Computer security research and development company
Trusted Information Systems, Inc.
Company type
Public (Former Nasdaq symbol:TISX)
Industry
Computer software Computer security
Founded
1983; 41 years ago (1983)
Founder
Stephen T. Walker
Fate
Acquired by McAfee, later by SPARTA, Inc., which was acquired by Cobham, plc
Successor
McAfee
Headquarters
Glenwood, Maryland, U.S.
Area served
Worldwide
Products
Firewall Software, IPSec VPN, Trusted OS
Trusted Information Systems (TIS) was a computer security research and development company during the 1980s and 1990s, performing computer and communications (information) security research for organizations such as NSA, DARPA, ARL, AFRL, SPAWAR, and others.
and 26 Related for: Trusted Information Systems information
TrustedInformationSystems (TIS) was a computer security research and development company during the 1980s and 1990s, performing computer and communications...
from a trustedsystem. The dedication of significant system engineering toward minimizing the complexity (not size, as often cited) of the trusted computing...
geographic informationsystems, also abbreviated GIS, is the most common term for the industry and profession concerned with these systems. It is roughly...
4+) Trusted Solaris Trusted UNICOS 8.0 (Rated B1) XTS-400 (Rated EAL5+) IBM VM (SP, BSE, HPO, XA, ESA, etc.) with RACF Examples of operating systems that...
Anti-Terrorism Information Exchange National Criminal Intelligence Sharing Plan Regional Information Sharing Systems Surveillance "Automated TrustedInformation Exchange...
to the Xenix system. Trusted Xenix was a variant initially developed by IBM, under the name Secure XENIX; later versions, under the Trusted Xenix name,...
techniques – Information security management systems – Overview and vocabulary. ISO/IEC. Committee on National Security Systems: National Information Assurance...
Trusted Computer System Evaluation Criteria (TCSEC) is a United States Government Department of Defense (DoD) standard that sets basic requirements for...
Mitretek Systems and EDS. While working at TrustedInformationSystems, Bell presented two papers, "Lattices, Policies and Implementations", and "Trusted Xenix...
products. Among other companies bought and sold by McAfee is TrustedInformationSystems, which developed the Firewall Toolkit, the free software foundation...
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trustedsystems and...
security against firmware attacks. Trusted Platform Module (TPM) was conceived by a computer industry consortium called Trusted Computing Group (TCG). It evolved...
operating system. Assuring that an authentic operating system starts in a trusted environment, which can then be considered trusted. Provision of a trusted operating...
association focused on IT (information technology) governance. On its IRS filings, it is known as the InformationSystems Audit and Control Association...
to separate information domains, that is, a system we must trust. This distinction is important because systems that need to be trusted are not necessarily...
International Slovakia, an anti-corruption non-governmental organization TrustedInformationSystems, a former computer security research and development company...
TrustedInformation Security Assessment Exchange (TISAX) is an assessment and exchange mechanism for the information security of enterprises, developed...
Urbana–Champaign. Boeing Trusted Software Center CAESAR: the Center for Autonomous Engineering Systems and Robotics the Center for Information Forensics Center...
An information technology audit, or informationsystems audit, is an examination of the management controls within an Information technology (IT) infrastructure...
the other hand, nothing works." Trusted client hardware is somewhat more secure, but not a complete solution. Trusted clients are attractive to business...
based on ARM TrustZone technology, conforming to the TR1 standard, were later launched, such as Trusted Foundations developed by Trusted Logic. Work on...
Summary: A framework for trustedinformationsystems" (PDF), Good Informatics Practice (GIP), Healthcare Information and Management Systems Society (HIMSS) Asher...
In information security, computational trust is the generation of trusted authorities or user trust through cryptography. In centralised systems, security...
Kernel (LOCK), both designed to meet the stringent A1 level of the Trusted Computer Systems Evaluation Criteria (TCSEC). Over the next several years, Secure...
Security Center. These standards describe a process of evaluation for trustedsystems. In some cases, U.S. government entities (as well as private firms)...
people that you may want to designate as trusted introducers. Everyone else will each choose their own trusted introducers. And everyone will gradually...