Enterprise Data Protection Against Exfiltration

Award Information
Agency: Department of Defense
Branch: Air Force
Contract: FA8750-13-C-0003
Agency Tracking Number: F112-032-2078
Amount: $749,961.00
Phase: Phase II
Program: SBIR
Awards Year: 2013
Solicitation Year: 2011
Solicitation Topic Code: AF112-032
Solicitation Number: 2011.2
Small Business Information
Assured Information Security, Inc.
153 Brooks Road, Rome, NY, -
DUNS: 085851181
HUBZone Owned: N
Woman Owned: N
Socially and Economically Disadvantaged: N
Principal Investigator
 Rick Gloo
 Principal Investigator
 (315) 336-3306
 gloor@ainfosec.com
Business Contact
 Kenneth Morse
Title: Director of Contracts
Phone: (315) 336-3306
Email: morsek@ainfosec.com
Research Institution
 Stub
Abstract
ABSTRACT: Enterprise wide data exfiltration will be prevented by designing and implementing a method to protect files based on logical group membership. Anyone outside that group without the group key(s) will be unable to decrypt the data. LEG will provide an automated approach to ensure confidentiality and tracking of data files early in their creation, throughout processing and during transmission. It is intended that LEG will transparently exist within current information systems by coexisting and occasionally relying upon cryptographic and information sharing infrastructure. A design goal of LEG will be to be entirely implemented as software that is installed on host systems. LEG will function low in the operating system architecture to provide transparent functionality to high level applications. BENEFIT: Host or network based detection of data exfiltration is generally an ineffective, reactive approach and as such the LEG effort is built around a new and promising approach to proactively prevent data exfiltration. A design goal of LEG is to be entirely implemented as software installed on a host system. LEG will function low in the operating system architecture to provide transparent functionality to user space applications. The LEG effort will ensure the successful coexistence within the current and future enterprise information security infrastructure while maximally protecting data from unauthorized access.

* information listed above is at the time of submission.

Agency Micro-sites

SBA logo
Department of Agriculture logo
Department of Commerce logo
Department of Defense logo
Department of Education logo
Department of Energy logo
Department of Health and Human Services logo
Department of Homeland Security logo
Department of Transportation logo
Environmental Protection Agency logo
National Aeronautics and Space Administration logo
National Science Foundation logo
US Flag An Official Website of the United States Government