need for critical data sharing between key players in real time, with high assurance information transfer between security domains. This case study looks at the high assurance components we supplied for the PANDORA programme for the UK Ministry of Defence. MORE DETAILS
Sometimes keeping information safe means more than making sure you find it when you need it. You also need to be sure no-one has access to it – no tampering – especially if you may need it as evidence in the future. This case study looks at how we developed a solution that allowed files to transfer to a SECRET domain seamlessly without disrupting normal operation. MORE DETAILS
Monitoring activity in a network is critical to maintain the availability of systems and reduce the likelihood of an attack affecting business operations. Where an organisation has multiple networks, monitoring becomes more difficult and less manageable. This case study looks at how a solution was developed that allowed the networks to be connected for monitoring purposes by guaranteeing a one-way transfer mechanism. MORE DETAILS
When your trusted experts don’t have the answer, you need someone with the understanding to do the research and the expertise to develop and demonstrate the solution. This case study looks at how we were approached to research the components needed to configure secure boot on the Ubuntu Linux platform. MORE DETAILS
When you have remotely controlled cameras in operation you need to find a secure way of receiving information from the cameras and a secure way to control them without leaking information. This case study looks at how we developed a solution that allowed information to be securely sent and received from a secure control room to remote cameras. MORE DETAILS
When you are using a number of disconnected systems to manage critical infrastructure, none of which talk to each other by design, you need to get information out of these systems without the risk of introducing anything nasty. This case study looks at how we developed a solution that allowed information to be sent over two disconnected systems securely. MORE DETAILS
As the concept of the connected car gains momentum and the amount of software in a car rises sharply, the level of cyber risk increases too. When a cyber attack could be a potential matter of life and death then a comprehensive approach must be taken in order to reduce the cyber vulnerabilities. MORE DETAILS
There are times when you need to securely get access to information from another system without any idea of how that other system works. You may be working with another organisation, or may simply need to be able to access information from a secure system using a less secure one. This case study looks at how we partnered with two other organisations to develop a solution that allowed signalling information to be accessed from another system quickly and securely. MORE DETAILS
When you are using something that works well, you do not want to change it. Sometimes there is no choice – you need to address something as other factors change. In this case, the vulnerability was the available support for the operating system, meaning that every component of the system was affected. This case study looks at how we helped a European Navy upgrade its Military Message Handling System to a new platform. MORE DETAILS
TALK TO ONE OF OUR EXPERTS
RECENT BLOG POSTS
Another week, another threat to our Critical National Infrastructure as the “Industroyer” malware was announced last week.
At the recent CSP:2017 conference in York, I helped run a workshop to look at what the barriers to adopting cloud technologies were for sensitive information.
Our animated characters Alice and Bob take a look back at the CYBERUK 2017 event in Liverpool – the “UK Government’s biggest and most influential IA and Cyber Security event to date”.
Be the first to know about developments in secure information exchange