Perimeter
10/10/2012
12:38 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

General Dynamics Introduces NSA-Certified COTS Computer

TACLANE-MultiBook protects information stored in the computer’s solid-state drive

SCOTTSDALE, Ariz. – General Dynamics C4 Systems today introduced the new TACLANE®-MultiBook laptop, now certified by the National Security Agency (NSA) to secure network communications to the Secret level and below. Government, agency and state and local law enforcement and related organizations may now use the TACLANE-MultiBook. The MultiBook can operate simultaneously on unclassified and classified networks and securely on the public Internet. It also protects information stored in the computer's solid-state drive using the proven ProtecD@R® technology.

Before the TACLANE-MultiBook, multiple computers were needed to provide full separation of classified and unclassified information or connect to the commercial Internet and secure military and government networks.

"For the first time, these specialized workers can merge real life with work life using the TACLANE-MultiBook," said Chris Marzilli, president of General Dynamics C4 Systems. "To get the same level of information security that the new computer provides, users would need three or more information security devices, at twice the cost of the TACLANE-Multibook, and still not have the MultiBook's mobility."

The TACLANE-MultiBook helps to ensure that sensitive information is not compromised if the computer is lost or stolen. Considered a Cryptographic High Valued Product (CHVP), the MultiBook has less stringent handling requirements than a controlled cryptographic item (CCI) and enables secure interoperability with U.S. government and military networks.

Available with a number of options, the TACLANE-MultiBook can be ordered today. The list price starts at $5,790. The MultiBook is also available on the GSA schedule. For a complete list of features, benefits and specifications visit, www.gdc4s.com/MultiBook. For additional information or to order the MultiBook call INFOSEC sales & support at 1-888-897-3148 or email Infosec@gdc4s.com.

General Dynamics C4 Systems is a market leader in providing the military, government and industry with information assurance technologies, products and systems that protect the nation's most sensitive information.

General Dynamics C4 Systems is a business unit of General Dynamics (NYSE: GD).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2963
Published: 2014-07-10
Multiple cross-site scripting (XSS) vulnerabilities in group/control_panel/manage in Liferay Portal 6.1.2 CE GA3, 6.1.X EE, and 6.2.X EE allow remote attackers to inject arbitrary web script or HTML via the (1) _2_firstName, (2) _2_lastName, or (3) _2_middleName parameter.

CVE-2014-3310
Published: 2014-07-10
The File Transfer feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center does not verify that a requested file was an offered file, which allows remote attackers to read arbitrary files via a modified request, aka Bug IDs CSCup62442 and CSCup58463.

CVE-2014-3311
Published: 2014-07-10
Heap-based buffer overflow in the file-sharing feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center allows remote attackers to execute arbitrary code via crafted data, aka Bug IDs CSCup62463 and CSCup58467.

CVE-2014-3315
Published: 2014-07-10
Cross-site scripting (XSS) vulnerability in viewfilecontents.do in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCup76308.

CVE-2014-3316
Published: 2014-07-10
The Multiple Analyzer in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote authenticated users to bypass intended upload restrictions via a crafted parameter, aka Bug ID CSCup76297.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.