News Feed Item

MTSI & Guardtime Announce the GuardView Videri Appliance for "Real Time Threat Detection and Contextual Threat Intelligence” to Protect Against the Insider Threat

MTSI announces GuardView Videri, the Keyless Signature Infrastructure (KSI) appliance component for next-generation enterprise integrity protection and real-time threat detection, contextual threat intelligence, and rapid incident response. GuardView Videri offers commercial enterprises, DoD and Intelligence Community (IC) customers a ‘defense-grade’ turn-key solution to access the rich integrity service potentials of Guardtime KSI; providing immutable proof of the reliability of their digital assets, Advanced Persistent Threat (APT) detection, reaction, Insider Threat eradication (see http://www.guardtime.com/solutions/ksi-for-insider-threat-mitigation/), and Data Loss Prevention (DLP).

GuardView Videri is Guardtime’s latest addition to the GuardView family of DoD and IC solutions and an integral component to enable trusted Network and Security Operations Centers. The appliance has been specified in close coordination with Guardtime’s federal, defense, and intelligence customers and accreditors and is built on supply-chain specified qualified hardware, backed by expert analysis of current DoD/IC best practices and NIST requirements to operate in the most secure and mission critical operating environments. All software and hardware components for GuardView Videri are directly traceable to currently-approved DoD/IC data center and SOC standards, and Defense Information Systems Agency (DISA) guidelines, including all applicable DISA-recommended configurations

GuardView Videri represents an important infrastructure component of Guardtime’s National Security Information Assurance and Software Assurance Roadmap, to address the pressing digital asset integrity and reliability needs of the Mission Assurance and Special Programs Communities across the DoD and IC - providing contextual threat intelligence (see http://www.guardtime.com/solutions/ksi-for-insider-threat-mitigation/) for Insider Threat detection and response, end-point integrity (M2M), mobility, and hardware/software supply chains.

Jim Blom, President of Guardtime USA, said: “The GuardView Videri appliance represents a significant step forward in the practical implementation of KSI to meet the compliance requirements necessary to operate cloud services on DoD and IC networks. We also believe Videri fits a demand from other commercial service providers for turn-key KSI solutions configured and tested against demanding DoD standards. GuardView Videri offers these markets a way ahead for seamless and scalable integrity and mutual auditability across very large enterprises.”

Kevin Robinson, President and CEO of MTSI added: “As KSI is adopted across the DoD and IC, MTSI and Guardtime recognize the growing demand for rapidly-deployable KSI solutions that will integrate cleanly into existing enterprises. GuardView Videri extends our partnership with Guardtime USA to meet this demand with turn-key ‘Defense Grade’ solutions – MTSI’s strength. As we collaborate on future releases of GuardView Videri, we anticipate that many Federal customers will find that appliance upgrades represent a minimum-risk and cost-effective approach to staying current with the latest KSI solutions.”

About Modern Technology Solutions Inc. (MTSI)

MTSI is an employee-owned U.S. company providing leading-edge technical and engineering services in cyber security, intelligence, unmanned aircraft systems (UAS), missile defense, military aviation, space systems, and homeland security. MTSI’s mission is to make important and lasting contributions to the nation's defense and security by providing leadership and best value solutions to America's most technically challenging strategic problems. MTSI is the Guardtime KSI training and certification firm for the Federal market, as well as the DoD & IC engineering and systems integrator for KSI. Founded in 1993, MTSI today has nearly 600 employees, based at nine offices across the United States. Read more at www.mtsi-va.com.

About Guardtime

Guardtime brings transparency and accountability to digital society. Founded in 2007, Guardtime invented Keyless Signature Infrastructure (KSITM) - a technology that allows any type of electronic activity to be independently verified using only formal mathematical methods, without the need for trusted administrators. KSI provides an independent audit trail for everything that happens in digital society, limiting liability and making it impossible for insiders or sophisticated cyber attackers to manipulate data and cover their tracks. Read more at www.guardtime.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The IoT industry is now at a crossroads, between the fast-paced innovation of technologies and the pending mass adoption by global enterprises. The complexity of combining rapidly evolving technologies and the need to establish practices for market acceleration pose a strong challenge to global enterprises as well as IoT vendors. In his session at @ThingsExpo, Clark Smith, senior product manager for Numerex, will discuss how Numerex, as an experienced, established IoT provider, has embraced a ...
A completely new computing platform is on the horizon. They’re called Microservers by some, ARM Servers by others, and sometimes even ARM-based Servers. No matter what you call them, Microservers will have a huge impact on the data center and on server computing in general. Although few people are familiar with Microservers today, their impact will be felt very soon. This is a new category of computing platform that is available today and is predicted to have triple-digit growth rates for some ...
DevOps theory promotes a culture of continuous improvement built on collaboration, empowerment, systems thinking, and feedback loops. But how do you collaborate effectively across the traditional silos? How can you make decisions without system-wide visibility? How can you see the whole system when it is spread across teams and locations? How do you close feedback loops across teams and activities delivering complex multi-tier, cloud, container, serverless, and/or API-based services?
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that Sheng Liang to Keynote at SYS-CON's 19th Cloud Expo, which will take place on November 1-3, 2016 at the Santa Clara Convention Center in Santa Clara, California.
Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU’s GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, demonstration requests and new requirements. Developers, as part of the pre-planning process and the associated supply chain, could benefit from updating their code libraries and design by incorporating changes.
@ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this ...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Penta Security is a leading vendor for data security solutions, including its encryption solution, D’Amo. By using FPE technology, D’Amo allows for the implementation of encryption technology to sensitive data fields without modification to schema in the database environment. With businesses having their data become increasingly more complicated in their mission-critical applications (such as ERP, CRM, HRM), continued ...
The IoT has the potential to create a renaissance of manufacturing in the US and elsewhere. In his session at 18th Cloud Expo, Florent Solt, CTO and chief architect of Netvibes, discussed how the expected exponential increase in the amount of data that will be processed, transported, stored, and accessed means there will be a huge demand for smart technologies to deliver it. Florent Solt is the CTO and chief architect of Netvibes. Prior to joining Netvibes in 2007, he co-founded Rift Technologi...
SYS-CON Events announced today that Streamlyzer will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Streamlyzer is a powerful analytics for video streaming service that enables video streaming providers to monitor and analyze QoE (Quality-of-Experience) from end-user devices in real time.
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
@DevOpsSummit has been named the ‘Top DevOps Influencer' by iTrend. iTrend processes millions of conversations, tweets, interactions, news articles, press releases, blog posts - and extract meaning form them and analyzes mobile and desktop software platforms used to communicate, various metadata (such as geo location), and automation tools. In overall placement, @DevOpsSummit ranked as the number one ‘DevOps Influencer' followed by @CloudExpo at third, and @MicroservicesE at 24th.
Most of us already know that adopting new cloud applications can boost a business’s productivity by enabling organizations to be more agile and ready to change course in our fast-moving and connected digital world. But the rapid adoption of cloud apps and services also brings with it profound security threats, including visibility and control challenges that aren’t present in traditional on-premises environments. At the same time, the cloud – because of its interconnected, flexible and adaptable...