CASE STUDIES

Over twenty-five years of delivering trusted information exchange solutions

Case study iconTo help you understand the different options for exchanging information securely across domains or networks here are a selection of the trusted solutions we have delivered for our clients.

Due to the sensitive nature of these projects we are not able to disclose the details of the organisations in question within the public domain. If you want to find out more about any of these case studies, please get in touch directly, and we may be able to provide further details.

Explore our case studies

 

An Information Based Sharing Model (CSIIS)

The ways we create, store and share information are changing. New ways of keeping this information secure are needed if we want to continue working efficiently in a more open environment. This case study looks at how we took part in a research project that was awarded Best Research Poster at the Annual Symposium of the UK Information Assurance Advisory Council (IAAC). MORE DETAILS

DOWNLOAD PDF

 

Communicating Between Nations (A Multi-Nation Defence Organisation)

When you are working closely with others, you need to have access to their information and want to give them access to yours – but not necessarily to all of it. You also need to be sure that providing access to legitimate users of your information is not opening your system to unwanted intrusion. This case study looks at how we developed an Information Exchange Gateway solution that allows nations to share information, but without sharing more than desired. MORE DETAILS

DOWNLOAD PDF

 

Connecting Multiple Networks Securely (European-based Programme)

Seamlessly moving data between networks is a key requirement for many large organisations to meet their operational needs. A cross-domain gateway and technology integration specialist can help your organisation adopt more modern ways of working in a secure manner. This case study looks at how we were chosen by Leidos (formerly part of Lockheed Martin) to create a solution for a large European-based programme. MORE DETAILS

DOWNLOAD PDF

 

Developing an Email Guard for NATO

NATO needed an email guard that met their specific requirements, with the ability to manage the variations in its members’ systems. Nexor had the expertise to create one: Nexor Sentinel. This case study looks at how we developed an email guard for NATO that could cope with the different message structures of the 28 individual member states. MORE DETAILS

DOWNLOAD PDF

 

Guarding Military Messages (A European Navy)

No matter how good your policies and protocols are, human error can mean a message is accidentally sent somewhere (and seen by someone) inappropriate. When you need to ensure your policies are followed, you need an email guard. This case study looks at how we developed a solution which allowed the Navy to easily upgrade their current systems and expand it to meet their requirements. MORE DETAILS

DOWNLOAD PDF

 

Importing Patches to a Secure Network (A UK Government Agency)

Often you need to transfer patches or system updates from one network to another that have different levels of security. In order to maintain the confidentiality of the downstream server you need to be able to control the flow of data in a secure manner. This case study looks at how a Data Diode solution was used to import updates to a closed classified network at Impact Level 5 (IL5). MORE DETAILS

DOWNLOAD PDF

 

Keeping Sensitive Military Information Safe (A Military Organisation)

In a military force, the management of information and the security of data transfer are both of paramount importance. Networks have to be kept updated and safe from external threat. A variety of information has to pass between internal networks of differing security classifications. This case study looks at how we used Data Diodes to provide secure network monitoring and system updates to allow the Military organisation to have better management of the different security classified networks. MORE DETAILS

DOWNLOAD PDF

 

Making Communications and Information Systems Flexible and Responsive (The Defence Science and Technology Laboratory (Dstl))

The UK security operating environment is becoming increasingly complex with multiple, rapidly-forming coalitions of organisations with differing security classifications. Within this arena, there will always be the need for critical data sharing between key players in real time, with high assurance information transfer between security domains. This case study looks at the high assurance components we supplied for the PANDORA programme for the UK Ministry of Defence. MORE DETAILS

DOWNLOAD PDF

 

Making your Data Tamper-Proof (A UK Government Agency)

Sometimes keeping information safe means more than making sure you find it when you need it. You also need to be sure no-one has access to it – no tampering – especially if you may need it as evidence in the future. This case study looks at how we developed a solution that allowed files to transfer to a SECRET domain seamlessly without disrupting normal operation. MORE DETAILS

DOWNLOAD PDF

 

Network Monitoring (A UK Government Agency)

Monitoring activity in a network is critical to maintain the availability of systems and reduce the likelihood of an attack affecting business operations. Where an organisation has multiple networks, monitoring becomes more difficult and less manageable. This case study looks at how a solution was developed that allowed the networks to be connected for monitoring purposes by guaranteeing a one-way transfer mechanism. MORE DETAILS

DOWNLOAD PDF

 

Researching Secure Boot in Linux (A European Organisation)

When your trusted experts don’t have the answer, you need someone with the understanding to do the research and the expertise to develop and demonstrate the solution. This case study looks at how we were approached to research the components needed to configure secure boot on the Ubuntu Linux platform. MORE DETAILS

DOWNLOAD PDF

 

Secure and Efficient Manual Release of Files across Networks (A European Multi-partner Organisation)

Organisations can transfer files between networks using USB sticks, but this is an insecure and inefficient practice. Using data diode and data guard technology can significantly improve the speed, control and security for organisations in sharing files across its different network domains. This case study looks at how we developed a solution using Nexor Data Diodes and Nexor Guardian to allow manual release of files across different classified networks. MORE DETAILS

DOWNLOAD PDF

 

Secure Remote Video Control (A European Defence Ministry)

When you have remotely controlled cameras in operation you need to find a secure way of receiving information from the cameras and a secure way to control them without leaking information. This case study looks at how we developed a solution that allowed information to be securely sent and received from a secure control room to remote cameras. MORE DETAILS

DOWNLOAD PDF

 

Securely Available Information (A European Rail Network)

When you are using a number of disconnected systems to manage critical infrastructure, none of which talk to each other by design, you need to get information out of these systems without the risk of introducing anything nasty. This case study looks at how we developed a solution that allowed information to be sent over two disconnected systems securely. MORE DETAILS

DOWNLOAD PDF

 

Securing the Connected Car (A Leading Global Automotive Supplier)

As the concept of the connected car gains momentum and the amount of software in a car rises sharply, the level of cyber risk increases too. When a cyber attack could be a potential matter of life and death then a comprehensive approach must be taken in order to reduce the cyber vulnerabilities. MORE DETAILS

DOWNLOAD PDF

 

True Coalition Interoperability (UK Ministry of Defence)

There are times when you need to securely get access to information from another system without any idea of how that other system works. You may be working with another organisation, or may simply need to be able to access information from a secure system using a less secure one. This case study looks at how we partnered with two other organisations to develop a solution that allowed signalling information to be accessed from another system quickly and securely. MORE DETAILS

DOWNLOAD PDF

 

Upgrading an Existing System (A European Navy)

When you are using something that works well, you do not want to change it. Sometimes there is no choice – you need to address something as other factors change. In this case, the vulnerability was the available support for the operating system, meaning that every component of the system was affected. This case study looks at how we helped a European Navy upgrade its Military Message Handling System to a new platform. MORE DETAILS

DOWNLOAD PDF

TALK TO ONE OF OUR EXPERTS

Talk To One Of Our Experts
Sending

We value your privacy

RECENT BLOG POSTS

File transfers for a data guard: automate or manually review?

Whilst the global online environment is seeing an increase in cyber threats, companies and government bodies still need to share information, including sensitive intelligence documents, in a secure way within their organisation.

PANDORA: the single cable to desktop challenge

We recently delivered a solution featuring high assurance guards and a cross-domain desktop capability to help the UK Ministry of Defence reduce the set-up time, infrastructure costs and footprint of its deployments.

Be the first to know about developments in secure information exchange

Share This