Security Investigate

Trusted Virtual Domains: Color Your Network

Download now Free registration required

Executive Summary

Enterprises and governmental organizations often struggle with the problem that employees have to use IT systems for different tasks with different security requirements. They may have to deal with top-confidential data while they are also working on data and documents that are supposed to be shared with others. Employees perform different tasks under different roles, for example accessing the Internet, using intranet services, editing unclassified documents, as well as editing classified documents, such as patents. Each of these kinds of tasks has different security requirements. In security-critical environments such as government and military, classified documents are isolated by using physically separated computing platforms. However, in typical enterprise environments users perform these tasks using one computing platform providing a questionable isolation between them.

  • Format: PDF
  • Size: 2129.92 KB