Trusted Information Systems

Trusted Information Systems
Trusted Information Systems, Inc.
Type Public (Former Nasdaq symbol:TISX)
Industry Computer software
Computer security
Fate Acquired by McAfee, later by SPARTA, Inc., which was acquired by Cobham, plc
Successor McAfee
Founded 1983
Founder(s) Stephen T. Walker
Headquarters Glenwood, Maryland, United States
Area served Worldwide
Products Firewall Software

Trusted Information Systems (TIS) was a computer security research and development company during the 1980s and 1990s, performing computer and communications (information) security research for organizations such as NSA, DARPA, ARL, AFRL, SPAWAR, and others.

TIS was founded in 1983 by NSA veteran Steve Walker, and at various times employed notable information security experts including David Elliott Bell, Martha Branstad, John Pescatore, Marv Schaefer, Steve Crocker, Marcus Ranum, John Williams, Steve Lipner and Carl Ellison. TIS was headquartered in Glenwood, Maryland, in a surprisingly rural location; the company was started in Walker's garage on Shady Lane in Glenwood, MD. As the company grew, rather than move to Baltimore or the Washington D.C. suburbs, a small office building was constructed on land next to Walker's new home on Rt 97.

TIS projects included Trusted Xenix, the first commercially available B2 operating system; Trusted Mach, a research project that influenced DTOS and eventually SELinux; Domain and Type Enforcement (TE) which likewise influenced SELinux; the fwtk Firewall Toolkit (the first open source firewall software), which evolved into the Gauntlet Firewall, one of the first commercial firewall products; and a broad range of Internet Standards, including S/MIME, SNMP, DNS, DNSSEC, and many others.

The first whitehouse.gov e-mail server was located at their headquarters.

TIS's operating system work directly affected BSD/OS, which the Gauntlet Firewall was based on, as well as Linux, FreeBSD, Darwin, and others.

The company went public in 1998[1] and was acquired by Network Associates, which later became PGP and McAfee. The security research organization became NAI Labs and the Gauntlet engineering and development organization was folded into Network Associates' engineering and development.

NAI Labs went through a couple of branding changes which complemented Network Associates' branding efforts. In 2001 the name was changed to Network Associates Laboratories to better match the corporate identity. Then, in 2002-2003, there was a major branding initiative by Network Associates culminating in selection of the flag brand, McAfee. As a result, the security research organization became McAfee Research.

In 2003, SPARTA, Inc., an employee-owned company, acquired the Network Security branch of McAfee Research.

In 2005, SPARTA acquired the remaining branches of McAfee Research, which were organized into the Security Research Division (SRD) of the Information Systems Security Operation (ISSO).

In 2008, Cobham, plc, a British aerospace company, acquired SPARTA. There have been no organizational changes to SRD or ISSO that affect the security research.

On a separate path, TIS's primary commercial product, the Gauntlet Firewall, was acquired from McAfee by Secure Computing Corporation (SCC), and is being integrated into their next generation Sidewinder Firewall.

Several curious twists of fate had TIS acquired by NAI during its attempt to acquire PGP, which was also acquired by NAI; similarly, SCC and TIS were fierce business competitors at various points.

External links

References


Wikimedia Foundation. 2010.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Trusted operating system — (TOS) generally refers to an operating system that provides sufficient support for multilevel security and evidence of correctness to meet a particular set of government requirements.The most common set of criteria for trusted operating system… …   Wikipedia

  • Certified Information Systems Security Professional — Der Certified Information Systems Security Professional (CISSP) ist eine Zertifizierung, die vom International Information Systems Security Certification Consortium, Inc. (auch: (ISC)²) angeboten wird. Es handelt sich bei dem Zertifikat um einen… …   Deutsch Wikipedia

  • Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …   Universalium

  • Certified Information Systems Security Professional — CISSP Logo Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by International Information Systems Security Certification Consortium (ISC)². (ISC)² is a self declared… …   Wikipedia

  • Trusted Computing — (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing the computer will consistently behave in specific ways, and… …   Wikipedia

  • Information privacy — Information privacy, or data privacy is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. Privacy concerns exist wherever personally… …   Wikipedia

  • Information confidentielle — Information classifiée Pour les articles homonymes, voir Secret défense. Un document classifié typique. Page 13 d un document de la NSA (USA), partiellement décla …   Wikipédia en Français

  • Information Server — An information server is an integrated software platform consisting of a set of core functional modules that enables organizations to integrate data from disparate sources and deliver trusted and complete information, at the time it is required… …   Wikipedia

  • information system — Introduction       an integrated set of components for collecting, storing, processing, and communicating information (information science). Business firms, other organizations, and individuals in contemporary society rely on information systems… …   Universalium

  • Information Technology Association of America — The Information Technology Association of America (ITAA) is a leading industry trade group for information technology companies. The Association s membership contains most all of the world s major ICT firms and accounts for over 90% of ICT goods… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”