DATA SECURITY

DATA SECURITY

IDE is established in the field of Data Security due to a continuous effort to keep the company’s encryption products at the highest level of technological advancements investing in specialized technology infrastructure.

Cryptography

Based on in-depth background in the field of cryptography and cryptographic equipment, IDE can provide the following services to customers who want to achieve maximum information security:
 
Security Policy Development
Security Policy Development covers the definition of a communication security policy, the selection and establishment of an appropriate organizational structure for communication security management and the creation of a communication security concept.
 
Communication Security Infrastructure Establishment
The communication security domains which need to be addressed during this process include cryptography, telecommunication and network security, application/system security, operations security, operations continuation and disaster recovery planning, physical security, security architecture, security management, access control and law, investigations and ethics.

Security Equipment Selection and Configuration
Practically only a limited number of hardware is installed in a Crypto Center. A plan for disaster recovery is also developed, followed and maintained. Auxiliary equipment e.g. document shredders, safety storage cabinets, etc. are included according to the needs and the Security Plan.
 
Electromagnetic Security (EMSEC) Requirements Definition
Power cabling, electrical circuits, wire distribution, shielding, grounding, etc. are designed, installed and tested to comply with electromagnetic emission standards. The TEMPEST/EMC Laboratory of IDE has the staff and facilities to perform a complete range of EMC testing services in accordance with the most austere military standards.
 
Know-how Transfer for a National Encryption Center
Transfer of know-how for the establishment of a National Encryption Center to support all cryptography activities of a customer. Capability for integration of a customer Cryptographic Algorithm into IDE’s high technology encryption devices. Indigenous in-depth cryptanalysis capability for the evaluation of utilized cryptographic hardware, software and methods.
 
Training Strategy Implementation
IDE can design and implement a know-how transfer and training strategy in such a way that provides a customer with the appropriate level of know-how transfer and training sufficient to operate its own center depending on own resources. The objective of the know how transfer plan, the training plan and related activities are to establish a team of people with all required knowledge and skills that are able to operate and maintain a National Encryption Center.