WHITE PAPERS

Find out more about secure information exchange

Explore our range of White Papers on various aspects of secure information exchange.

Enabling Secure Information Exchange in Cloud Environments

It has been reported that ‘cloud security’ is an oxymoron, a contradiction in terms. How can something that is abstract, ephemeral and cannot be touched by its users be trusted or secure? In this paper, we look at the principles behind the cloud that present us with security challenges and explore where responsibility for solving the issues lies. MORE DETAILS

 

Secure Information Exchange – Reference Architecture

In today’s world, information sharing is key to improved productivity, efficient and accurate decision making and effective collaboration. This White Paper describes a high level architecture that outlines the key components of a solution and defines their functionality. The architecture is both product and vendor independent. MORE DETAILS

 

Protecting Confidential Information using Data Diodes

When protecting an isolated network against outsider attacks, there are a number of objectives and technologies that are commonly used. This White Paper will explain how a unidirectional data diode impacts on the security objectives of confidentiality, integrity and availability. MORE DETAILS

 

Information Exchange Gateways – The Evolving Story

This White Paper brings the Information Exchange Gateway story up-to-date. It looks at the changing context in which Information Exchange Gateways are being used; recent experiences in deploying them; and what the future holds. MORE DETAILS

 

Information Exchange Gateways – Reference Architecture

To support a climate of coalition based operations and network enabled capability, NATO has defined the concept of an Information Exchange Gateway to facilitate secure communication between different security and management domains. In this classic White Paper, which has stood the test of time, a reference architecture is defined that subsequently has been widely adopted. MORE DETAILS

 

Air-Gaps, Firewalls and Data Diodes in Industrial Control Systems

Due to recent security incidents, there is now a significant debate with regard to what is the best way to protect Industrial Control Systems (ICS). MORE DETAILS

 

Preventing Document Based Malware from Devastating Your Business

Viruses used to be the province of hackers whose aim was to demonstrate their technical prowess by defacing web sites. Today, security attacks are becoming much more sophisticated and infinitely more dangerous. MORE DETAILS

 

Military Message Handling Systems – A Reference Architecture

Military Message Handling Systems (MMHS) have become established as the defacto way of exchanging high grade electronic messages within a national military enclave, between military domains and within operational domains. In this classic White Paper, which has stood the test of time, a reference architecture is defined that subsequently has been widely adopted.  MORE DETAILS

 

Military Message Handling Systems – The Requirements

Military Message Handling Systems (MMHS) provide a means of exchanging high grade electronic messages within a national military enclave, between military domains and within operational domains. This White Paper summarises what organisations need to consider when implementing a new MMHS. MORE DETAILS

TALK TO ONE OF OUR EXPERTS

Talk To One Of Our Experts
Sending

We value your privacy

RECENT BLOG POSTS

Agile Development

What is Agile Development? Agile Development is a collaborative approach to project management, in which teams work together to define project requirements and identify solutions to issues as they occur. It was popularised in the 1990s, when traditional heavyweight...

NIS Directive – The NCSC Cyber Assessment Framework

What is the NIS Directive? The Networks and Information Systems (NIS) Directive is the first piece of EU-wide legislation on cyber security. The purpose of the legislation is to ensure a universal standard of security across all European member states. It is a vital...

Hook, Line and Sinker: Protecting Your Business from Email Phishing

A Not So Perfect Catch At CyberUK 2019, phishing was identified as one of the major threats facing the UK in 2019. Phishing is an act of cybercrime in which users are tricked into providing sensitive data. This includes personal data such as passwords, bank account...

REQUEST A CALLBACK

 

If you would like to talk to us directly, you can request a call back.

 

Request Call back
Sending

 

We value your privacy >

Our Accreditations; Investors in people; ISO 9001; Cyber Essentials; ISO 27001; TickIT Plus; HM Government.

Be the first to know about developments in secure information exchange