Products and Services:
Security is essential for a good life!
Once you have a secure environment, life improves. This is also true related to ones digital life.
SRP is secure!
The SRPNetOS Ecosystem represents an opportunity to create a safe and secure computing infrastructure to protect against the loss of health, wealth, and privacy.
SRP is built on existing and new standards.
Below is a small list of projects and standards important to SRP:
Standards based safe and secure architecture. see Elisa Project
Risk mitigation and operation optimization are based on the developing ERMA standard as defined in the OMG-RFP. See ERMA RFP
Secure an attribute access access controlled environment. see IEF, see NextLabs
Policy defined network and systems architecture. See Kerbernetes Policy see SRP Policy Driven
Security link management connection system. SRP driven technology
SRP ecosystem includes APIs for:
Relationship abased access control (ABAC) security.
Connection management.
Virtualization.
Who needs SRPNetOS today!
Mission Critical Infrastructure:
If you are building, supplying or supporting mission critical infrastructures, you need to consider SRP as part of your solution set. Without security, there is no peace of mind!
The first step to learning about the SRP architecture, then planning for a demonstration followed by a test bed. The process takes time but the as you know, safety and security is not easy.
Transportation:
Planes, trains and automobiles are a few of the moving parts within the transportation industry. The types and number of safety and security issues are too numerous to outline but we can break them down into a few categories:
Safety and security by unit and between units
Secure communication both internally and externally
Time sensitive networking, data sharing and medium integration
Utilities:
Utilities are mission critical infrastructure subject to attack by state actors and many others. The number and diversity of moving or critical components makes management and operations difficult without those who have malicious intent.
Creating safe and secure devices is one small step. Maintaining a secure communications infrastructure that is resilient, reliable and maintainable is difficult. Today, the need to share information, add new services and integrate new technologies makes for a complicated infrastructure.
It is difficult to maintain a software supply chain, for a narrow set of devices but when you have millions, it appears impossible.
National Defense:
Safety and security is need for defense and defense needs to deliver safety and security. The question is, how do you secure data, communications devices in a shared environment?
Common architectures, integrated services, reuse, reliability and security are impossible with today's infrastructure. What would a new architecture look like if you designed it from the ground up?
Smart Factory Communications:
Secure communication is a fundamental requirements for any smart factory but the computing and communications demands of a factory have special needs such as:
Time sensitive networking
Distributed Data Services
Redundancy, resilience and reliability
Medium designation
Sensor data merging
Data management
Security
The question is, How can these technologies be developed and implemented?
Learn More about:
Enterprise Resource Metadata Attribution (ERMA)
What are the differences between ERMAs and SBOMS?
Are there advantages to using ERMAs?
Can an ERMA generate an SBOM? If yes, in what format?
If you would like to learn more about ERMAs please email information@srpnetos.com
Software Bill of Materials
SBOMs seem like an esoteric idea but they are important for risk management. Vulnerabilities are the result of fragmented and varied software development legacy but today, malicious actors are using existing know and created vulnerabilities as an attack vector.
SBOMs are part of global computing regulatory infrastructure.
The NIS2 Directive is the EU-wide legislation on cybersecurity. It provides legal measures to boost the overall level of cybersecurity in the EU.
The President’s Executive Order (EO) 14028 on Improving the Nation’s Cybersecurity issued on May 12, 2021, charges multiple agencies – including NIST – with enhancing cybersecurity through a variety of initiatives related to the security and integrity of the software supply chain.
If you would like to learn more about ERMAs please email information@srpnetos.com
Ask us about:
Data Centric Security
Network and Application Security
System Bill of Materials including SBOM
Policy development
Safe and Secure Computing
Communication security
Online Seminars
Requirements for a communication revolution
What are the requirements for a communication revolution? What role does security, privacy, control and accountability play in a new communications model?
Target Audience: Technology and Business Leaders, Research Scientists are welcome.
Topics Covered:
An inventory of key technologies and implementations will be presented. This part of the session is designed to be more interactive.
The role of data centricity in systems operations will be presented and discussed.
A review of security methodologies used today.
A discussion related to the wished and needs for a new infrastructure.
Length: 4 hours in length with 15 min break (depending on questions)
If you would like to learn more about our seminars please email information@srpnetos.com
Securing Mission Critical Devices and Supply Chain Seminar
Mission Critical Devices have specialized security needs?
Target Audience: Technology and Business Leaders, Research Scientists are welcome.
Topics Covered:
What role does safety and security play in securing mission critical devices?
How do you secure mission critical communications?
How is system and communication monitoring implemented and supported?
How does TSN and DDS fit securely in a mission critical infrastructure?
Length: 3-4 hours in length (depending on questions)
If you would like to learn more about our seminars please email information@srpnetos.com