DHS Moves Ionic’s Video Surveillance Data Security Tool to Pilot Deployment Phase

Ionic Security has completed the testing phase of a video surveillance data security tool developed through the Department of Homeland Security‘s Silicon Valley Innovation Program.

DHS said Monday the company Data Trust Platform works to protect feeds against targeted attacks without requiring the use of additional encryption, proxies and new technology.

The platform is designed to comply with the Open Network Video Interface Forum Standard, ONVIF-S specifications and the CENC Standard.

SVIP consists four phases, with first two phases consisting of proof of concept and a working prototype.

Ionic Security completed the proof-of-concept, working prototype and test phases of the SVIP program and became the first company to enter the pilot deployment phase.

The department awarded the company $199,329 in funds to perform additional tests under the fourth and final phase.

You may also be interested in...

Kitty Nix Navy Account Team Lead AWS

AWS’ Kitty Nix on Recognizing Security in Managing Navy’s Cloud-Based Data, Analytics

The U.S. Navy teamed up with Amazon Web Services to migrate its data and analytics to the cloud and Kitty Nix, a senior manager with AWS, said the company recognizes the significance of security when managing the service’s data and analytics, DC Military reported Thursday.

Jose Arrieta Former CIO HHS

Jose Arrieta: HHS Uses Oracle Cloud Platform to Help Track COVID-19 Vaccine Trials

Jose Arrieta, former chief information officer at the Department of Health and Human Services, said the use of a cloud platform from Oracle has helped HHS enhance tracking of clinical trials of potential vaccines for COVID-19, FedScoop reported Wednesday.

Drew Schnabel VP of Federal Zscaler

Zscaler’s Drew Schnabel: Zero Attack Surface Could Help DoD Agencies Secure Distributed IT Environment

Drew Schnabel, vice president of federal at Zscaler, wrote in an opinion piece published Tuesday on GCN that agencies within the Department of Defense looking to secure their distributed information technology environments and support telework arrangements should consider five attributes and one is having a zero attack surface.