BSTTech Products

A specialist in the design of secure computing and information management, BSTTech Consulting (BSTTech) has created 'black boxed' capabilities for the management and sharingf of secure critical information. The Multi-Level Security Environment (MuSE) capability provides a stand-alone system that has been engineered to provide enhanced information security and sharing capabilities. This includes compliance to ACSI 33 standards for the handling of information and is ideal for Government Agencies, Departments and industries requiring IT systems classification under the Critical Infrastructure Protection Act (including Utilities, Transport, Financial Services and Medical). BSTTech has designed systems for Defence and other government agencies.

Trusted Information Sharing

MuSE

Identity Management

Enterprise Service Bus

 

Multi-Level Security The Holy Grail of Computer Security. Access control to information and systems based on business logic and metadata rules, not Groups or Roles. MuSE provides the answer.

Read more...

 

Identity Management. The application of a strong management framework for the assignment of physical identities to electronic systems. Policy and Practical implementation.

Read more...

Leverage your business processes and assets. Implement SOA to provide a business focus into your technology implementations.

Read more...

Multi-Level Security Environment (MuSE)

Multi-Compartment Security is used where strong seperation of information is required. This can be combined with MLS to provide a superior information management capability . BSTTech has an accredited Multi-Compartment system using a range of COTS technology elements, working together, to achieve a exceptionally strong compartmentisation of information. This is achieved through:

  1. Strong Identity Management
  2. Cross platform systems management
  3. Development of a Digital DNA profile for technology elements and systems
  4. Information Management
  5. Super User control
  6. Device Management
  7. Information compartmentalisation
  8. Creation and compulsory application of Meta-data and tags for Identities, systems, information and sessions
  9. Multiple layers of security and encryption for each session

Identity Management

Are you ready for Identity Management? Can you provide access to your business systems based on roles? Is your infrastructure ready to support true Identity Management? The IM Assessment is for you, it provides you with the roadmap to success for the implementation of logical and physical access control systems! The design, integration and development of identity management systems for adaptive corporate and government IT systems based on X.500, X.509 and biometric authentication systems. The designs provide for:

  1. A secure identity repository (ies)
  2. Metadata
  3. Customisable Workflow
  4. Authorisation and Certification
  5. Auditing
  6. Policy management
  7. Authentication plug ins


Enterprise Security Bus (ESB) Technologies

BSTTech has extensive experience in the scoping, definition, implementation and management of emerging technologies supporting Multi-Level Security. We achieve this through a complete understanding of the systems and information architecture of your enterprise. Mapping this understanding to the current levels of technology within your organisation we can provide a customised and technology agnostic roadmap, based on Enterprise Architecture principals, to allow you to realise your EA dreams.


Cheap Web Hosting | Dedicated Hosting | Ecommerce Web Hosting