IARPA: ADVANCED CYBER RESEARCH IN A CONNECTED WORLD DR. STACEY DIXON

Size: px
Start display at page:

Download "IARPA: ADVANCED CYBER RESEARCH IN A CONNECTED WORLD DR. STACEY DIXON"

Transcription

1 IARPA: ADVANCED CYBER RESEARCH IN A CONNECTED WORLD DR. STACEY DIXON 25 October 2016

2 Intelligence Advanced Research Projects Activity

3 The Intelligence Community Central Intelligence Agency Defense Intelligence Agency Department of State National Security Agency Department of Energy National Geospatial-Intelligence Agency Department of the Treasury National Reconnaissance Office Drug Enforcement Administration Army Federal Bureau of Investigation Navy Department of Homeland Security Air Force Coast Guard Marine Corps

4 IARPA s mission is to invest in high-risk/high-payoff research to provide the U.S. with an overwhelming intelligence advantage IARPA Mission and Method Bring the best minds to bear on our problems Full and open competition to the greatest possible extent World-class, rotational Program Managers Define and execute research programs that: Have goals that are clear, measureable, ambitious and credible Employ independent and rigorous Test & Evaluation Involve Intelligence Community (IC) partners from start to finish Run from three to five years Publish peer-reviewed results and data, to the greatest possible extent Transition relevant, successful capabilities to IC partners

5 User Application Operating System Firmware Hardware

6 User Application Operating System Hypervisor Firmware Hardware

7 IARPA Cybersecurity research alignment SPAR User CAUSE SCITE STONESOUP Application Operating System VirtUE Hypervisor Firmware CAT Hardware TIC 7

8 Security and Privacy Assurance Research (SPAR) 8

9 What do you do when a query is too sensitive to share, and bulk ingestion of the data raises privacy issues?

10 What do you do when a query is too sensitive to share, and bulk ingestion of the data raises privacy issues? Query Client Server Database, Policy Client learns: Response Query policy Other record contents Other clients queries Server learns: Query structure Query contents Query response Cross-query trends

11 SPAR Program Aims to create systems that guarantee privacy while also maintaining certain security characteristics Gives assurance to a data owner that only relevant information is shared Supports a practical set of query types and scales to realistic database sizes Enables collaboration between non-traditional/occasional partners, and administration without access to content

12 Ideal Sharing Architecture Query Client Server DB, Policy Third Party Encrypted (DB) Third Party learns limited information about DB and Queries Third Party management jointly decided by Client/Server Client learns: Response Query policy Other record contents Other clients queries Third party learns: Query structure Cross-query trends # of records returned Query contents Record contents Server learns: Query structure Query contents Query response Cross-query trends

13 SPAR Technical Accomplishments SPAR explored trade-offs among query complexity, security guarantees, processing time and memory requirements Approaches included: Oblivious Pseudorandom functions, Bloom Filters, Garbled RAMs, Private B-trees, and Shared input/shared output secure computation Program Status Program ended in 2015

14 Scientific advances to Continuous Insider Threat Evaluation (SCITE) 14

15 How can we advance the science and practice of insider threat detection?

16 SCITE Program Goals Model and forecast the performance of existing and proposed insider threat detection enterprises Develop a new class of active indicators and associated automated detection tools

17 SCITE Technical Accomplishments To be revealed Program Status Kick-off held in 2016 Program ongoing

18 Securely Taking on Executable Software of Uncertain Provenance (STONESOUP) Is this SOUP safe? 18

19 How can we benefit from highly functional software produced by a globalized industry without putting the enterprise at risk?

20 STONESOUP Program Protects systems by automatically preventing software weaknesses from being exploited STONESOUP Technology Automatically finds and mitigates exploitable security vulnerabilities in software Analyzes programs, not the data processed by programs Finds flaws that lead to insecure program conditions, rather than looking for known attack patterns

21 STONESOUP Technology Works with software as-built requires no software supplier input Starts secure/stays secure has a built-in conservative security policy with adaptive tuning to relax unneeded checks Mitigations are automatically applied requires no end user security decisions Benefit: Protected programs launch and run as expected

22 STONESOUP Technical Accomplishments Automatically hardens COTS software applications for higher assurance Linux binary executables with no access to source code required, C non-gui software applications up 100k lines of code, Java source code or bytecode applications Protects against embedded system exploits Measures the effectiveness of vulnerability mitigation tools and techniques Generates test data for cybersecurity research Program Status Program ended in 2015.

23 Circuit Analysis Tools (CAT) 23

24 Microelectronics designs are advancing faster than our capacity to analyze them. How do we keep up with microelectronics when next generation circuits are 10,000x smaller than a human hair?

25 CAT Program Develop tools for integrated circuit analysis at future technology nodes, specifically the 22 nm node and beyond. Analysis tools capable of working with advanced packages including but stacked die. Tools and techniques must address analysis and imaging challenges for which there are currently no solutions.

26 CAT Program Technical Thrusts Thrust 1: Circuit Edit Thrust 2: Fault Isolation Sample Preparation need Thrust 3: Logic Analysis Thrust 4: Fast Imaging

27 CAT Technical Accomplishments Developed a high brightness Gas Field Ion Source capable of delivering He, Ne, and Ar ions to mill at higher rates. Developed 2-photon laser technique that allows IR wavelengths to be used for Si transmission producing half wavelength imaging for higher resolution.

28 CAT Technical Accomplishments Developed a logic analysis tool capable of probing on 22nm SOI ICs. Developed a superconducting nanowire single-photon detector for higher efficiency and resolution. Developed a prototype hybrid laser/mechanical back-side silicon preparation tool Developed methods for thick and think dies.

29 Program Status Program complete. Several commercial products are in the marketplace.

30 Trusted Integrated Chips (TIC) 30

31 Over 90% of the world s integrated circuit foundry capacity is controlled by non-us companies. How can we leverage this global infrastructure while protecting intellectual property and ensuring security?

32 TIC Program Ensure the U.S. Intelligence Community can obtain the highest performance possible in integrated circuits. Obtain assurance that designs are safe and secure not compromised with malicious circuitry. Ensure security of designs, capability, and performance while simultaneously protecting intellectual property. Realize secure systems combining advanced CMOS with higher value chips.

33 TIC Program Develop new IC obfuscation layout strategies to protect both functional capability and performance. Demonstrate the concept of split-manufacturing of integrated circuits using a state-of-the-art untrusted FEOL (Front End of Line) foundry and a trusted BEOL (Back End of Line) foundry. Fabricate chips at the 130nm, 65nm and 28nm manufacturing nodes.

34 Secure Split-Manufacturing and Integration Wires MtM: MEMS, Photonics, Add l chips (US company) BEOL: Metallizations Trusted Foundry Transistors FEOL: CMOS Transistors + Metal 1 Untrusted Foundry

35 Technical Accomplishments Demonstrated split-manufacturing of integrated circuits at the 130nm and 65nm production nodes and is completing evaluation at 28nm. Both Single- and Split-fab wafers delivered; chips are now undergoing testing. Program Status Program is in its final phase. Findings are being shared with government and industry.

36 Cyber-attack Automated Unconventional Sensor Environment (CAUSE) 36

37 How can we forecast cyber-attack events, hours to weeks earlier than existing methods?

38 CAUSE Program goals Develop and validate unconventional multi-disciplinary sensor technology that will forecast cyber-attacks and complement existing advanced intrusion detection capabilities.

39 CAUSE Technical Accomplishments To be revealed Program Status Kick-off held in 2016 Program ongoing

40 Virtuous User Environment (VirtUE) 40

41 How can we develop user environments that are more dynamic, secure, auditable, transferrable, and efficient than the current offerings provided by traditional physical workstations and commercial Virtual desktop infrastructure?

42 VirtUE Program goals Develop new user environments. Develop innovative, dynamic analytics and infrastructures that can leverage these newly developed user environments to both automatically detect and deter security threats that IC user environments will be subject to in the new cloud infrastructure.

43 Let s Build a Better Environment A Virtue a virtual appliance built specifically for the purpose of safe, user-interactive computing tasks

44 Make the Virtue Role Focused Current User Environment Virtue User Environment 1 desktop environment = multiple user roles 1 Virtue environment = one user role

45 Build Dynamic Analytic Logic That Leverages Virtues

46 VirtUE Technical Accomplishments To be revealed Program Status Broad Area Announcement released on 18 October 2016 See iarpa.gov or Fed Biz Ops

47 IARPA Cybersecurity research alignment SPAR User CAUSE SCITE STONESOUP Application Operating System VirtUE Hypervisor Firmware CAT Hardware TIC 47

48 How to Engage with IARPA Research Program Broad Agency Announcement (BAA) Seedlings through IARPA-wide BAA Requests For Information (RFIs) Workshops Prize Challenges Or join us as a Program Manager for 3-5 years!

49 How to Contact IARPA

Intelligence Advanced Research Projects Activity. May 2014

Intelligence Advanced Research Projects Activity. May 2014 Intelligence Advanced Research Projects Activity May 2014 Office of the Director of National Intelligence Central Intelligence Agency Defense Intelligence Agency Department of State National Security Agency

More information

IARPA Cloud Computing. IARPA Overview

IARPA Cloud Computing. IARPA Overview IARPA Cloud Computing IARPA Overview Kerry Name Long Job Program Title Manager Date The United States Intelligence Community Central Intelligence Agency Defense Intelligence Agency Department of State

More information

Intelligence Advanced Research Projects Activity (IARPA) Overview to NDIA Small Business Conference. Dr. Lisa Porter Director, IARPA 7 June 2011

Intelligence Advanced Research Projects Activity (IARPA) Overview to NDIA Small Business Conference. Dr. Lisa Porter Director, IARPA 7 June 2011 Intelligence Advanced Research Projects Activity (IARPA) Overview to NDIA Small Business Conference Dr. Lisa Porter Director, IARPA 7 June 2011 Overview IARPA s mission is to invest in high-risk/high-payoff

More information

Standing up to the semiconductor verification challenge

Standing up to the semiconductor verification challenge 43 Bill Butcher Standing up to the semiconductor verification challenge Companies should seek faster, more cost-effective ways to test the quality of complex system-on-a-chip devices. Aaron Aboagye, Mark

More information

Automatically Find and Fix Insecure Database settings with Oracle Management Cloud PRO4284

Automatically Find and Fix Insecure Database settings with Oracle Management Cloud PRO4284 Automatically Find and Fix Insecure Database settings with Oracle Management Cloud PRO4284 David Wolf Snr Dir of Product Management - Oracle Oct 25, 2018 Session : PRO4284 Title: Automatically Find and

More information

GE Security. Picture Perfect TM. The only UNIX Platform for Integrated Security Management and Access Control. Reliable. Flexible. Efficient.

GE Security. Picture Perfect TM. The only UNIX Platform for Integrated Security Management and Access Control. Reliable. Flexible. Efficient. GE Security Picture Perfect TM The only UNIX Platform for Integrated Security Management and Access Control Reliable. Flexible. Efficient. 15 years and counting Picture Perfect v4 is even more reliable,

More information

Overview and Frequently Asked Questions

Overview and Frequently Asked Questions Overview and Frequently Asked Questions OVERVIEW On April 20, 2009, Oracle announced that it has agreed to acquire Sun Microsystems. The transaction is subject to regulatory approval and until such time

More information

Secure SoC Manufacturing: Foundation for a Connected World

Secure SoC Manufacturing: Foundation for a Connected World Secure SoC Manufacturing: Foundation for a Connected World As mobile usage continues to permeate daily lives with increasingly sensitive data and high-value transactions, the importance of device security

More information

Exalogic Elastic Cloud

Exalogic Elastic Cloud Exalogic Elastic Cloud Mike Piech Oracle San Francisco Keywords: Exalogic Cloud WebLogic Coherence JRockit HotSpot Solaris Linux InfiniBand Introduction For most enterprise IT organizations, years of innovation,

More information

IBM Db2 Warehouse. Hybrid data warehousing using a software-defined environment in a private cloud. The evolution of the data warehouse

IBM Db2 Warehouse. Hybrid data warehousing using a software-defined environment in a private cloud. The evolution of the data warehouse IBM Db2 Warehouse Hybrid data warehousing using a software-defined environment in a private cloud The evolution of the data warehouse Managing a large-scale, on-premises data warehouse environments to

More information

Helping government agencies achieve mission success. Government and Public Sector (GPS)

Helping government agencies achieve mission success. Government and Public Sector (GPS) Helping government agencies achieve mission success Government and Public Sector (GPS) Table of contents 2 Government and Public Sector (GPS) Who we are Our purpose... 4 What we do Our perspective... 8

More information

Developing Connected Products - What s needed? Driven to enable your success!

Developing Connected Products - What s needed? Driven to enable your success! Developing Connected Products - What s needed? Driven to enable your success! What s a Connected Product Smart, connected products are products, assets and other things embedded with processors, sensors,

More information

DELTA Microelectronics

DELTA Microelectronics DELTA / ASIC DELTA Microelectronics Complete supply chain services Flexible business models etc. We help ideas meet the real world / ASIC.MADEBYDELTA.COM About us DELTA Microelectronics is a leading European

More information

10 REASONS FOR ARIS. ARIS Product Marketing July Software AG. All rights reserved.

10 REASONS FOR ARIS. ARIS Product Marketing July Software AG. All rights reserved. 10 REASONS FOR ARIS ARIS Product Marketing July 2017 2 10 REASONS FOR ARIS 1 2 3 4 5 6 7 8 9 10 User Experience Social Collaboration Customer Experience Management Mobility & Cloud Internet of Things (IoT)

More information

SysTrack Workspace Analytics

SysTrack Workspace Analytics SysTrack Workspace Analytics The Visibility IT Needs to Enable End-User Productivity Challenge IT executives are under constant pressure to cost-effectively manage complex IT systems. SysTrack enables

More information

New Ways to Leverage Open Source

New Ways to Leverage Open Source #techsummitch New Ways to Leverage Open Source NEW DEMANDS NEW OPPORTUNITIES Open Source Projects Have Exploded + SUSE: What it Means to be Open Open Source Community Customers & Partners Committed to

More information

Internship opportunities at Check Point!

Internship opportunities at Check Point! Internship opportunities at Check Point! Please send your CV to: Daniele@checkpoint.com. Please mention 3 internship opportunities you are interested in. Infrastructure Developer Join the development team

More information

IBM QRadar SIEM. Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights

IBM QRadar SIEM. Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights IBM Security Data Sheet IBM QRadar SIEM Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights Use IBM QRadar Security Information and Event Management, powered by the

More information

Lenovo Services for the Data Center

Lenovo Services for the Data Center Lenovo Services for the Data Center September 28, 2016 Mission Our mission is to be your trusted partner in the data center. #1 Thousands of customers trust Lenovo Services to run their businesses and

More information

Optimizing Outcomes in a Connected World: Turning information into insights

Optimizing Outcomes in a Connected World: Turning information into insights Optimizing Outcomes in a Connected World: Turning information into insights Michael Eden Management Brand Executive Central & Eastern Europe Vilnius 18 October 2011 2011 IBM Corporation IBM celebrates

More information

KEEPING RAIL PROJECTS ON TRACK AND ON TIME: SOLUTIONS FOR MASTERING COMPLEX TECHNOLOGY CHALLENGES By Alexander Damisch, Director, Industrial Markets

KEEPING RAIL PROJECTS ON TRACK AND ON TIME: SOLUTIONS FOR MASTERING COMPLEX TECHNOLOGY CHALLENGES By Alexander Damisch, Director, Industrial Markets KEEPING RAIL PROJECTS ON TRACK AND ON TIME: SOLUTIONS FOR MASTERING COMPLEX TECHNOLOGY CHALLENGES By Alexander Damisch, Director, Industrial Markets INNOVATORS START HERE. EXECUTIVE OVERVIEW Safe, efficient,

More information

DRIVING SEMICONDUCTOR MANUFACTURING BUSINESS PERFORMANCE THROUGH ANALYTICS

DRIVING SEMICONDUCTOR MANUFACTURING BUSINESS PERFORMANCE THROUGH ANALYTICS www.wipro.com DRIVING SEMICONDUCTOR MANUFACTURING BUSINESS PERFORMANCE THROUGH ANALYTICS Manoj Ramanujam Table of Contents 03... Introduction 03... Semiconductor Industry Overview 05... Data Sources and

More information

Buying IoT Technology: How to Contract Securely. By Nicholas R. Merker, Partner, Ice Miller LLP

Buying IoT Technology: How to Contract Securely. By Nicholas R. Merker, Partner, Ice Miller LLP Buying IoT Technology: How to Contract Securely By Nicholas R. Merker, Partner, Ice Miller LLP More and more products are shipping with sensors and network connectivity to capitalize on the currency of

More information

TechPaper. EB cadian Sync software updates over the air

TechPaper. EB cadian Sync software updates over the air TechPaper EB cadian Sync software updates over the air The importance of over-the-air software updates is increasing dramatically. Elektrobit s powerful and flexible solution provides OEMs with a customized

More information

TechPaper. EB cadian Sync software updates over the air

TechPaper. EB cadian Sync software updates over the air TechPaper EB cadian Sync software updates over the air The importance of over-the-air software updates is increasing dramatically. Elektrobit s powerful and flexible solution provides OEMs with a customized

More information

Utility Vegetation Management in the 21st Century. 3D Virtualization Reduces Risks, Maintenance Costs

Utility Vegetation Management in the 21st Century. 3D Virtualization Reduces Risks, Maintenance Costs 3D Virtualization Reduces Risks, Maintenance Costs The Vegetation-Powerline Threat Trees and branches falling onto power lines are among the leading causes of power outages in North America. Dealing with

More information

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved. 1 Oracle Fusion Middleware Next-Generation Application Platform Web Social Mobile Business Process Management Service Integration User Engagement Content Management Identity Management Business Intelligence

More information

UNDERSTANDING CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

UNDERSTANDING CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) ONLINE REPORT SPONSORED BY: CONTRACT GUIDE UNDERSTANDING CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) INSIDE 2 3 4 5 6 WHAT IS CDM AND WHY DO YOU NEED IT? CDM COULD BE A GAME-CHANGER HOW DOES CDM WORK? WITH

More information

IC Integrated Manufacturing Outsourcing Solution

IC Integrated Manufacturing Outsourcing Solution IC Integrated Manufacturing Outsourcing Solution Integrated One-Stop Service Mature and Low Cost Loop for IC Manufacturing Taiwan s Comprehensive Resources Fast and Easy Engagement to Our Solution Professional

More information

MAXIMIZE PERFORMANCE AND REDUCE RISK

MAXIMIZE PERFORMANCE AND REDUCE RISK PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK FOR ASTRO 25 AND DIMETRA SYSTEMS LATIN AMERICA REGION COMPLEXITIES IN MISSION CRITICAL SYSTEMS CONTINUE TO INCREASE Mission critical communications

More information

Uncovering the Hidden Truth In Log Data with vcenter Insight

Uncovering the Hidden Truth In Log Data with vcenter Insight Uncovering the Hidden Truth In Log Data with vcenter Insight April 2014 VMware vforum Istanbul 2014 Serdar Arıcan 2014 VMware Inc. All rights reserved. VMware Strategy To help customers realize the promise

More information

SEER for Hardware Electronics and Systems Extended Capabilities

SEER for Hardware Electronics and Systems Extended Capabilities SEER for Hardware Electronics and Systems Extended Capabilities Keith Garland Andrew Langridge Bletchley Conference 2008 1 SEER for Hardware Client for Microsoft Project Keith Garland Galorath International

More information

EDA Technologies Fueling IoT Implementation, Current and Future

EDA Technologies Fueling IoT Implementation, Current and Future EDA Technologies Fueling IoT Implementation, Current and Future Michael Thompson Internet of Things (IoT) Summit, RWW 2018 Anaheim, California January 14, 2018 IoT Standards/Applications 2 Industry Trends

More information

FUELING SAFER, MORE EFFICIENT PETROLEUM RETAIL OPERATIONS with the Internet of Things

FUELING SAFER, MORE EFFICIENT PETROLEUM RETAIL OPERATIONS with the Internet of Things FUELING SAFER, MORE EFFICIENT PETROLEUM RETAIL OPERATIONS with the Internet of Things Gas stations are getting smarter - and Petrosoft is helping fuel this transformation. The company is harnessing Internet

More information

Integrated IT Management Solutions. Overview

Integrated IT Management Solutions. Overview Integrated IT Management Solutions Overview freedommanage IT, The Numara FootPrints family of IT Management products and solutions streamline, automate and improve IT operations. They have been designed

More information

ARE YOU GOING DIGITAL WITHOUT A NET?

ARE YOU GOING DIGITAL WITHOUT A NET? ARE YOU GOING DIGITAL WITHOUT A NET? Whether your business is embracing new digital technologies or moving to the cloud, your network needs to be up to the task. 2 ARE YOU GOING DIGITAL WITHOUT A NET?

More information

Emerging & disruptive technology risks

Emerging & disruptive technology risks Emerging & disruptive technology risks Shawn W. Lafferty, KPMG Partner IT Internal Audit/Risk Assurance April 2018 Why IT internal audit? find ways to overcome resource and budgetary constraints. This

More information

WHITE PAPER Migrating to the Cloud

WHITE PAPER Migrating to the Cloud WHITE PAPER Make the move without making mistakes 1 Introduction The cloud is a nebulous concept, literally. Moving to the cloud is not as straightforward as moving a data center from San Francisco to

More information

IBM Tivoli Workload Scheduler

IBM Tivoli Workload Scheduler Manage mission-critical enterprise applications with efficiency IBM Tivoli Workload Scheduler Highlights Drive workload performance according to your business objectives Help optimize productivity by automating

More information

Business Resilience: Proactive measures for forward-looking enterprises

Business Resilience: Proactive measures for forward-looking enterprises IBM Global Services Business Resilience: Proactive measures for forward-looking enterprises protect deflect predict adapt Working with IBM, you can develop and implement a flexible business resilience

More information

Infor CloudSuite solutions Flexible, proven solutions designed for your industry. Infor CloudSuite

Infor CloudSuite solutions Flexible, proven solutions designed for your industry. Infor CloudSuite solutions Flexible, proven solutions designed for your industry 1 Unlock your full potential with Cloud technologies can offer your business a degree of agility and path to rapid growth that simply wasn

More information

Modernize Transactional Applications with a Scalable, High-Performance Database

Modernize Transactional Applications with a Scalable, High-Performance Database SAP Brief SAP Technology SAP Adaptive Server Enterprise Modernize Transactional Applications with a Scalable, High-Performance Database SAP Brief Gain value with faster, more efficient transactional systems

More information

An Oracle White Paper September, Oracle Exalogic Elastic Cloud: A Brief Introduction

An Oracle White Paper September, Oracle Exalogic Elastic Cloud: A Brief Introduction An Oracle White Paper September, 2010 Oracle Exalogic Elastic Cloud: A Brief Introduction Introduction For most enterprise IT organizations, years of innovation, expansion, and acquisition have resulted

More information

Oracle Big Data Cloud Service

Oracle Big Data Cloud Service Oracle Big Data Cloud Service Delivering Hadoop, Spark and Data Science with Oracle Security and Cloud Simplicity Oracle Big Data Cloud Service is an automated service that provides a highpowered environment

More information

EFFORTLESSCASE THE CASE FOR DESKTOP-AS-A-SERVICE

EFFORTLESSCASE THE CASE FOR DESKTOP-AS-A-SERVICE EFFORTLESSCASE THE CASE FOR DESKTOP-AS-A-SERVICE Traditional IT relies on your computers and servers being on premises. From a user s computer to servers - everything functions on the traditional local

More information

Intelligent automation and internal audit

Intelligent automation and internal audit Intelligent automation and internal audit Adding value through governance, risk management, and controls Second article in the series kpmg.ch Contents Governing intelligent automation across the enterprise

More information

A Examcollection.Premium.Exam.35q

A Examcollection.Premium.Exam.35q A2030-280.Examcollection.Premium.Exam.35q Number: A2030-280 Passing Score: 800 Time Limit: 120 min File Version: 32.2 http://www.gratisexam.com/ Exam Code: A2030-280 Exam Name: IBM Cloud Computing Infrastructure

More information

Nanofocused X-Ray Beam To Reprogram Secure Circuits

Nanofocused X-Ray Beam To Reprogram Secure Circuits Nanofocused X-Ray Beam To Reprogram Secure Circuits Stéphanie Anceau, Pierre Bleuet, Jessy Clédière, Laurent Maingault, Jean-luc Rainard, Rémi Tucoulou Let s speak about X-rays Ionizing radiations are

More information

Network Access Control (NAC) Market, Global, Forecast to 2022

Network Access Control (NAC) Market, Global, Forecast to 2022 NEXT STEPS Network Access Control (NAC) Market, Global, Forecast to 2022 NAC Evolving as Enterprise Networks Expand Beyond Secure Walls A Frost & Sullivan White Paper www.frost.com 50 Years of Growth,

More information

IT. 1. Carry out trouble-shooting strategies for resolving an identified end-user IT problem.

IT. 1. Carry out trouble-shooting strategies for resolving an identified end-user IT problem. ACM CCECC Serving computing education communities since 1991. Information Technology Metrics IT. 1. Carry out trouble-shooting strategies for resolving an identified end-user IT problem. Lists appropriate

More information

A technical discussion of performance and availability December IBM Tivoli Monitoring solutions for performance and availability

A technical discussion of performance and availability December IBM Tivoli Monitoring solutions for performance and availability December 2002 IBM Tivoli Monitoring solutions for performance and availability 2 Contents 2 Performance and availability monitoring 3 Tivoli Monitoring software 4 Resource models 6 Built-in intelligence

More information

ApiOmat. Case Study. Challenge

ApiOmat. Case Study. Challenge Case Study SUSE CaaS Platform SUSE Cloud Application Platform In today s digital world, we expect to be able to do everything on our smartphones. makes it quicker and easier for enterprises to develop

More information

The Applicability of HPC for Cyber Situational Awareness

The Applicability of HPC for Cyber Situational Awareness The Applicability of HPC for Cyber Situational Awareness Leslie C. Leonard, PhD August 17, 2017 Outline HPCMP Overview Cyber Situational Awareness (SA) Initiative Cyber SA Research Challenges Advanced

More information

VULNERABILITY MANAGEMENT BUYER S GUIDE

VULNERABILITY MANAGEMENT BUYER S GUIDE VULNERABILITY MANAGEMENT BUYER S GUIDE VULNERABILITY MANAGEMENT BUYER S GUIDE 01 Introduction 2 02 Key Components 3 03 Other Considerations 10 About Rapid7 11 01 INTRODUCTION Exploiting weaknesses in browsers,

More information

VULNERABILITY MANAGEMENT BUYER S GUIDE

VULNERABILITY MANAGEMENT BUYER S GUIDE VULNERABILITY MANAGEMENT BUYER S GUIDE CONTENTS Introduction 2 Key Components 3 Other Considerations 11 About Rapid7 12 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems, and other third-party

More information

IBM United States Software Announcement , dated March 27, 2018

IBM United States Software Announcement , dated March 27, 2018 IBM United States Software Announcement 218-099, dated March 27, 2018 IBM Bluemix Local System (now IBM PureApplication Platform) and IBM PureApplication System firmware V2.2.5 deliver capabilities for

More information

Delivering high-integrity accounting with Xero

Delivering high-integrity accounting with Xero Delivering high-integrity accounting with Xero Contents Untouched data feeds directly into Xero 4 A multi-layered approach to data integrity 5 Access controls 6 Monitoring and alerts 7 Controls and reporting

More information

VTT & VTT Memsfab. Fast track to fab. Howard Rupprecht VP Manufacturing Services / CEO VTT Memsfab Oy. 11/12/2018 VTT beyond the obvious 1

VTT & VTT Memsfab. Fast track to fab. Howard Rupprecht VP Manufacturing Services / CEO VTT Memsfab Oy. 11/12/2018 VTT beyond the obvious 1 VTT & VTT Memsfab Fast track to fab Howard Rupprecht VP Manufacturing Services / CEO VTT Memsfab Oy 11/12/2018 VTT beyond the obvious 1 VTT Memsfab in Brief VTT subsidiary company offering manufacturing

More information

1 P a g e. IT Tailored to Your Needs

1 P a g e. IT Tailored to Your Needs 1 P a g e IT Tailored to Your Needs Bluescope Technologies is a leading provider of IT services to businesses of all sizes in a wide range of industries. Bluescope s headquarters are situated in Limerick,

More information

2 Analytics Reinvented

2 Analytics Reinvented Federal agencies now have access to larger and richer collections of data to advance their mission. New technologies and techniques make it possible to collect, analyze and act on this data in new and

More information

A Woman-owned Small Business /

A Woman-owned Small Business / A Woman-owned Small Business / www.strateratech.com Founded in 1999 as Anvil Logic, a product development firm. Switched focus to software development and systems integration and changed name to Stratera

More information

RAPID AUTHENTICATION THROUGH VERIFICATION, VALIDATION, AND MARKING

RAPID AUTHENTICATION THROUGH VERIFICATION, VALIDATION, AND MARKING RAPID AUTHENTICATION THROUGH VERIFICATION, VALIDATION, AND MARKING Mr. Kerry Bernstein, DARPA/MTO Program Manager NDIA Trusted Microelectronics Workshop August 17, 2016 The DARPA solution is to provide

More information

<Insert Picture Here> Business-Driven IT Management with Oracle Enterprise Manager

<Insert Picture Here> Business-Driven IT Management with Oracle Enterprise Manager Business-Driven IT with Oracle Enterprise Manager Leng Tan Vice President of Product Development The following is intended to outline our general product direction. It is intended

More information

Big and Fast Data: The Path To New Business Value

Big and Fast Data: The Path To New Business Value Big and Fast Data: The Path To New Business Value A Pivotal Overview Umair Riaz vspecialist 2 Gain Business Value with Big and Fast Data Pivotal Provides Agile Platform for Data-Driven Applications Ingest

More information

zenterprise Update and Positioning with PureSystems

zenterprise Update and Positioning with PureSystems zenterprise Update and Positioning with PureSystems Greg Lotko IBM Corporation August 7, 2012 Session Number 11797 Agenda Hybrid computing for a Smarter Planet zenterprise the System of Systems zenterprise

More information

Security intelligence for service providers

Security intelligence for service providers Security Thought Leadership White Paper July 2015 Security intelligence for service providers Expanded capabilities for IBM Security QRadar including multi-tenancy, unified management and SaaS 2 Security

More information

THE CLOUD, RISKS AND INTERNAL CONTROLS. Presented By William Blend, CPA, CFE

THE CLOUD, RISKS AND INTERNAL CONTROLS. Presented By William Blend, CPA, CFE THE CLOUD, RISKS AND INTERNAL CONTROLS Presented By William Blend, CPA, CFE AGENDA Cloud Basics Risks Related Cloud Use GOA on Service Level Agreements COSO ERM Internal Control Model 2 CLOUD BASICS Evolution

More information

Application Migration to Cloud Best Practices Guide

Application Migration to Cloud Best Practices Guide GUIDE JULY 2016 Application Migration to Cloud Best Practices Guide A phased approach to workload portability Table of contents Application Migration to Cloud 03 Cloud alternatives Best practices for cloud

More information

Data is only getting more complicated and siloed. Each dimension of data is constantly expanding

Data is only getting more complicated and siloed. Each dimension of data is constantly expanding Data is only getting more complicated and siloed Each dimension of data is constantly expanding $40k more revenue per employee But companies that take control of data outperform the competition 50%+ higher

More information

Network maintenance evolution and best practices for NFV assurance October 2016

Network maintenance evolution and best practices for NFV assurance October 2016 Network maintenance evolution and best practices for NFV assurance October 2016 TECHNOLOGY BUSINESS RESEARCH, INC. 2 CONTENTS 3 Introduction: NFV transformation drives new network assurance strategies

More information

IBM Security Investor Briefing 2018

IBM Security Investor Briefing 2018 IBM Security Investor Briefing 2018 Marc van Zadelhoff General Manager, IBM Security Michael Jordan Distinguished Engineer, IBM Z Security 1 2018 IBM Corporation Forward looking statements and non-gaap

More information

Strategic Plan

Strategic Plan Information Technology Strategic Plan 2019-2021 Presented by Darin King Vice Chancellor for Information Technology/CIO Strategic Plan 2019-2021 Contents Executive Summary... 3 Goals...4 GOAL ONE...4 GOAL

More information

The Hybrid Enterprise: Working Across On-premises, IaaS, PaaS and SaaS

The Hybrid Enterprise: Working Across On-premises, IaaS, PaaS and SaaS The Hybrid Enterprise: Working Across On-premises, IaaS, PaaS and SaaS Rob Aragao & Stan Wisseman #MicroFocusCyberSummit Primary Goal of Businesses Today Drive Digital Transformation!! 2 For Most Organizations,

More information

The Role of the Operating System in Cloud Environments

The Role of the Operating System in Cloud Environments The Role of the Operating System in Cloud Environments Judith Hurwitz, President Marcia Kaufman, COO Sponsored by Red Hat Cloud computing is a technology deployment approach that has the potential to help

More information

Security solutions White paper. Effectively manage access to systems and information to help optimize integrity and facilitate compliance.

Security solutions White paper. Effectively manage access to systems and information to help optimize integrity and facilitate compliance. Security solutions White paper Effectively manage access to systems and information to help optimize integrity and facilitate compliance. March 2007 Contents 2 Overview 3 Answer key questions related to

More information

Manage Projects Effectively

Manage Projects Effectively White Paper Application Development, Test & Delivery Manage Projects Effectively Table of Contents page Executive Summary... 1 The Micro Focus Solution Invest in What Matters Most then Manage It... 2 Strategic

More information

Integrated Service Management

Integrated Service Management Integrated Service Management for Power servers As the world gets smarter, demands on the infrastructure will grow Smart traffic systems Smart Intelligent food oil field technologies systems Smart water

More information

Partnerships Remove Complexity from HPC Clusters

Partnerships Remove Complexity from HPC Clusters DESKTOP ENGINEERING WITH HP & INTEL ON: Partnerships Remove Complexity from HPC Clusters The right value-added reseller partner can help you navigate the complexities of HPC cluster deployment and achieve

More information

Connected Plant PHARMACEUTICAL SOLUTIONS FOR A CHALLENGING MARKET

Connected Plant PHARMACEUTICAL SOLUTIONS FOR A CHALLENGING MARKET Connected Plant PHARMACEUTICAL SOLUTIONS FOR A CHALLENGING MARKET Pharmaceutical Solutions for a Challenging Market For more than three decades, Honeywell s solutions and services have helped the world

More information

USING LINUX IN MEDICAL DEVICES: WHAT DEVELOPERS AND MANUFACTURERS NEED TO KNOW By Ken Herold, Engineering Specialist, Wind River

USING LINUX IN MEDICAL DEVICES: WHAT DEVELOPERS AND MANUFACTURERS NEED TO KNOW By Ken Herold, Engineering Specialist, Wind River USING LINUX IN MEDICAL DEVICES: WHAT DEVELOPERS AND MANUFACTURERS NEED TO KNOW By Ken Herold, Engineering Specialist, Wind River WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE OVERVIEW Linux is the operating

More information

DESKTOP ENGINEERING WITH HP & INTEL ON: Partnerships Remove Complexity from HPC Clusters

DESKTOP ENGINEERING WITH HP & INTEL ON: Partnerships Remove Complexity from HPC Clusters DESKTOP ENGINEERING WITH HP & INTEL ON: Partnerships Remove Complexity from HPC Clusters The right value- added reseller partner can help you navigate the complexities of HPC cluster deployment and achieve

More information

Microsoft Dynamics Business Solutions. New Era of Business Productivity for the Dynamic Organization. Intelligent Business Software House

Microsoft Dynamics Business Solutions. New Era of Business Productivity for the Dynamic Organization. Intelligent Business Software House Microsoft Dynamics Business Solutions New Era of Business Productivity for the Dynamic Organization Intelligent Business Software House Move your data to the cloud Azure What is happening with cloud technology?

More information

MobileKnowledge. We help companies leverage the secure IoT revolution

MobileKnowledge. We help companies leverage the secure IoT revolution IoT and security MobileKnowledge MobileKnowledge is a team of HW, SW and system engineers, experts in smart, connected and secure technologies for the IoT world. We are your ideal engineering consultant

More information

The Optanix Platform. Service Predictability. Delivered. Optanix Platform Overview. Overview. 95% 91% proactive incidents first-time fix rate

The Optanix Platform. Service Predictability. Delivered. Optanix Platform Overview. Overview. 95% 91% proactive incidents first-time fix rate The Optanix Platform Service Predictability. Delivered. Overview The Optanix Platform is a complete SaaS-based IT operations management solution, delivering integrated monitoring, event management, incident

More information

ebook THE FIVE-STEP STRATEGY FOR QUALITY AND RISK-MANAGED LIFE SCIENCES TRANSLATIONS PAGE 1 library

ebook THE FIVE-STEP STRATEGY FOR QUALITY AND RISK-MANAGED LIFE SCIENCES TRANSLATIONS PAGE 1 library ebook library PAGE 1 THE FIVE-STEP STRATEGY FOR QUALITY AND RISK-MANAGED LIFE SCIENCES TRANSLATIONS The Five-Step Strategy for Quality and Risk- Managed Life Sciences Translations Companies in the life

More information

Desktop Virtualization Solutions Simplified Appliance

Desktop Virtualization Solutions Simplified Appliance Desktop Virtualization Solutions Simplified Appliance Seizing opportunities the challenging workplace Small and midsize businesses, educational organizations, governments and public sector agencies want

More information

CONSULTING & CYBERSECURITY SOLUTIONS

CONSULTING & CYBERSECURITY SOLUTIONS CONSULTING & CYBERSECURITY SOLUTIONS Who We Are Since 1996, Crossroads has been established as a respected Technology and Business Availability Enterprise with strategic competencies in Consulting, Compliance,

More information

Data Breaches and Security Rights in SharePoint Webinar

Data Breaches and Security Rights in SharePoint Webinar Data Breaches and Security Rights in SharePoint Webinar Coby Royer Director of Product Management CipherPoint croyer@cipherpoint.com Twitter @CipherPointSW Don Miller Vice President of Commercial Accounts

More information

SYED ALAM GREG DOUGLASS

SYED ALAM GREG DOUGLASS SYED ALAM GREG DOUGLASS In 1965, Dr. Gordon Moore suggested that semiconductor companies would double the number of transistors in an integrated circuit every two years. For 50 years or about 40 years

More information

Powering the Edge to the Enterprise

Powering the Edge to the Enterprise Powering the Edge to the Enterprise Intelligent Equipment. Smart Devices. Smart Systems for OEMs. Intelligent Equipment. Smart Devices. Smart Systems. Our connected world is increasingly populated with

More information

Tensoft SemiOps. SaaS Solutions for the Semiconductor and Sensor Industries including IC and Module Businesses

Tensoft SemiOps. SaaS Solutions for the Semiconductor and Sensor Industries including IC and Module Businesses Tensoft SemiOps SaaS Solutions for the Semiconductor and Sensor Industries including IC and Module Businesses Tensoft SemiOps Cloud Platform 15+ Years of Experience in Semiconductor Industry Tensoft SemiOps

More information

IT forecast: How to increase secure mobility and productivity for your workforce

IT forecast: How to increase secure mobility and productivity for your workforce IT forecast: How to increase secure mobility and productivity for your workforce 1 Manage security within the evolving workplace and enable your teams to work virtually anytime, anywhere New technology

More information

SAP Configuration Validation Solution Brief. Objectives Solution Benefits Quick Facts

SAP Configuration Validation Solution Brief. Objectives Solution Benefits Quick Facts SAP Configuration Validation Solution Brief Objectives Solution Benefits Quick Facts Drive your business with confidence Realize the potential of SAP software Develop a robust response to cyber risks SAP

More information

PREVENT MAJOR DATA BREACHES WITH THREAT LIFECYCLE MANAGEMENT Seth Goldhammer, Senior Director of Product Management at LogRhythm

PREVENT MAJOR DATA BREACHES WITH THREAT LIFECYCLE MANAGEMENT Seth Goldhammer, Senior Director of Product Management at LogRhythm PREVENT MAJOR DATA BREACHES WITH THREAT LIFECYCLE MANAGEMENT Seth Goldhammer, Senior Director of Product Management at LogRhythm WELCOME Audio is streamed over your computer Dial in numbers and codes are

More information

SCALARi500. SCALAR i500. The Intelligent Midrange Library Platform FEATURES AND BENEFITS

SCALARi500. SCALAR i500. The Intelligent Midrange Library Platform FEATURES AND BENEFITS Intelligent Storage SCALARi500 SCALAR i500 The Intelligent Midrange Library Platform 1 TO 18 DRIVES 36 TO 404 CARTRIDGES MODULAR GROWTH, CONTINUOUS ROBOTICS CAPACITY-ON-DEMAND iplatform ARCHITECTURE AND

More information

Vendor Management Risk Mitigation:

Vendor Management Risk Mitigation: Vendor Management Risk Mitigation: The Importance of Having a Formalized Methodology Sun Life Financial Laura Williams AVP, Procurement Opus Sam Mele Vice President Sales sig.org/summit Case Study: Supplier

More information

A Brief History of Messaging, Morse, Maths and Magyar

A Brief History of Messaging, Morse, Maths and Magyar A Brief History of Messaging, Morse, Maths and Magyar And The Future Through ORACLE INTEGRATED CLOUD & CONVERGED PLATFORMS Scott Wilson Chief Architect/Senior Director EMEA SMART Platform Architecture

More information

2018 WTW General Industry Information Technology Compensation Survey Report - U.S.

2018 WTW General Industry Information Technology Compensation Survey Report - U.S. FUN AID IT Development Designs, develops, modifies, adapts and implements short- and long-term solutions to information technology (IT) needs through new and existing applications, systems architecture,

More information