Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

SafeNet Targets Intelligence Community with New Information-Sharing System

Baltimore-based data protection vendor SafeNet, said on Friday that it has received baseline approval from the US Government for its new MDeX system.

MDeX, or Multi-Domain eXchange, was designed to address cross domain data sharing between government organizations. Earning a Unified Cross Domain Management Office (UCDMO) Cross Domain Inventory, Version 4.0 baseline, means that SafeNet is now free to offer MDeX to departments such as Homeland Security, and other intelligence agencies.

Baltimore-based data protection vendor SafeNet, said on Friday that it has received baseline approval from the US Government for its new MDeX system.

MDeX, or Multi-Domain eXchange, was designed to address cross domain data sharing between government organizations. Earning a Unified Cross Domain Management Office (UCDMO) Cross Domain Inventory, Version 4.0 baseline, means that SafeNet is now free to offer MDeX to departments such as Homeland Security, and other intelligence agencies.

MDeX offers remote management, leveraging an intuitive Java-based GUI, that allows for offsite policy configuration, event management, and monitoring. The “certify once and accredit many” capability of the MDeX System’s modular design, simplifies the process by which organizations can add new domains, communities of interest, applications, and content filters.

Lastly, MDeX can scale to meet enterprise data management requirements or deployed on ruggedized equipment for tactical information-sharing needs. All that is required is a device that supports Java, from enterprise-class servers to small handheld devices, including smartphones.

“Through the MDeX System, SafeNet is transforming cybersecurity by providing reliable, secure, and configurable information sharing across domains for U.S. government organizations that require secure critical communications around sensitive, national security operations,” said Shawn Campbell, SafeNet’s MDeX System Product Manager.

MDeX is coming to market at a time when information sharing between government agencies has become a top priority. The adaptability within the product makes it clear that SafeNet intends to hold a presence in as many agencies as possible.

In related news, the White House issued an executive order on Friday aimed at data classification. The “WikiLeaks” order, as it has been called in some circles, was signed one year after classified diplomatic cables were published by the transparency organization.

“Agencies bear the primary responsibility for sharing and safeguarding classified information, consistent with appropriate protections for privacy and civil liberties,” states one of the key mandates, in the order signed by President Obama.

Advertisement. Scroll to continue reading.

More details on the WikiLeaks order is available here

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.