Compliance Snippets
- Traditional Data Security Model
- Real Enterprise Networks
- SECDEF Memo Overview
- Massive Multi-Channel Demodulation
- DoD Zero Trust Strategy
- Detecting and Preventing Data Exfiltration
- Data Exfiltration Use Case
- Cellular Device Detection and Localization
- Bastille and the SECDEF Memo
Excerpt From SECDEF Memo – Impacts on SCIF/SAPF Security Webinar
In this short video clip, Jeremy Fremin, EVP Federal RackTop Systems, describes the traditional data security model. In describing this traditional model, Jeremy establishes the baseline against which RackTop’s Cyberstorage model operates. The Cyberstorage Model works to provide full spectrum capability for an organization’s data security. The discussion served as a precursor to discussing the implications of the SECDEF Memo of June 30, 2023 for wireless device use within sensitive locations. Dive into the details below.
Traditional Data Security Model
Traditional Data Security Model — Bastille
Video Transcript
In the traditional data security model, right, that that castle and moat sort of approach, you know, most of our investment, most of our technologies have been out pushed out to the edge. Right? You’ve got good network security, got good multi factor authentication, you you’ve got endpoint detection and and and application security pieces. All those things need to occur, and we need to continue to do those to improve our preparation there.
But that leaves the data kind of exposed. And the way the traditional security model works is that you’re relying on third party capabilities, bolt on capabilities that typically are using privileged access accounts to be able to look into your storage system to evaluate logs and tell you what has occurred. And so what this results in is, you know, data exfills, that are detected eight, nine months after they happen. Right?
And so what we’re trying to do is we wanna change that security model and move that protection right to the storage, right at the file system. And so the cyber storage model allows us to do that at at line speeds in real time, evaluating the trust and the risk of each transaction.
Right? And with that, not only can we take that those active defensive measures, but we can then integrate with third party tools to to enhance their abilities. Right? To to start tipping and queuing, which we’ll talk about in in the use case. Right?
Looking out and saying, here’s bad behavior, we’re gonna isolate this user and host, but go off and, you know, integrate with a sore to be able to turn off ports on a network switch or to go off and and disable accounts in active directory, those sorts of things, to really get a a full spectrum capability across there.