Date: 02/07/2024
Vendor: Merlin Cyber/InfoSec Global
Technology/Topic: AgileSec Analytics Cryptographic Discovery and Analysis Solution
Merlin Cyber URL: https://www.merlincyber.com
InfoSec Global URL: https://www.infosecglobal.com
TEM Video (milTube): https://www.milsuite.mil/video/watch/video/67468
Welcome to the Technical Exchange Meeting (TEM)!
Organizations need to be proactive in managing authorized and unauthorized uses of cryptography in order to protect the critical data entrusted to them. Today’s digital businesses rely on digital certificates, keys, and cryptography as their core security foundation to maintain digital trust, confidentiality, and authenticity. The security of financial transactions, distributed blockchains, IoT communications, and digital identities is susceptible to attack and fraud if cryptography is weak, outdated, or vulnerable to exploit. Agency-appointed migration leads are entrusted to take immediate action to protect their agencies against the risks of a post-quantum world. Not knowing what cryptographic libraries are in use could put you at active risk. OMB memo M-23-02 https://www.merlincyber.com/quantum-threat-mitigationissues clear guidance with an actionable timeline for migration leads to follow in order to rapidly understand and demonstrate the status of all of the cryptographic libraries in the enterprise and prepare for a post-quantum world.
AgileSec Analytics is a cryptographic discovery and analysis solution that empowers enterprises to quickly scan core systems, build an inventory of cryptographic assets, detect hidden vulnerabilities and proactively monitor cryptographic health. AgileSec Analytics provides the following capabilities:
— Crypto Discovery. AgileSec Analytics hunts hidden machine identities and cryptography deployed across complex digital infrastructures. The Solution uncovers keys, certificates, cryptographic libraries and algorithms present in Hosts, Networks and Applications.
— Crypto Inventory. AgileSec Analytics automatically builds a centralized and queriable inventory of machine identities and cryptography discovered. The inventory allows companies to quickly understand where and how cryptography is deployed.
— Crypto Analysis. AgileSec Analytics automatically ranks non-compliant and vulnerable cryptographic objects based on their cryptographic strengths or configuration. Companies can quickly identify hidden vulnerabilities and take appropriate action.
— Crypto Reporting. AgileSec Analytics creates intuitive and customizable reports and dashboards to review the cryptographic health status. The reporting helps companies to quickly prioritize remediation actions without requiring deep cryptographic expertise.
— Crypto Integration. AgileSec Analytics can leverage its unique Cryptographic Intelligence to augment the capabilities of 3rd party systems deployed within an organization. Through integration cryptographic findings could be exported and operational tasks automated.
To join the DISA TEM mailing list, please contact: disa.tem@mail.mil
Disclaimer:
— TEMs do not serve as a marketing venue or request for proposal actions.
— TEMs shall not be interpreted as a commitment by the Government to issue a solicitation or ultimately award a contract.
— TEMs do not serve as an endorsement of any presented technologies or capabilities
— Presentations will not be considered as proposals nor will any awards be made as a result of a TEM session.
— TEMs are public open forums – no proprietary or sensitive information should be presented during TEM sessions. Only publicly-facing content is permissible in DISA TEM sessions.