NEXOR's New Directory Boundary Agent (DBA) Overcomes Security Risks to Corporate Directories

Total Page:16

File Type:pdf, Size:1020Kb

NEXOR's New Directory Boundary Agent (DBA) Overcomes Security Risks to Corporate Directories NEXOR's New Directory Boundary Agent (DBA) overcomes security risks to corporate directories. Submitted by: LVA Corporate Consultants UK Friday, 11 December 1998 - DBA provides reliable, secure, cost-effective protection of directories. - DBA offers a single point of administrative control - Based onTABARDIUM software licenced from UK Defence Evaluation and Research Agency and pre-evaluated to Security Assurance Level ITSEC E3. NEXOR, the international provider of mission-critical messaging and directory products, today announced its Messageware Directory Boundary Agent (DBA) which allows Lightweight Directory Access Protocol (LDAP) directory systems to connect securely into meta-directories and the Internet, without compromising data privacy. The recent emergence of Public Key Infrastructures (PKI) and Directory Enabled Networks (DEN) means that corporate networks have grown increasingly dependent upon their directory infrastructures. At the same time, the lack of a common security model for directory application software has, until now, exposed most organisations to security risks. NEXOR's DBA at last provides directory administrators with an application-level firewall which enables them to connect two separate networks or administrative domains (eg Internet and Intranet) via special-purpose protocol handlers (or 'proxies') at the network and an administrative boundary domain. DBA achieves this by mediating access to meta-directory systems across a network domain boundary, using the LDAP protocol. In order to guarantee the security of the firewall technology in its new DBA, NEXOR has chosen to incorporate the TABARDIUM software licenced from the UK Defence Evaluation and Research Agency (DERA). This has been pre-evaluated to the Security Assurance level ITSEC E3, on behalf of DERA, by a Certified Licensed Evaluation Facility. By incorporating DBA into the corporate directory infrastructure, machines in the guarded domain are not visible by external users. In addition, only those users on specified machines are allowed access to the LDAP service. Furthermore, administrators can configure which LDAP operations are to be supported for both inward and outward directory requests. For auditing purposes, every audit message is pre-fixed with a date/time stamp and all packets passing through the DBA are recorded. Commenting on this significant announcement, Stephen Kingan, Chief Executive of NEXOR, said: "Organisations in industries demanding high levels of messaging security, such as defence, government and banking, are becoming increasingly dependent on their directory infrastructures, especially with the emergence of a Public Key Infrastructure (PKI) using X.509 certificates. Existing directory application software is not evaluated and is therefore potentially insecure. For some time now, organisations such as these have been seeking a reliable, secure and cost-effective means of defending their PKI. Our new Directory Boundary Agent offers the solution to this problem by providing a firewall or guard approach at the domain boundary to allow directory systems to connect securely in those domains." - ends - Page 1 For further information, please contact: Colin Robbins NEXOR Limited 0115 952 0500 [email protected] Paul Curran LVA Corporate Consultants Limited 01256 765600 [email protected] About NEXOR Formed in 1990, NEXOR, the premier defence messaging provider, delivers mission-critical solutions to business and government organisations demanding a robust, secure and scaleable messaging infrastructure. NEXOR's Messageware range of high-performance messaging and directory products meets the industry standards and conformance criteria demanded by the UK and Canadian defence forces and the UK Ministry of Defence as well as similar high profile organisations. Messageware products are used as the reference platform against which other standards-based products are measured by the UK's National Computing Centre in Manchester and the US Department of Defense, Joint Interoperability Test Center. More information on NEXOR can be found at the NEXOR Website located at www.nexor.com. NEXOR is a trademark and Messageware is a registered trademark of NEXOR Limited. All other trademarks and product names are the property of their respective owners. DBA incorporates TABARDIUM technology. TABARDIUM is a trademark of the UK Defence Evaluation and Research Agency (DERA). DERA is an agency of the UK MoD. Page 2 Distributed via Press Release Wire (https://pressreleases.responsesource.com/) on behalf of LVA Corporate Consultants UK Copyright © 1999-2021 ResponseSource, The Johnson Building, 79 Hatton Garden, London, EC1N 8AW, UK e: [email protected] t: 020 3426 4051 f: 0345 370 7776 w: https://www.responsesource.com.
Recommended publications
  • Growing the Contribution of Defence to UK Prosperity / Foreword by Philip Dunne MP Growing the Contribution of Defence to UK Prosperity
    Growing the Contribution of Defence to UK Prosperity / Foreword by Philip Dunne MP Growing the Contribution of Defence to UK Prosperity A report for the Secretary of State for Defence Philip Dunne MP July 2018 A Front cover: Flexible Manufacturing Systems at the BAE Systems F-35 machining facility at Samlesbury, Lancashire. The systems help machine complex titanium and aluminium components with unparalleled precision. Copyright BAE Systems plc. All images are Crown Copyright unless otherwise stated. Growing the Contribution of Defence to UK Prosperity / Contents Contents Foreword by Philip Dunne MP 2 Executive Summary 4 Chapter 1 National life 6 Chapter 2 Economic growth 16 Chapter 3 People 26 Chapter 4 Ideas and innovation 36 Chapter 5 Place 48 Chapter 6 Cross-cutting findings and recommendations 52 Annex A Comprehensive list of recommendations 56 Annex B Regional Maps 60 Annex C Terms of reference 86 Annex D Engagements 88 1 Foreword by Philip Dunne MP 2 Growing the Contribution of Defence to UK Prosperity / Foreword by Philip Dunne MP I am pleased to have been In addition, we have a unique opportunity as a result of asked by the Secretary of State the historic decision by the British people to leave the for Defence to undertake this European Union from March 2019, to reconsider what Review of the contribution of impacts this may have for the role of Defence in the UK Defence to the prosperity of economy. the United Kingdom. I have been asked in the Terms of Reference for the As part of the Defence and Dunne Review, set out in Annex C, to undertake this work Security Review 2015, when within an initial tight two-month timeframe, to inform I was Minister of State for Defence Procurement, the the Modernising Defence Programme work this summer.
    [Show full text]
  • Science & Technology Trends 2020-2040
    Science & Technology Trends 2020-2040 Exploring the S&T Edge NATO Science & Technology Organization DISCLAIMER The research and analysis underlying this report and its conclusions were conducted by the NATO S&T Organization (STO) drawing upon the support of the Alliance’s defence S&T community, NATO Allied Command Transformation (ACT) and the NATO Communications and Information Agency (NCIA). This report does not represent the official opinion or position of NATO or individual governments, but provides considered advice to NATO and Nations’ leadership on significant S&T issues. D.F. Reding J. Eaton NATO Science & Technology Organization Office of the Chief Scientist NATO Headquarters B-1110 Brussels Belgium http:\www.sto.nato.int Distributed free of charge for informational purposes; hard copies may be obtained on request, subject to availability from the NATO Office of the Chief Scientist. The sale and reproduction of this report for commercial purposes is prohibited. Extracts may be used for bona fide educational and informational purposes subject to attribution to the NATO S&T Organization. Unless otherwise credited all non-original graphics are used under Creative Commons licensing (for original sources see https://commons.wikimedia.org and https://www.pxfuel.com/). All icon-based graphics are derived from Microsoft® Office and are used royalty-free. Copyright © NATO Science & Technology Organization, 2020 First published, March 2020 Foreword As the world Science & Tech- changes, so does nology Trends: our Alliance. 2020-2040 pro- NATO adapts. vides an assess- We continue to ment of the im- work together as pact of S&T ad- a community of vances over the like-minded na- next 20 years tions, seeking to on the Alliance.
    [Show full text]
  • Intelligent Transport Systems in the UK
    Ref. Ares(2018)2176293 - 24/04/2018 Intelligent Transport Systems in the UK Progress Report As required by European Union Directive 2010/40/EU August 2017 The Department for Transport has actively considered the needs of blind and partially sighted people in accessing this document. The text will be made available in full on the Department’s website. The text may be freely downloaded and translated by individuals or organisations for conversion into other accessible formats. If you have other needs in this regard please contact the Department. Department for Transport Great Minster House 33 Horseferry Road London SW1P 4DR Telephone 0300 330 3000 General enquiries https://forms.dft.gov.uk Website www.gov.uk/dft Crown copyright 2017 Copyright in the typographical arrangement rests with the Crown. You may re-use this information (not including logos or third-party material) free of charge in any format or medium, under the terms of the Open Government Licence v3.0. To view this licence visit http://www.nationalarchives.gov.uk/doc/open- government-licence/version/3 or write to the Information Policy Team, The National Archives, Kew, London TW9 4DU, or e-mail: [email protected]. Where we have identified any third-party copyright information you will need to obtain permission from the copyright holders concerned. 2 Contents INTRODUCTION ................................................................................................................................... 6 1. NATIONAL APPROACH TO ITS ......................................................................................................
    [Show full text]
  • Greater East Midlands Upstream Space
    Upstream Space SIA Greater East Midlands 1 Regional Overview.................................................................................................................................................... 1 1.1 Territory ............................................................................................................................................................ 1 1.2 Scope................................................................................................................................................................. 2 1.3 Socio-Economic Characteristics........................................................................................................................ 4 1.4 Science and Innovation Capabilities ................................................................................................................. 5 1.5 Context Within the UK ................................................................................................................................... 14 2 Strengths in Science and Innovation..................................................................................................................... 16 2.1 Excellence in Science and Research................................................................................................................ 16 2.2 Innovation strengths and growth points .......................................................................................................... 20 2.3 Knowledge Transfer, Skills and Training ......................................................................................................
    [Show full text]
  • Connected Consumer Products Release 1.1, December 2017
    Connected Consumer Products Release 1.1, December 2017 Secure Design Best Practice Guidelines © 2017 IoT Security Foundation Notices, Disclaimer, Terms of Use, Copyright and Trade Marks and Licensing Notices Documents published by the IoT Security Foundation (“IoTSF”) are subject to regular review and may be updated or subject to change at any time. The current status of IoTSF publications, including this document, can be seen on the public website at: https://iotsecurityfoundation.org/ Terms of Use The role of IoTSF in providing this document is to promote contemporary best practices in IoT security for the benefit of society. In providing this document, IoTSF does not certify, endorse or affirm any third parties based upon using content provided by those third parties and does not verify any declarations made by users. In making this document available, no provision of service is constituted or rendered by IoTSF to any recipient or user of this document or to any third party. Disclaimer IoT security (like any aspect of information security) is not absolute and can never be guaranteed. New vulnerabilities are constantly being discovered, which means there is a need to monitor, maintain and review both policy and practice as they relate to specific use cases and operating environments on a regular basis. IoTSF is a non-profit organisation which publishes IoT security best practice guidance materials. Materials published by IoTSF include contributions from security practitioners, researchers, industrially experienced staff and other relevant sources from IoTSF’s membership and partners. IoTSF has a multi- stage process designed to develop contemporary best practice with a quality assurance peer review prior to publication.
    [Show full text]
  • 1488 University of Michigan S. Kille ISODE Consortium W. Yeong Performance Systems International C
    Network Working Group T. Howes Request for Comments: 1488 University of Michigan S. Kille ISODE Consortium W. Yeong Performance Systems International C. Robbins NeXor Ltd. July 1993 The X.500 String Representation of Standard Attribute Syntaxes Status of this Memo This RFC specifies an IAB standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "IAB Official Protocol Standards" for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract The Lightweight Directory Access Protocol (LDAP) [9] requires that the contents of AttributeValue fields in protocol elements be octet strings. This document defines the requirements that must be satisfied by encoding rules used to render Directory attribute syntaxes into a form suitable for use in the LDAP, then goes on to define the encoding rules for the standard set of attribute syntaxes defined in [1,2] and [3]. 1. Attribute Syntax Encoding Requirements This section defines general requirements for lightweight directory protocol attribute syntax encodings. All documents defining attribute syntax encodings for use by the lightweight directory protocols are expected to conform to these requirements. The encoding rules defined for a given attribute syntax must produce octet strings. To the greatest extent possible, encoded octet strings should be usable in their native encoded form for display purposes. In particular, encoding rules for attribute syntaxes defining non-binary values should produce strings that can be displayed with little or no translation by clients implementing the lightweight directory protocols. Howes, Kille, Yeong & Robbins [Page 1] RFC 1488 X.500 Syntax Encoding July 1993 2.
    [Show full text]
  • Peter Robert Pietzuch
    Peter Robert Pietzuch Department of Computing Phone: +44 (20) 7594 8314 Imperial College London Fax: +44 (20) 7581 8024 South Kensington Campus E-mail: [email protected] London SW7 2AZ, UK Web: http://www.doc.ic.ac.uk/∼prp I lead the Large-Scale Data & Systems (LSDS) research group at Imperial College London. I am interested in new abstractions and infrastructures for efficient, secure and robust software systems. My work spans the areas of distributed systems, databases, security and networking. The goal is to support the architecture and imple- mentation of large-scale applications and to address their unique data management and security challenges. Experience Sep 17 – Director of Research, Department of Computing, Imperial College London, UK Aug 17 – Full Professor, Department of Computing, Imperial College London, UK Sep 16 – Sep 17 Deputy Director of Research, Dept. of Computing, Imperial College London, UK Aug 14 – Aug 17 Reader (Associate Professor), Dept. of Computing, Imperial College London, UK Aug 11 – Aug 14 Senior Lecturer (Associate Professor), Department of Computing, Imperial College London, UK Nov 06 – Aug 11 Lecturer (Assistant Professor), Dept. of Computing, Imperial College London, UK Head, Large-Scale Data & Systems (LSDS) Group (http://lsds.doc.ic.ac.uk) Apr 04 – Aug 06 Post-Doctoral Fellow, Systems Research Group, School of Engineering and Applied Sciences, Harvard University, Cambridge, MA, USA Jul 02 – Oct 02 Research Intern, IBM TJ Watson Research Center, Hawthorne, NY, USA Research Funding Current funding (ordered by start date) June 18 – May 19 “TFaaS: Trusted Sandboxed Execution of Serverless Functions” $70,000 Principal Investigator Intel This project develops new approaches for securing serverless function-as-a-service clouds using trusted execution.
    [Show full text]
  • The World Wide Web a Strategic Tool for UK Higher Education CONTENTS
    The World Wide Web A Strategic Tool for UK Higher Education CONTENTS Executive Summary and Recommendations 1 Programme of Conference and Workshop 7 Participants at the Conference and Workshop 9 Introductory Comments — Anne Mumford 11 An Introduction To The World-Wide Web — Brian Kelly 13 A Campus Wide Code of Practice for Mounting Material on a WWW — Bob Hynds 23 Other Guidelines 30 Legal issues of WWW & Electronic Publishing — Andrew Charlesworth 31 JANET Acceptable Use — Alistair Chalmers 53 ISSC - Spider or Fly? — Derek Law 56 Exploiting and Protecting the Network — Peter Kemp 59 Approaches to Wide Area Indexing — Martijn Koster 61 The provision of effective local, national and international Web services 63 Neil Smith Teaching and Learning Issues Roger Rist 65 WWW as a Strategic Tool in Research and Teaching of Molecular Sciences Henry S Rzepa 69 World Wide Web as a Tool for Teaching and Research in Visualization Ken Brodlie 72 Global Network Academy Alan Mills 74 WWW - opportunities and Obstacles for administrators — Peter Tinson 75 Web Futures — Brian Kelly 81 Discussion Sessions 83 Teaching, Learning and Research Issues 83 Supporting Information Providers 85 Management Issues 88 Technical Issues 89 EXECUTIVE SUMMARY AND RECOMMENDATIONS Introductory comments This is the report of the workshop organised by AGOCG as part of the Support Initiative for Multimedia Applications (SIMA) funded by the JISC New Technologies Initiative. The event was held at Loughborough University on 13/14 February 1995. The first day consisted of papers from experts in the field. The second day built on that through group discussions of the issues raised to result in recommendations to the community for activity and funding.
    [Show full text]
  • Issue #4 Spring 2014
    CYBERTALK Issue #4 Spring 2014 Produced with the kind support of Support ends Supportfor Windows ends forXP andWindows Office XP2013. and Office 2003. After April 8, 2014, there will be no more updates or support for Windows XP and Office 2003. These products were designed for a different era of technology and can no longer provide a secure technology foundation for governments, even with updates and anti-virus applications. After April 8, 2014, there will be no more updates or support for FindWindows out how XP andwe can Office help 2003. you Theseupgrade products and save. were designed for Calla different 01347 812100era of technology or visit softbox.co.uk/microsoft and can no longer provide a secure technology foundation for governments, even with updates and anti-virus applications. Find out how we can help you upgrade and save. Call 01347 812100 or visit softbox.co.uk/microsoft CAN WE STEM THE TIDE? By Colin Williams, Editor, Cybertalk here is a longstanding commonplace amongst us, the community of cyber security experts, that the key to good cyber security tomorrow is to teach our children more and better science, technology, engineering and mathematics today. We have a common sense that we can STEM the tidal waves of the cyber security crisis. We are of the belief that if children can only be taught how to cut computer code then they will become good cyber citizens and cyber will be made safe. We lament with incredulity the idiocy of an approach that might teach our children T how to use technology; how to behave in the cyber domain.
    [Show full text]
  • I Number of Vendors: 9 I Number of Vendors: 1
    Report run on: February 13, 2016 1:15 PM Country Vendor Number Date Description HUNGARY Fercom Ltd. 11259 12 October 2004 Communication Products and System I ntegration Services HM ARZENÂL Elektromechanikai ZRt. 12933 03 November 2010 Communications Hardware and Software Hubei Hungarian & Belgian Ltd. 10029 15 April2003 TEMPEST & Information Technology Equipment & Services, Communications Equipment & Services and Security Services Kapsch BusinessCom Kft. 13825 14 October 2014 Complete IT Solutions MoD ArmCom C. Co. Ltd. 12889 26 January 2010 Different types of Antenna Masts Navigator Zrt. 14104 08 July 2015 IT Products and Services S&T Consulting Hungary Ltd.. 13252 22 July 2011 Development, Implementation, integration, training, support and maintenance of ERP, engineering, communication and other information systems, software and networks; consulting Siemens PSE Kft. 13648 14 May 2013 Communication networks services, Monitoring and Inventory information systems, Public security solutions, Aerospace technology, Software Engineering, Consulting, Test & Validation, Global Vendor Support/Service Desk, Services Synergon I nformation Systems plc- Synergon 9754 18 December 2001 Communication Equipments, ADP Equipments, Integrator Kft Software & services I Number of vendors: 9 ICELAND Advania hf. 10017 21 March 2003 Engineering Services, Simulation Software and Enterprise Application Integration (EAI) Software and Services I Number of vendors: 1 Page 17 of 40 Report run on: February 13, 2016 1:15 PM Country Vendor Number Date Description ITALY
    [Show full text]
  • Volume 1: TAG Cyber Security Fifty Controls – Volume 1 Introduces the Fifty Primary Control Areas Required for CISO Teams to Be More Effective
    Designer – Vision Creative Finance – M&T Bank Administration – navitend Promotion – Braithwaite Communications Research – TAG Cyber LLC Lead Author – Dr. Edward G. Amoroso TAG Cyber LLC P.O. Box 260, Sparta, New Jersey 07871 Copyright © 2017 TAG Cyber LLC. All rights reserved. This publication may be freely reproduced, freely quoted, freely distributed, or freely transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system without need to request permission from the publisher, so long as the content is neither changed nor attributed to a different source. Security experts and practitioners must recognize that best practices, technologies, and information about the cyber security industry and its participants will always be changing. Such experts and practitioners must therefore rely on their experience, expertise, and knowledge with respect to interpretation and application of the opinions, information, advice, and recommendations contained and described herein. Neither the author of this document nor TAG Cyber LLC assume any liability for any injury and/or damage to persons or organizations as a matter of products liability, negligence or otherwise, or from any use or operation of any products, vendors, methods, instructions, recommendations, or ideas contained in any aspect of the 2017 TAG Cyber Security Annual volumes. The opinions, information, advice, and recommendations expressed in this publication are not representations of fact, and are subject to change without notice. TAG Cyber LLC reserves the right to change its policies or explanations of its policies at any time without notice. Page 2 2017 TAG Cyber Security Annual September 1, 2016 To the Reader: I wrote every word of this 2017 TAG Cyber Security Annual based on my experience, opinion, and research – and I wrote it for one purpose: To serve as a useful guide for Chief Information Security Officer (CISO) teams.
    [Show full text]
  • Iotsf Secure Design Best Practice Guidelines (Bpgs)
    Disclaimer, Terms of Use, Copyright and Trade Marks and Licensing Notices Documents published by the IoT Security Foundation (“IoTSF”) are subject to regular review and maybe updated or subject to change at any time. The current status of IoTSF publications, including this document, can be seen on the public website at: https://iotsecurityfoundation.org. Terms of Use The role of IoTSF in providing this document is to promote contemporary best practices in IoT security for the benefit of society. In providing this document, IoTSF does not certify, endorse or affirm any third parties based upon using content provided by those third parties and does not verify any declarations made by users. In making this document available, no provision of service is constituted or rendered by IoTSF to any recipient or user of this document or to any third party. Disclaimer IoT security (like any aspect of information security) is not absolute and can never be guaranteed. New vulnerabilities are constantly being discovered, which means there is a need to monitor, maintain and review both policy and practice as they relate to specific use cases and operating environments on a regular basis. IoTSF is a non-profit organisation which publishes IoT security best practice guidance materials. Materials published by IoTSF include contributions from security practitioners, researchers, industrially experienced staff and other relevant sources from IoTSF’s membership and partners. IoTSF has a multistage process designed to develop contemporary best practice with a quality assurance peer review prior to publication. While IoTSF provides information in good faith and makes every effort to supply correct, current and high quality guidance, IoTSF provides all materials (including this document) solely on an ‘as is’ basis without any express or implied warranties, undertakings or guarantees.
    [Show full text]