Deploying Information Exchange Gateway solutions
With the current interest in Information Exchange Gateways (IEGs), I wanted to update you on the work that we have been doing with the European Defence Agency over the last year or so.
In the previous two posts in this IEG mini-series, I first looked at the different scenarios that facilitate the need for an IEG; secondly we considered a reference architecture for building a solution. In this post I will take you through the Nexor approach to developing solutions.
As you may recall, the IEG architecture can be broken into four logical components:
- Node Protection;
- Information Exchange;
- Information Protection;
- Information Management.
The Nexor IEG Solution Architecture below shows how Nexor can deliver a fully functional IEG with a combination of our own technology, from our SIXA portfolio, and third-party components as required. (If you click on the diagram then you will be able to read it properly!)
The Nexor components in the darker purple lozenges, such as Sentinel or Guardian, are implemented in some of the world’s largest military organisations across a variety of land, air and maritime environments.
But it’s not just about the architecture components described in this paper, our approach at Nexor is about being able to provide a comprehensive capability either as an outsource supplier or as a specialist integrator.
One of the projects that I have been working closely on over the last year with our partners at CSC is in the development of an IEG demonstrator for the European Defence Agency. This approach to secure information exchange will allow the European Defence Agency and the different nations working within it to co-operate to achieve a common goal, whether this be in conflict; on particular initiatives (such as anti-piracy); in peace-keeping; or for humanitarian aid purposes.
The project culminated recently with an on-site visit in Germany for the successful validation of the solution. I’d also just like to say a big thank you to our hosts at the WTD81 for their hospitality.
Next time in this mini-series I will be looking at some of the challenges that we face in deploying Information Exchange Gateways.
This article was originally posted on the Cyber Matters blog – which gives “bite-size insight on cyber security for the not too technical”.