by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : March 2015
GCN MARCH 2015 • GCN.COM 25 Still classified as a pilot, it already has a number of federal agency participants, such as the Veterans Administration, the Postal Service, the Agriculture Depart- ment, NIST and others. High profile agen- cies such as the IRS have said they won’t use the site for now, but hub officials ex- pect a slew of other agencies to sign up for the service over the next two years. Any credential users now have to access government sites or bank accounts could be used with Connect.gov, once it’s been validated by one of the sign-in partners. Or users could create a new credential with a partner. That will help cut down on the “identity fatigue” users now suffer from handling numerous passwords, of- ficials believe, which is fueling the bring- your-own-identity movement. The end goal, according to Connect. gov Director Jennifer Kerber, is to have government agencies organize around one sign-in platform and move away from the siloed identity proofing they’ve relied on so far. The result will be government providing citizens and businesses with better data. UNISYS STEALTH The Unisys Stealth system is used to es- tablish “secure communities of interest” within an enterprise, where only autho- rized users can access information. Its ori- gin lies in the Defense Department, where multiple, physical networks were used to segregate information depending on it se- curity classification. However, that can be tough to manage when there can be 20 or more networks on a single ship or at one site. Having those logically rather than physically isolated makes them much easier to manage, plus it allows for faster support of operations when new physical networks don’t have to be deployed or wires run to desktops. In developing the platform, Unisys’s Cohn said the company was looking at the requirements of cloud computing and how to protect and isolate customers’ data in the cloud as needed. The Stealth solution has a “light finger- print” as it basically sits on top of existing IT infrastructure. “It’s essentially a packet filter that sits between layers two and three of the In- ternet stack,” he said. “It examines the packet to see if it’s intended for a particular community of interest, and, if the person logged on is not a member of that, it ig- nores it so it’s not translated up the stack.” Stealth provides a way to do things that are identity related, and that isolates and protects information without a lot of ad- ministrative headaches, he said. METALOGIX REPLICATOR CROSS DOMAIN EDITION Metalogix developed the Replicator in con- cert with the Defense Information Systems Agency as a way of securely and automati- cally transferring content between Share- Point farms that sit on different networks and at different security levels. It can, for example, synchronize content between se- cret SIPRNet and sensitive but unclassified NIPRNet domains. Replicator is aimed at stemming data leaks from insiders, much of which hap- pens because of unintended or careless actions. With deployed forces, whose command- ers had to operate within their own orga- nizations but also to cooperate with NATO and other forces, sharing information “was a hugely manual process,” involving removable media, said retired Maj. Gen. Steven Smith, a former Army chief infor- mation security officer and now advisor with Metalogix. That level of complexity inevitably led to mistakes from people who didn’t follow procedures, he said, and that involved, “a lot of work” to clear the resulting data spill. The Replicator tool works with exist- ing data guards in place at organizations. Metadata tags in SharePoint indicate what other organizations and security levels it can be shared with. Sharing is also bidi- rectional so any changes are automatically pushed back to the originators of the infor- mation and others who have shared it. EXPERIAN TRAP Experian’s Tax Return Analysis Platform is aimed at helping federal and state organi- zations combat tax fraud, though the basic technology can be used in circumstances that require identity verification and de- vice proofing. It has three main components: A fraud and identity proofing platform that works with both public and private sources to authenticate a user remotely, in real time. Knowledge-based authentication, which asks questions only the particu- lar person being asked will know the answers to. Fraudnet, a proofing tool that compares the device being used to file a tax return with a database of devices that are known to have been used in fraudulent activity. Experian is using the same technology to ser vice identity proofing systems for the Social Security Administration’s online statement system and for the Centers for Medicaid and Medicare Services for iden- tity proofing involved with the Affordable Care Act. WAVE VIRTUAL SMART CARD Wave Systems Corp.’s virtual smart card (VSC) is intended to replace the need for passwords or external tokens such as physical smart cards by using the Trust- ed Platform Module. The TPMs are se- curity chips built into the motherboard of most current business-class comput- ers with a full-featured Windows oper- ating system. The combination of a hardware-based root-of-trust provided by the VSC and the user’s personal identification num- ber (PIN) delivers strong two-factor au- thentication. The fact that it’s a hard- ware solution both reduces much of the administrative overhead involved with software-based tokens as well as the cost of replacing lost physical tokens, according to the company. “ With around a fifth of physical tokens being lost each year, that’s just a massive burden on the support infrastructure,” said Greg Kazmierczak, Wave’s chief tech- nology officer. The VSC hasn’t been transitioned to other operating systems such as those for Android or Apple smartphones because a number of the specifications and ca- pabilities are not yet mature enough, he said, unlike the market for Microsoft tab- lets, laptops and other devices. But they eventually will emerge, Kazmierczak said, helped along by NIST’s recently published SP 800-157 mobile PIV guidelines.• 0315gcn_022-025.indd 25 3/5/15 12:44 PM