{"product_id":1000,"v_id":1000,"product_name":"Delta Security Technologies Sentinel Model III Computer Security System ","certification_status":"Not Certified","certification_date":"2002-09-13T00:09:00Z","tech_type":"Sensitive Data Protection","vendor_id":{"name":"Delta Security Technologies","website":"http://www.delta-sec.com"},"vendor_poc":"Richard Vanderhyde","vendor_phone":"703.751.9515","vendor_email":"rvanderhyde@delta-sec.com","assigned_lab":{"cctl_name":"COACT, Inc. Labs"},"product_description":"<p>The product uses traditional periods processing techniques to provide the ability to use computers and workstations to be shared, although not simultaneously, for the processing of multiple levels of classified data. By controlling the power to devices such as internal and removable hard drives, CD and DVD drives, floppy drives, network cards, and USB ports, the computer or workstation can be configured to provide only the configuration that is authorized for each user. The product provides for three independent security domains; an unrestricted domain which is characterized by access to the internal hard drive, and two separate restricted domains, characterized by access to a specific removable hard drive. Access to specific devices is determined by a user profile that is maintained on, and verified through a smartcard. Each user, in effect, is presented with a sanitized machine that is configured for the level of information that he is allowed to access and process.</p>\r\n<p>The configuration and sanitization of the computer/workstation is handled by the Sentinel hardware and firmware. Thus, no modifications are required to the operating system (O/S); the operating system resident on the internal or removable hard drive are arbitrary, and provide all the traditional O/S services and resources.</p>","evaluation_configuration":null,"security_evaluation_summary":"<p>The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS). The purpose of the evaluation was to demonstrate that the Sentinel Model III Computer Security System meets the security requirements of the Security Target. The Sentinel Model III Computer Security System was evaluated against Evaluation Assurance Level (EAL4) requirements according to the Common Criteria for Information Technology Security Evaluation, Version 2.1. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology security Evaluation, Version 1.0. A validator, on behalf of the CCEVS Validation Body monitored the evaluation carried out by COACT, Inc. The evaluation was completed in May 2002. The results of the Sentinel Model III Computer Security System evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report for Delta Security Technologies Sentinel Model III Computer Security System, Report Number CCEVS-VR-02-0023, dated 13 September 2002 prepared by the National Information Assurance Partnership (NIAP) CCEVS.</p>","environmental_strengths":"<p>The hardware-based protection mechanisms provide strong isolation for those protection mechanisms, and because there is no reliance on the operating system for the protections provided, arbitrary operating systems may be utilized in any or all of the security domains that are configurable. The Sentinel hardware can be added to a variety of popular workstations.</p>\r\n<p>Sentinel Model III Computer Security System Model III is a registered trademark of Delta Security Technologies, 205 S. Whiting St. Suite 205, Alexandria, VA 22304.</p>","features":[]}