Find out more about secure information exchange
Explore our range of White Papers on various aspects of secure information exchange.
It has been reported that ‘cloud security’ is an oxymoron, a contradiction in terms. How can something that is abstract, ephemeral and cannot be touched by its users be trusted or secure? In this paper, we look at the principles behind the cloud that present us with security challenges and explore where responsibility for solving the issues lies. MORE DETAILS
In today’s world, information sharing is key to improved productivity, efficient and accurate decision making and effective collaboration. This White Paper describes a high level architecture that outlines the key components of a solution and defines their functionality. The architecture is both product and vendor independent. MORE DETAILS
When protecting an isolated network against outsider attacks, there are a number of objectives and technologies that are commonly used. This White Paper will explain how a unidirectional data diode impacts on the security objectives of confidentiality, integrity and availability. MORE DETAILS
This White Paper brings the Information Exchange Gateway story up-to-date. It looks at the changing context in which Information Exchange Gateways are being used; recent experiences in deploying them; and what the future holds. MORE DETAILS
To support a climate of coalition based operations and network enabled capability, NATO has defined the concept of an Information Exchange Gateway to facilitate secure communication between different security and management domains. In this classic White Paper, which has stood the test of time, a reference architecture is defined that subsequently has been widely adopted. MORE DETAILS
Due to recent security incidents, there is now a significant debate with regard to what is the best way to protect Industrial Control Systems (ICS). MORE DETAILS
Viruses used to be the province of hackers whose aim was to demonstrate their technical prowess by defacing web sites. Today, security attacks are becoming much more sophisticated and infinitely more dangerous. MORE DETAILS
Military Message Handling Systems (MMHS) have become established as the defacto way of exchanging high grade electronic messages within a national military enclave, between military domains and within operational domains. In this classic White Paper, which has stood the test of time, a reference architecture is defined that subsequently has been widely adopted. MORE DETAILS
Military Message Handling Systems (MMHS) provide a means of exchanging high grade electronic messages within a national military enclave, between military domains and within operational domains. This White Paper summarises what organisations need to consider when implementing a new MMHS. MORE DETAILS
RECENT BLOG POSTS
Nexor releases sentinel 3.60 October 2018 Sentinel 3.60 is the latest version of Nexor’s high assurance email guard. The newest version incorporates a number of updates designed to make the tool more secure and functional. We have enhanced and added features to...
Moving to the cloud: practical considerations for your organisation October 2018 Cloud technology has come a long way in recent years, to the point that an organisation moving to the cloud is more often than not a matter of when as opposed to if. However, the...
Magecart attacks - can your business stay secure? September 2018 Is it possible to keep hackers like Magecart at bay? At least three major businesses have been compromised in a spate of cyber attacks over the past few months. As many as 800 other ecommerce websites...
Be the first to know about developments in secure information exchange