Four key decision points support best practices in enterprise data
Who is in charge of architecting and configuring the access control
solution in your environment(s) (e.g. selecting the types of ciphers
Do other systems depend on the trustworthiness of your systems?
Who certifies and maintains the trustworthiness of the code in the
context of your larger (enterprise) dynamic access control management
Systems Corporation, a pioneer in externalized attribute based
access control software for enterprise environments, announced release
of a new white paper: “Key Decision Points for Using Open Source
Software in Access Control Solutions.”
Prepared by Jericho Systems cybersecurity expert Tim Schmoyer, CISSP,
the white paper examines open source concepts as they relate to
enterprise-scale access control solutions. The 14-page white
paper considers open source in the context of supply chain risk
management (SCRM), information assurance (IA) products, software
development lifecycle management (SDLC), attribute based access control
(ABAC), industry standards, and other relevant topics. Four key decision
points are detailed, including the implications of software and
component provenance, testing and accreditation, life cycle processes,
and factors that affect total cost of ownership.
“Decades of working and teaching in the Department of Defense and with
the Intelligence and Special Operations Communities taught me the
critical value of sound IT investment decisions,” said Vice President of
Engineering Tim Schmoyer, who contributed to NIST Special Publication
800 – 162, Guide
to Attribute Based Access Control (ABAC) Definition and Considerations.
“Anyone who builds, buys, and uses enterprise software today can make
better decisions and avoid unnecessary risks by understanding the role
of open architecture, open protocols, and open source software.”
This white paper looks at relevant research and raises useful questions
for IT decision-makers such as:
“Jericho Systems subject matter experts are national thought leaders in
defense-grade access control,” said Jericho CEO Brynn Mow. “We
understand the critical need for trusted information-sharing in single
tenant and multi-tenant environments.”
About Jericho Systems Corporation
Systems Corporation supports national cybersecurity through the
development and implementation of fine-grained, policy-based data
filtering technology that enables attribute-based access control (ABAC).
The company delivers enterprise-scalable access control, decisioning,
privacy, and privilege management solutions to world class enterprises.
Its largest customers represent the healthcare, Department of Defense,
intelligence, and homeland security communities.
Jericho's flagship software solution, EnterSpace® Decisioning Service
(ESDS), improves collaboration and leverages the value of data by
enabling timely and secure sharing of sensitive information between
internal groups and with external organizations. To meet the unique
needs of the healthcare market, Jericho’s EnterSpace Exchange™ enhances
ESDS with additional components that control the flow of information in
healthcare applications while ensuring patient privacy. The EnterSpace
Exchange PatientPortal was recognized as a “Best Privacy Technology of
2012” at the Second International Summit on the Future of Health Privacy.
EnterSpace Technology® may be covered by one or more United States
For more information or to arrange a product demonstration, please call
972-231-2000, email firstname.lastname@example.org,
or visit www.jerichosystems.com.
Jericho Systems Corporation
Wendy Sunshine, 972-231-2000
De Garza, 972-231-2000
Source: Jericho Systems Corporation