WWN Software LLC  

Data Sharing and Data Security - without Compromise

    Addressing needs for:
        • National Security/Intelligence
        • Banking/Commerce
        • Healthcare/Privacy

 

Home

Need to Know Module

Q/A

White Papers

 

WWN offers a new software technology that protects sensitive, private, or classified data. Our software, after integration with your business systems, keeps data safe and also ensures that your teams get the timely data they need. Our new approach minimizes the threat of insider betrayal while allowing maximum data support for the mission. We offer both security and safety for your data.

Our patented software has been developed for investigators, data analysts, and researchers in order to securely perform data sharing and data matching for classified and/or sensitive information. The WWN software identifies and matches relevant encrypted data while all data remain encrypted throughout the entire operation process, thereby securing data for both internal and external data sharing. The WWN software provides matched results connecting the dots for analysis while strictly complying with U.S. privacy act laws.

A responsible approach to information sharing should allow and encourage sharing while blocking arbitrary access to sensitive, private data. In addition, information sources are large operations, they are located at different sites, and they are administered separately. Effective information sharing must integrate the sharing operations while respecting the differences between the organizations responsible for the data sources. Above all, it is necessary to win the active cooperation of the sources because each must contribute to the overall success of the mission.

Key factors in eliciting cooperation are the reduction of risk to a minimal level and the assurance of mutual rewards from cooperation. The WWN secure information sharing architecture brings these key factors to a new system that can be deployed by additions to existing systems. Replacement of systems is impractical and unnecessary.

The distinctive feature of the WWN architecture is the addition of a new element: the need-to-know-module which is an independent system that reviews encrypted versions of information and finds encrypted connections between the elements. It can be compared to a federated data concept; but, the federated system introduces a central system that has access to all the data sources unencrypted, which is a major security risk. The need-to-know-module cannot see unencrypted data and its findings remain encrypted in a manner that the need-to-know-module cannot reverse. The value of the need-to-know-module is that it can tell the information sources what they need to share to produce valuable results. Risk is minimized because only the necessary information leaves the protection of its archive in a sharing transaction. Rewards are ensured because transactions are recorded and available for audit.


Contact

James Merino
President and Founder
202-834-3777
email