Government agencies at all levels are entrusted with the most sensitive and classified information. You are also the #1 target for attacks, without exception. Our founders are ex-United States Air Force Information Warfare experts, so we know a little about what it takes to secure civilian and military agency servers and desktops. Bouncer was developed specifically to stop foreign enemies from having the ability to take control of our critical infrastructure, and it excels in that task. We understand how Windows and Linux systems are attacked and our technology was developed specifically to help you stop the advanced persistent threat.
Preventing the theft or alteration of your information is critical for a myriad of national security and public trust reasons. And Bouncer can help you meet the enormous burden of the various Federal compliance mandates and laws as follows:
Federal Information Security Management Security Act (FISMA)
Under the 2010 Federal Information Security Management Act, also referred to as FISMA 2.0, federal agencies have the burden of reporting and continuously monitoring and presorting on various elements of the agency’s security. One of the leading instrument soy change take splice when desktops and servers under damage caused by malware. A breach of a system sets of a chain of events that can cripple an organization, not only from the attack itself, but in reporting and mitigating the incident. Bouncer is designed to stop many of these breaches before ether even occur. By stopping the execution of unauthorized code and by enabling an agency to create and maintain operating system and application baselines, chances of unauthorized change, and the damage incurred by unmitigated breaches, are greatly reduced. This allows IT staff to focus on other issues critical to the mission of the agency.
SANS Consensus Audit Guidelines (CAG)
There are twenty Concensus Audit Guidelines that clearly stipulate a variety of critical security controls for the most effective cyber-defense These are regarded as measures that must be undertaken in order for Federal agencies and large enterprises to have any hope of achieving an effective security posture. CoreTrace and Bouncer helps federal agencies and enterprises meet several components of the SANS CAG to ensure their systems have the baseline security controls in place that are most critical to the SANS directives. These include the following (linked to their respective guidelines at SANS):
- Critical Control 2: Inventory of Authorized and Unauthorized Software
- Critical Control 5: Malware Defenses
- Critical Control 6: Application Software Security
- Critical Control 12: Controlled Use of Administrative Privileges
Federal Desktop Core Configuration (FDCC)
The Federal Desktop Core Configuration is a list of security settings recommended by the National Institute of Standards and Technology for general-purpose desktops and servers that are connected directly to the network of a United States government agency. The ultimate goal of the FDCC is to prevent would-be hackers and other nefarious entities from compromising government systems. Bouncer creates and then defends a whitelist of approved application on a protected desktop. The system is protected at its most core level, the operating system kernel. By enforcing the whitelist Bouncer can block the execution of unauthorized code in the file system or in memory that would allow the system to be compromised.