Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

8/23/2011
05:11 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

General Dynamics Introduces New Driverless PC Card 'Suite B' Encryptor

The DS310 PC card encryptor enables a simpler process for connecting to classified networks while maintaining security

WESTFORD, Mass. – Fortress Technologies, part of General Dynamics C4 Systems, today announced the release of its DS310 commercial off-the-shelf (COTS) ‘Suite B’ encryptor for secret communication between wired or wireless devices and networks. Suite B enables a simpler process for connecting to classified networks while maintaining security. Delivered in a driverless PC card and supporting multiple layers of encryption, the DS310 meets stringent security guidelines, including those of the National Security Agency (NSA).

“The DS310 Suite B encryptor enables levels of classified communications to users previously achieved only at high cost and with specialized products,” said Janet Kumpu, director of General Dynamics C4 Systems Fortress Technologies. “It uses a standard PC card, with built-in Wi-Fi and Ethernet communications along with high throughput hardware encryption capabilities that can be easily adapted to a miniature size for integration into other client devices.”

The DS310 is part of a prototypical implementation of the NSA Suite B initiative awarded to Fortress Technologies in 2009 to develop a short-range wireless sensor network for protecting secret wireless communications within Department of Energy Nuclear facilities. With estimated savings in the millions of dollars per plant, this project highlights the cost savings of using COTS products for secret communication through secure wireless access vs. traditional wired solutions

The DS310 is a hardware device that uses well-established, public domain cryptographic Suite B algorithms specified by the NSA, providing sufficient encryption for U.S. agencies and its allies to connect to classified networks. This commercial off-the-shelf, competitively priced product expands General Dynamics’ initiative to deliver secure communications from the core to the very edge of the network.

At LandWarNet 2011, General Dynamics will showcase the DS310 operating with a General Dynamics Itronix rugged computer platform at the Fortress Technologies booth (#202) and the General Dynamics booth (#901).

General Dynamics C4 Systems’ Fortress Technologies delivers a broad portfolio of COTS products based on industry-proven technology with added security features to support tactical wireless communications for global defense and civilian users. Its deployable, secure, wireless mesh network solutions are designed specifically for highly mobile, rugged-outdoor, tactical military and secure government environments. Leveraging the FastPath Mesh™ self-forming, self-healing, path-optimizing meshing protocol, Fortress’ products incorporate the highest level of security algorithms and meet stringent environmental standards for use in austere environments.

For more information about General Dynamics C4 Systems Fortress Technologies, visit www.gdfortress.com.

For more information about General Dynamics C4 Systems, a business unit of General Dynamics (NYSE: GD), please visit www.gdc4s.com.

Information about General Dynamics is available at www.generaldynamics.com.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/13/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-14300
PUBLISHED: 2020-07-13
The docker packages version docker-1.13.1-108.git4ef4b30.el7 as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 (https://access.redhat.com/errata/RHBA-2020:0053) included an incorrect version of runc that was missing multiple bug and security fixes. One of the fixes regressed in th...
CVE-2020-14298
PUBLISHED: 2020-07-13
The version of docker as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 advisory included an incorrect version of runc missing the fix for CVE-2019-5736, which was previously fixed via RHSA-2019:0304. This issue could allow a malicious or compromised container to compromise the co...
CVE-2020-15050
PUBLISHED: 2020-07-13
An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.
CVE-2020-10987
PUBLISHED: 2020-07-13
The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
CVE-2020-10988
PUBLISHED: 2020-07-13
A hard-coded telnet credential in the tenda_login binary of Tenda AC15 AC1900 version 15.03.05.19 allows unauthenticated remote attackers to start a telnetd service on the device.