Tresys Technology

From Bluecabinet
Jump to: navigation, search
TRESYS TECHNOLOGY
Official Website: http://www.tresys.com/
Official about page: http://www.tresys.com/about.php
Country: Please specify country
Location: 8840 Stanford Blvd., Suite 2100, Columbia, Maryland 21045 USA

19955 Highland Vista Dr., Suite 175, Ashburn, Virgina 20147

Founded: 1999
Business: Deep Content Inspection, Filtering, Interception, Integration and Custom designs
Contact
Phone: 410.290.1411 703.840.2400
Fax: 410.953.0494 703.729.4948

Background

Private Company that "serves government and commercial enterprises, and the Departments of Defense in the United States, the United Kingdom, and Australia, IBM, General Dynamics, Red Hat and Cisco.

"Deep content inspection is the only way to identify, filter, and sanitize complex file types to thwart targeted attacks and stop data exfiltration. Antivirus protection should be your first line of defense (and is included in most Tresys products); however, it is simply not sufficient to protect your network from novel, targeted threats and prevent data disclosure using hidden content. Tresys’ deep content inspection and filtering products and services are focused on finding and removing obscured information, removing active code, and scanning and removing metadata.

Tresys’ products and services are the result of years of working closely with Department of Defense, Intelligence, and critical infrastructure customers to develop solutions that meet high-security, mission-critical requirements. Coupled with our file sanitization and Cross Domain Solution (CDS) expertise, Tresys experts deliver solutions that prevent the transfer of zero-day exploits and malware while ensuring efficient and rapid transfer of essential data." - Tresysm Technology -

Products

Photos of Products

  • XD-AIR (FiST) includes advanced Deep Content Inspection
  • XD Bridge is available for sale to the US Federal Government, US-owned Critical Infrastructure (CI), and US-owned Defense Industrial Base (DIB) organizations. Data Sheet pdf
  • XD-Mail includes Deep Content Inspection

"As an appliance-based Cross Domain Solution (CDS), XD Router [USG program name TurretGate] sets new standards for middleware messaging guards. It is not just a ‘bridge’ solution as it can physically connect two or more networks and offer high security, performance and throughput while retaining low latency and filter efficacy.

XD Router routes and filters message-oriented middleware (MOM) traffic among multiple domains and is capable of accreditation to Director of Central Intelligence Directive [DCID]6/3 Protection Level (PL)4. This unique solution was architected as a blueprint to enable quick development, deployment, and certification of CDS implementations. "

"Tresys XD Elements represents a collection of software that Tresys has developed over the years when building cross domain solutions. Tresys builds and has worked with partners to develop solutions capable of accreditation to Director of Central Intelligence Directive (DCID) 6/3 Protection Level (PL) 4 & 5. Our solutions focus on low latency, high throughput, deep content inspection, varying fabrics, rapid accreditation, and ease of use and deployment. This collection of software, available with Tresys services, is used to expedite CDS development and/or enable pre-existing guards."


Countries using products

Australia, United Kingdom and United States government and intelligent agencies.

Reports

"The Diva or the Data?

A Lady Gaga CD is one of the last things one would expect to cause what many consider the worst network intrusion and insider threat this year. But that’s what investigators say happened when a 22-year old intelligence analyst, Bradley Manning, allegedly copied documents from a classified system while pretending to play the pop diva’s music in a disc drive.

The security breach could have been prevented, some analysts say, if the organization had been using the File Sanitization Tool (FiST) from Tresys Technology, which filters, disinfects and does deep content inspection of removable media such as USB drives, CDs, DVDs and files in mission critical environments. FiST also stores whatever malicious hidden content it might find for future forensic analysis.

“If the guards at the desk had checked the CD through FiST first, the technology would have caught the breach. Since FiST checks the nature of content, it would have revealed that the Lady Gaga CD was really blank,” said Bob Stalick, Tresys managing director of products.

For comprehensive data leakage protection, Tresys integrated FiST with ITT’s PuriFile content inspection application this fall. “PuriFile was designed to detect information not caught in the process of reliable human review,” said John Ivory, director of ITT innovation and commercialization.

FiST identifies malicious code, viruses, Trojans, rootkits (which intentionally obscure a system compromise), malformed software and steganography (Greek for “concealed writing”). Unlike cryptography, steganography is the science of writing hidden messages that are so subtle as not to appear to be encrypted messages. One example would be adjusting the color of every 50th pixel in an image to correspond to a letter in the alphabet.

FiST removes the code in question, rendering the media safe for use and preventing it from infecting DoD systems. FiST and PuriFile provide support for many file types, including various Microsoft products, NX PowerLite, a compression tool, as well as IronKey and MXI, which provides hardware-based government-approved encryption. “PuriFile verifies that FiST really did clean everything out. It’s the final seal of approval,” Stalick said.

“FiST is designed to pass only known good content, as opposed to scanning only known bad content, which is what virus scanners do. Most of the changes we made to the latest version, FiST 4.0, were the result of field testing in theater,” said Stalick.

“FiST was designed to deal with removable media as a mechanism for introducing subversive code into networks,” Stalick said. FiST makes use of core Assured File Transfer (AFT) technology, a cross domain solution used to allow authorized users at a higher security classification domain to share files such as Microsoft Office, XML, .pdf and imagery file formats securely with a lower security classification domain and the reverse. AFT provides the ability for domains of differing security classifications to clean files before sending them to one another by enforcing and authenticating file transfer security policies through the use of anomaly detection, pattern analysis and event logging, for example.

The Tresys security product is a dedicated system that comprises software and a Dell laptop with hardware specifications customized specifically for enhanced security. “FiST is sold as an integrated system to ensure that all of the attributes of the hardware are correctly implemented and the software is securely configured for the hardware,” said Stalick.

MXI Security also integrated its technology into Tresys FiST this year. MXI offers military-grade solutions to protect network access from the problem of removable media. The MXI Stealth Processor is a dedicated, portable security processor for USB devices available in the FIPS 140-2, Level 3 standard with AES-256 hardware encryption and multifactor authentication.

In the event of a breach or for fast intelligence gathering and forensics operations, Harris Corp. recently released out a USB thumb drive that locates and extracts targeted data from computers quickly. Called Blackjack, the product was created for use by military, intelligence and law enforcement cyber-security missions. The device boots in a few seconds, then instantly scans and copies data by using prioritized search criteria. LED indicators confirm whether the targeted data is present in order to determine quickly whether the computer of interest is of any value."


"Infosec IBM is working with the Cabinet Office to demonstrate one of the first mainstream Mandatory Access Control (MAC) environments. The MAC approach is designed to contain the impact of security breaches, a feature that will give government departments greater confidence in extending government services to the public over the net. The design for the system, which IBM is putting together with its partners Tresys Technology and Belmin Group, is based upon Security Enhanced Linux (SELinux) and IBM WebSphere..."

Tech & Business Partners

Tech Partners and Service Providers include;

Red Hat, Montavista, VM Ware, Wind River, Ironkey, Intel, Galois, Owl Computing Technologies, MXI Security IBM, HP, CSC, Northrop Grumman, SRA, Booz | Allen | Hamilton, RTI, General Dynamics


May 2, 2011 · RTI and Tresys Join Forces with Wind River to Announce Innovative CADRE Architecture for Building Flexible, Cost-Effective Secure Cross-Domain Solutions

August 4, 2005 · Tresys Technology awarded a contract from Space Naval Warfare Systems Command (SPAWAR)

People Responsible

====Board Members====

Leadership w/pics

  • Gary Latham, Chief Executive Officer

Gary Latham has enjoyed a 30 year career in the information technology industry, with experience in government, commercial enterprises, and several startup firms. Prior to joining Tresys, Gary led EMC’s Microsoft services business in EMEA, with a focus on mergers and acquisitions in developing regions. Before that, Gary led the public sector business for Internosis, a Northern Virginia based professional services and consulting firm. He has also held operational, business development, and sales leadership roles in both established and startup firms in the security space.

Gary spent the first ten years of his career with the U.S. Department of State, where he led the development of information security programs at high risk locations around the globe and represented the State Department in joint, international intelligence activities related to information security.

Gary currently serves on the board of directors of the Information Assurance Small Business Association (IA-SBA). He and his wife, Ruby, are also partners in a firm that develops Montessori schools with a focus on inclusion of children on the autism spectrum. They are active members of the community of parents and professionals engaged in the fight against autism.

Gary attended Clemson University and is a graduate of the National Defense University.


  • Christopher M. DeVault, Chief Operating Officer

Chris DeVault brings over 20 years of experience in IT operations, development, and engineering knowledge to Tresys. Responsible for the day-to-day operations of the company, Chris has a principal focus on end-to-end management of all customer delivery and resource management, technical strategy, and operational quality. During his tenure at Tresys, Chris has been responsible for the introduction of Tresys’ solution lines, adoption of business automation tools, and development/adoption of the Carnegie Mellon Software Engineering Institute (SEI) Capability Maturity Model Integrated (CMMI)-based quality management program.

Before joining Tresys, Chris led EMC’s Microsoft commercial services practice for the majority of the continental US, continuing the role he had at Internosis prior to their acquisition by EMC. Prior to his work at EMC and Internosis, Chris was a computer security analyst with the United Stated Department of State Bureau of Diplomatic Security Office of Information System Technology responsible for performing security assessments of US embassies as well as providing information security policy guidance.

Chris holds a Master of Science in Technical Management from the Johns Hopkins University, Whiting School of Engineering and a Bachelor of Science degree in Mechanical Engineering from West Virginia University.


  • Dean Ramsay, Chief Financial Officer & Partner

Dean Ramsay brings over 30 years of financial experience as a Financial Executive to Tresys. As the CFO, Dean devises, implements, and administers overall financial plans, programs, and policies for Tresys. He also directs treasury functions, working capital, and makes short-term and long-term investments while managing relationships with lending institutions, shareholders, and the financial community. Dean is also responsible for providing financial direction in acquisitions, divestitures, and determination of capital structure while effectively interfacing with the company Board of Directors regarding financial matters.

Prior to joining Tresys in 2001, Dean had served in multiple positions providing him with his vast knowledge in the areas of finance and business practices. As the Chief Financial Officer for Merritt Properties, Dean served as the senior financial officer and manager of commercial real estate. In this role, he directed all financial reporting, job cost, budgeting, tax matters, investor relations, and payroll. Dean also served as the Controller for Merritt Properties where he managed the accounting and administrative functions, financial and tax matters, human resources, collections, and budgets. He was also responsible for preparing the operating budget and monitoring financial activities for all of Merritt Properties. Before joining Merritt, Dean worked for various corporations serving in finance and controller positions as well as acquisition.

Dean possesses an MBA from Loyola College of Maryland and a BS in Business Administration from George Mason University. He is also a Certified Public Accountant in the State of Virginia.


  • Karl MacMillan, Chief Technology Officer

Karl MacMillan is responsible for technical strategy, research, and quality of technology innovation and solutions. He brings to this role in-depth experience in computer security, operating system design, and software development. While at Tresys, Karl led the development of key technologies and the development of a world class team of security software developers.

Prior to Tresys, Karl was employed by Red Hat where he led the development of security products including Security Enhanced Linux (SELinux) and Red Hat Identity, Policy, and Audit (IPA). He also assisted the CTO and Director of Product Management in strategy, product development, and evaluation of partners and acquisitions. In addition to Red Hat, Karl was principal developer at Johns Hopkins University (JHU) where he developed a system for the recognition of historical and degraded documents and musical scores. This work resulted in several widely cited papers and a flexible software system used as part of several digital library projects.

Karl holds a Bachelor of Music degree from Georgia State University and two Masters Degrees in Music and Computer Music from The Peabody Institute of JHU. At Peabody he researched digital signal processing, machine learning as applied to text, audio, and music recognition which led to his interests in operating system design and implementation.

Karl is a regular speaker at Linux and computer security conferences and has published many academic papers, industry white papers, and the book SELinux by Example. Before his career in technology, Karl was a professional orchestral trombone player.


  • Robert Stalick, Vice President, Solutions

Bob Stalick is responsible for the planning, creation, marketing, maintenance, and support of all Tresys packaged solutions and products. Joining Tresys in 2009, Bob brings over 34 years of experience in information technology, covering the waterfront of UNIX, open source, and proprietary technologies.

From 2000 to 2005, Bob was Chairman and CEO of Internosis and led the creation and management of this Northern Virginia based professional services and consulting firm until its purchase by EMC in 2006.

Prior to that, Bob spent 15 years in government systems integration, including six years operating the Department of State’s Computer Security Laboratory, and providing solutions to a variety of government customers. Bob spent his early career as a systems programmer and software development manager working on IBM and Wang operating systems, developing both products and custom solutions for commercial and government users.

Bob graduated from Yale University with a Bachelor of Arts.


  • Sven Standal, Vice President, Engineering Services

Sven Standal has over 17 years of experience in information technology and is responsible for managing all aspects of engineering services and overseeing the firm’s organizational quality and delivery performance via customer service, vendor, and program management and process development initiatives.

Prior to Tresys, Sven was vice president of technology at Morgan Stanley, where he managed the global information technology services and operational related activities for the company’s research department and was responsible for all aspects of day-to-day IT operations.

Preceding working on Wall Street, Sven was a managing principal at Internosis, where he managed a $15 million consulting division and provided outsourced productivity services to a diverse client base. Sven was also instrumental in creating the NY Metro Microsoft Infrastructure Practice and establishing the corporate quality management program.

Sven graduated Summa Cum Laude with a Bachelor of Science in Industrial Technology from the University of Southern Maine.


  • Scott Winn, Vice President, Business Development

Scott Winn brings over 30 years of leadership and management experience in both government and commercial enterprises to Tresys. His career as an Intelligence Officer and business leader contributes unique insight and perspective directly relevant to Tresys’ Defense and Intelligence Community clients. Scott has executive and management experience with companies such as Gartner, MCI WorldCom, and TESSCO Technologies.

Scott spent 26 years in uniform, in enlisted assignments during which he served as a reconnaissance crewmember as well as commissioned service as an Intel Officer at the Battalion and Brigade Level, Company Command, and as Chief Instructor at Army Officer Candidate School.

Scott holds a Bachelor of Science Degree in Political Science and Chinese Area Studies. He serves on the AFCEA International Technology Committee and is an active member of several industry associations. He and his family reside in Hunt Valley, MD.


Management Team

==== Investors ====


Major Shareholders

Other Info

IP & Servers