IQware Critical Infrastructure / Command Control

IQware is a real-time Master Data Management (MDM) system that is designed for command and control center applications. IQware performs interactive data acquisition, analysis, reporting, auditing, presentation, and archiving.

IQware's intelligent solutions provide:

   Information sharing without loss of access control
   Information sharing while still controlling & tracking access
   Tailored, secure content management, analysis, delivery and presentation of data
   Information assurance and validation
   Interactive and comprehensive reports
   Interoperability with all existing systems
   Very high security with complete, tamper-proof audit trail
   Integration of information from disparate IT and legacy IT systems
   Real-time performance


Raise the bar with IQware's adaptable software solutions.


IQware specializes in the regulated industries, which have the following requirements, needs and characteristics:

Command Center Needs:

  • Real-time and secure data acquisition
  • Interactive, individually-tailored content management, analysis, delivery and presentation
  • Interoperability and compatibility with new and emerging technologies
  • Extremely high security with complete, tamper-proof audit trail and comprehensive reports
  • Interactive data analysis
  • Flexibility and on-the-fly adaptability to new conditions and operational requirements

Existing Command Center Characteristics:

  • Inflexible and non-adaptive
  • Cannot add functionality without costly and time-consuming reprogramming
  • Inadequate information integration with other systems
  • Inadequate operational tracking, auditing, reporting capability
  • Cannot meet operational and regulatory compliance with existing command center

IQware's patented (US #7,322,028) software has three unique, differentiating and critical attributes:

  • It is hacker-proof and immune to desktop viruses (patented)
  • It is rule-based so it can be changed on-the-fly and without programming (patented)
  • It is interoperable so it works with emerging, hand-held wireless devices (patented)

IQware benefits agencies within the Critical Infrastructure:

  • IQware is a COTS product - providing very low risk solutions
  • IQware specializes in the "regulated industries" where audit trails & security are essential
  • IQware specializes in the "regulated industries" where compliance verification is essential
  • IQware can handle command center issues directly, and is currently providing this service
  • Sample command center applications include:
    • Critical infrastructure monitoring, control and auditing
    • NASA
    • Power management
    • Asset management
    • Water & Wastewater Treatment

Key issues faced by Critical Infrastructure IT managers:

  • Massive amounts of data can overwhelm managers who must develop courses of action for protection of the Critical Infrastructure.
  • Critical decision-making requires access to the latest data and the ability to make sense out of the information available.
  • Operators may suffer from information overload and disregard information that seemingly has no value at the time, but becomes critical as an event evolves.
  • Support staff must handle multiple sources of information and correlate multiple incidents and alerts to recognize, isolate and define an event in progress.
  • Gaining a clear and consistent picture of an emerging event and then developing a coordinated course of action across existing command structures.
  • Multiple on-going and emerging events, with their many associated incidents, exacerbate the decision support staffs' ability to provide course of action analyses and make it is almost impossible to tie events together in real time to provide a complete situational picture.
top



IQware's Secure Architecture

IQware uses a secure Trusted Computing Base (TCB)

  • Department of Defense rating of C2/B2; National Information Assurance Partnership (NIAP) Common Criteria (ISO 15408) minimum rating of EAL5
  • A "Reference Monitor" mediates attempts by a subject to gain access to an object. An access control list is maintained as well as a tamper-proof audit trail of security-related events
  • An authorization database serves as a repository of subject and object security attributes, including access modes and allowed operations.
  • The IQware application is layered on the secure O/S, using the Reference Monitor architecture to implement the security policy while providing full accountability, tracking and assurance. This design ensures that the combination of the application and O/S will operate in accordance with the Department of Defense Secure System standards.
  • An authorization database serves as a repository of subject and object security attributes, including access modes and allowed operations.
  • The IQware application is layered on the secure O/S, using the Reference Monitor architecture to implement the security policy while providing full accountability, tracking and assurance. This design ensures that the combination of the application and O/S will operate in accordance with the Department of Defense Secure System standards.
  • A "Reference Monitor" mediates attempts by a subject to gain access to an object. An access control list is maintained as well as a tamper-proof audit trail of security-related events.

What a secure system must do:

  1. Implement Policy
    • Security Policy - System must enforce a well-defined security policy.
    • Marking - System must associate all objects with access control labels (sensitivity & access modes).
  2. Ensure Accountability
    • Identification - System must identify individuals and their various authorizations in a secure manner.
    • Audit Trail - System must keep & protect audit trail so actions may be traced to responsible party.
  3. Deliver Assurance
    • Evaluation - System must have hardware/software mechanisms that can be independently evaluated to assure that policy & accountability are enforced.
    • Continuous Protection - System must continuously protect trusted mechanisms that enforce policy & accountability from tampering.

IQware's unique software provides the necessary security features:

  • Desktop virus-immunity
  • Interconnectivity and communication with existing and legacy systems
  • Rule-based design so that deployment can be altered and adapted real-time, on-the-fly as operational conditions change. This feature reduces deployment time considerably - which results in a huge cost reductions and immediate adaptation to a changing environment, as in the case of a natural or man-made disaster
  • Deploys on all desktop platforms, including Windows, Mac, Linux, Sun, etc., including emerging technologies
  • Deploys on emerging hand-held and wireless platforms, PDAs, etc.

IQware's intelligent software - what makes our DNA better?

  • RULE-BASED--Software's functionality can be changed on-the-fly without costly programming
  • INTEROPERABLE--Architecture ensures compatibility with, and adaptability to, emerging technologies
  • SECURE--Solves the ENTIRE security problem: All unauthorized data accesses are prevented
  • CENTRALLY MANAGED--Can provide context-sensitive, interactive, on-demand content delivery and data analysis
  • COOPERATIVE--Works WITH - not against - existing customer BI and IT systems

IQware's secure architecture

Raise the IQ of your software with IQware!

top