Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

8/23/2011
05:11 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

General Dynamics Introduces New Driverless PC Card 'Suite B' Encryptor

The DS310 PC card encryptor enables a simpler process for connecting to classified networks while maintaining security

WESTFORD, Mass. – Fortress Technologies, part of General Dynamics C4 Systems, today announced the release of its DS310 commercial off-the-shelf (COTS) ‘Suite B’ encryptor for secret communication between wired or wireless devices and networks. Suite B enables a simpler process for connecting to classified networks while maintaining security. Delivered in a driverless PC card and supporting multiple layers of encryption, the DS310 meets stringent security guidelines, including those of the National Security Agency (NSA).

“The DS310 Suite B encryptor enables levels of classified communications to users previously achieved only at high cost and with specialized products,” said Janet Kumpu, director of General Dynamics C4 Systems Fortress Technologies. “It uses a standard PC card, with built-in Wi-Fi and Ethernet communications along with high throughput hardware encryption capabilities that can be easily adapted to a miniature size for integration into other client devices.”

The DS310 is part of a prototypical implementation of the NSA Suite B initiative awarded to Fortress Technologies in 2009 to develop a short-range wireless sensor network for protecting secret wireless communications within Department of Energy Nuclear facilities. With estimated savings in the millions of dollars per plant, this project highlights the cost savings of using COTS products for secret communication through secure wireless access vs. traditional wired solutions

The DS310 is a hardware device that uses well-established, public domain cryptographic Suite B algorithms specified by the NSA, providing sufficient encryption for U.S. agencies and its allies to connect to classified networks. This commercial off-the-shelf, competitively priced product expands General Dynamics’ initiative to deliver secure communications from the core to the very edge of the network.

At LandWarNet 2011, General Dynamics will showcase the DS310 operating with a General Dynamics Itronix rugged computer platform at the Fortress Technologies booth (#202) and the General Dynamics booth (#901).

General Dynamics C4 Systems’ Fortress Technologies delivers a broad portfolio of COTS products based on industry-proven technology with added security features to support tactical wireless communications for global defense and civilian users. Its deployable, secure, wireless mesh network solutions are designed specifically for highly mobile, rugged-outdoor, tactical military and secure government environments. Leveraging the FastPath Mesh™ self-forming, self-healing, path-optimizing meshing protocol, Fortress’ products incorporate the highest level of security algorithms and meet stringent environmental standards for use in austere environments.

For more information about General Dynamics C4 Systems Fortress Technologies, visit www.gdfortress.com.

For more information about General Dynamics C4 Systems, a business unit of General Dynamics (NYSE: GD), please visit www.gdc4s.com.

Information about General Dynamics is available at www.generaldynamics.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned
Nicole Sette, Director in the Cyber Risk practice of Kroll, a division of Duff & Phelps,  11/19/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1001
PUBLISHED: 2019-11-21
Multiple cross-site scripting (XSS) vulnerabilities in Chyrp before 2.1.2 and before 2.5 Beta 2 allow remote attackers to inject arbitrary web script or HTML via the (1) content parameter to includes/ajax.php or (2) body parameter to includes/error.php.
CVE-2014-8356
PUBLISHED: 2019-11-21
The web administrative portal in Zhone zNID 2426A before S3.0.501 allows remote authenticated users to bypass intended access restrictions via a modified server response, related to an insecure direct object reference.
CVE-2015-3140
PUBLISHED: 2019-11-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Synametrics Technologies SynaMan before 3.5 Build 1451, Syncrify before 3.7 Build 856, and SynTail before 1.5 Build 567
CVE-2019-19207
PUBLISHED: 2019-11-21
rConfig 3.9.2 allows devices.php?searchColumn= SQL injection.
CVE-2019-19203
PUBLISHED: 2019-11-21
An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function gb18030_mbc_enc_len in file gb18030.c, a UChar pointer is dereferenced without checking if it passed the end of the matched string. This leads to a heap-based buffer over-read.