Information sharing has become critical to maintaining national security. Agencies need to communicate mission-critical information between people, organizations, locations, communities of interest, and security domains, while ensuring exchange of correct and authorized data with authorized recipients.
To solve this problem, agencies need to employ a cross domain solution that provides assured information sharing with the ability to securely transfer information between two or more differing communities of interest or security domains.
The MDeX System securely manages the transfer of voice, video, and data across multi-level security domains. This adaptable plug-n-play solution provides assured information sharing so that right data is shared with the right recipients, while rigorously enforcing your information sharing policies.
The MDeX System enables sensitive information to be shared between organizations to address mission critical problems such as:
TIBCO Java Message Service (JMS)
The MDeX System’s modular design creates an environment where adding new domains, communities of interest, applications, and content filters requires significantly less custom development compared to most solutions. This gives organizations the flexibility to change their requirements based on mission needs.
The MDeX System includes enterprise and mission management through its centralized (managing n CDS instances) and distributed (remote accessibility to management platform) capabilities for command and control, monitoring, and management activities.
The MDeX System’s intuitive GUI for remote management provides a forward-thinking interface to policy and configuration management, and the means to view audit, system, and application events. This user-friendly design enables systems managers to quickly learn MDeX System operations.
The MDeX System includes PK-enabled web access from any authorized location. The MDeX System also provides the ability for enterprise and mission management services to gain accessibility to active cross domain event information to enable proactive data flow management.
Dynamic policy enforcement allows data owners to establish granular information flows and content filtering policies as mission needs dictate using the industry standard, OASIS XACML, security policy language.
The separation of flow and content policies, and use of XACML, enables rapid examination and approval of defined policies by organization authorities. This allows organization and mission authorities to operate in a coordinated manner to implement policy changes to address changing mission needs.