You are here

Enterprise Data Protection Against Exfiltration

Award Information
Agency: Department of Defense
Branch: Air Force
Contract: FA8750-12-C-0049
Agency Tracking Number: F112-032-2078
Amount: $149,935.00
Phase: Phase I
Program: SBIR
Solicitation Topic Code: AF112-032
Solicitation Number: 2011.2
Timeline
Solicitation Year: 2011
Award Year: 2012
Award Start Date (Proposal Award Date): 2011-11-03
Award End Date (Contract End Date): N/A
Small Business Information
245 Hill Road
Rome, NY -
United States
DUNS: 085851181
HUBZone Owned: No
Woman Owned: No
Socially and Economically Disadvantaged: No
Principal Investigator
 Richard Gloo
 Principal Investigator
 (315) 336-3306
 gloor@ainfosec.com
Business Contact
 Kenneth Morse
Title: Director of Contracts
Phone: (315) 336-3306
Email: morsek@ainfosec.com
Research Institution
 Stub
Abstract

ABSTRACT: Enterprise wide data exfiltration will be prevented by designing and implementing a method to protect files based on logical group membership. Anyone outside that group without the group key(s) will be unable to decrypt the data. Localized Encryption Groups (LEG) will provide an automated approach to ensure confidentiality and tracking of data files early in their creation, throughout processing and during transmission. It is intended that LEG will transparently exist within current information systems by coexisting and occasionally relying upon cryptographic and information sharing infrastructure. A design goal of LEG will be to be entirely implemented as software that is installed on host systems. LEG will function low in the operating system architecture to provide transparent functionality to high level applications. BENEFIT: Host or network based detection of data exfiltration is generally an ineffective, reactive approach and as such the LEG effort is built around a new and promising approach to proactively prevent data exfiltration. A design goal of LEG is to be entirely implemented as software installed on a host system. LEG will function low in the operating system architecture to provide transparent functionality to user space applications. The LEG effort will ensure the successful coexistence within the current and future enterprise information security infrastructure while maximally protecting data from unauthorized access.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government