Showing 1 - 12 of 21
Protect and Isolate NAS Functions with Software Full Disk Encryption and Disk Partitioning

Protect and Isolate NAS Functions with Software Full Disk Encryption and Disk Partitioning

Through disk partitioning and commercial off-the-shelf (COTS) data-at-rest (DAR) encryption, this paper proposes a solution that reduces the risk of data loss, corruption, and accessibility if intercepted.

11/21/2024
Choosing the Right Data Storage Solutions For Aerospace and Defense Applications

Choosing the Right Data Storage Solutions For Aerospace and Defense Applications

This paper discusses the advanced characteristics of both network-attached storage devices and direct-attached storage devices.

11/14/2024
Optimizing Video Capture and Storage for Deployed Aircraft

Optimizing Video Capture and Storage for Deployed Aircraft

This paper focuses on the secure recording and storage of video data captured by camera systems in deployed military aircraft.

11/13/2024
DAR Series Part 2: Commercial Solutions for Classified (CSfC)

DAR Series Part 2: Commercial Solutions for Classified (CSfC)

Learn about the innovative NSA CSfC program leveraging commercial encryption technologies in a layered approach for agile and cost-effective classified data protection.

10/10/2024
DAR Series Part 4: NSA CSfC vs. Type 1 Encryption

DAR Series Part 4: NSA CSfC vs. High Assurance Type 1 Encryption

Compare NSA High Assurance Type 1 and CSfC encryption approaches across over a dozen factors, including procurement, risk, technology adoption, and exportability.

08/28/2024
Build vs. Buy Considerations  for Deployed Data-at-Rest  Storage Devices

Build vs. Buy Considerations for Deployed Data-at-Rest Storage Devices

To help customers make the correct build-or-buy decision for deployed data-at-rest network attached storage devices, this paper highlights key considerations that should be weighed, including encryption and certification.

07/30/2024
Securing Data with Quantum Resistant Algorithms

Securing Data with Quantum Resistant Algorithms: Implementing Data-at-Rest and Data-in-Transit Encryption Solutions

Review the challenges for deploying QR encryption and how to implement DAR and data-in-transit QR encryption solutions using commercial FPGA devices and off-the-shelf hardware.

05/22/2024
Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption

Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption

The goal of post-quantum cryptography is to develop cryptographic systems that are secure and can interoperate with existing communications protocols and networks.

05/22/2024
DAR Series Part 3: NSA Type 1 Encryption

DAR Series Part 3: NSA High Assurance Type 1 Encryption

Gain valuable insights into NSA High Assurance Type 1 encryption including device consideration factors, encryption algorithms, and certification processes.

04/02/2024
DAR Series Part 1: Data Threats and Protection

DAR Series Part 1: Data Threats and Protection

Explore strategies for protecting classified data through encryption and considerations for choosing a data-at-rest encryption approach.

01/04/2024
Why Trusted Platform Modules are Critical to Deployed Network Attached Storage

Why Trusted Platform Modules are Critical to Deployed Network Attached Storage

Classified data-at-rest (DAR) in deployed applications faces both internal and external threats that can subject sensitive data to exploitation.

07/06/2023
B2 Bomber

Removing 10 GbE Network Attached Storage Bottlenecks

Network attached storage (NAS) devices have the ability to protect and store critical data at high-performance speeds.

03/22/2023