WWN Software LLCData Sharing and Data Security - without Compromise |
Addressing needs for: | ||
Home |
Need to Know Module |
Q/A |
White Papers |
WWN offers a new software technology that protects sensitive, private, or classified data. Our software, after integration with your business systems, keeps data safe
and also ensures that your teams get the timely data they need. Our new approach minimizes the threat of insider betrayal
while allowing maximum data support for the mission. We offer both security and safety for your data.
A responsible approach to information sharing should allow and encourage sharing while blocking arbitrary access to sensitive, private data. In addition, information sources are large operations, they are located at different sites, and they are administered separately. Effective information sharing must integrate the sharing operations while respecting the differences between the organizations responsible for the data sources. Above all, it is necessary to win the active cooperation of the sources because each must contribute to the overall success of the mission. Key factors in eliciting cooperation are the reduction of risk to a minimal level and the assurance of mutual rewards from cooperation. The WWN secure information sharing architecture brings these key factors to a new system that can be deployed by additions to existing systems. Replacement of systems is impractical and unnecessary. The distinctive feature of the WWN architecture is the addition of a new element: the need-to-know-module which is an independent system that reviews encrypted versions of information and finds encrypted connections between the elements. It can be compared to a federated data concept; but, the federated system introduces a central system that has access to all the data sources unencrypted, which is a major security risk. The need-to-know-module cannot see unencrypted data and its findings remain encrypted in a manner that the need-to-know-module cannot reverse. The value of the need-to-know-module is that it can tell the information sources what they need to share to produce valuable results. Risk is minimized because only the necessary information leaves the protection of its archive in a sharing transaction. Rewards are ensured because transactions are recorded and available for audit. Contact
James Merino |
|