Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Trusted Information Systems

From Wikipedia, the free encyclopedia
(Redirected fromNetwork Associates Laboratories)
Computer security research and development company
Trusted Information Systems, Inc.
Company typePublic (Former Nasdaq symbol:TISX)
IndustryComputer software
Computer security
Founded1983; 43 years ago (1983)
FounderStephen T. Walker
FateAcquired byMcAfee, later by SPARTA, Inc., which was acquired by Cobham, plc
SuccessorMcAfee
HeadquartersGlenwood,Maryland, U.S.
Area served
Worldwide
ProductsFirewall Software,IPSec VPN, Trusted OS

Trusted Information Systems, Inc. (TIS), was a computer security research and development company during the 1980s and 1990s, performing computer and communications (information) security research for organizations such asNSA,DARPA,ARL,AFRL,SPAWAR, and others.

History

[edit]

TIS was founded in 1983 byNSA veteran Steve Walker,[1] and at various times employed notableinformation security experts includingDavid Elliott Bell, Martha Branstad,John Pescatore, Marv Schaefer,[2]Steve Crocker,Marcus Ranum, Wei Xu, John Williams,Steve Lipner andCarl Ellison. TIS was headquartered in Glenwood, Maryland, in a rural location. The company was started in Walker's basement on Shady Lane in Glenwood, MD. As the company grew, rather than move toBaltimore or theWashington D.C. suburbs, a small office building was constructed on land next to Walker's new home on Route 97.

Products

[edit]

TIS projects included the following:

  1. Trusted Xenix, the first commercially availableB2operating system
  2. TrustedMach, a research project that influenced DTOS and eventuallySELinux[3]
  3. Domain and Type Enforcement (DTE) which likewise influenced SELinux
  4. FWTK Firewall Toolkit (the first open source firewall software) in 1993
  5. First whitehouse.gov e-mail server was hosted at TIS headquarters from June 1 of 1993 to January 20 of 1995
  6. Gauntlet Firewall in 1994, one of the first commercial firewall products, with broad range of Internet Standards, includingS/MIME,SNMP,DNS,DNSSEC, and many others. This Firewall became the inception of the third generation firewall.
  7. IP Security (IPSec) product in late 1994, known as the first IPSec VPN commercial product in IT history
  8. Encryption Recovery technology integrated withIPSEC,ISAKMP,IKE, andRSA

TIS's operating system work directly affectedBSD/OS, which theGauntlet Firewall andIPSec was based on, as well asLinux,FreeBSD,HP UX,Sun OS,Darwin, and others.

Post company

[edit]
icon
This sectionneeds additional citations forverification. Please helpimprove this article byadding citations to reliable sources in this section. Unsourced material may be challenged and removed.(May 2024) (Learn how and when to remove this message)

The company went public in 1996[4]and soon afterwards attempted to acquirePGP Inc.; it was instead acquired in 1998 byNetwork Associates (NAI), which later becameMcAfee, who had already bought PGP Inc. in 1997. The security research organization became NAI Labs and the Gauntlet engineering and development organization was folded into Network Associates' engineering and development.

NAI Labs went through a couple of branding changes which complemented Network Associates' branding efforts. In 2001 the name was changed to Network Associates Laboratories to better match the corporate identity. Then, in 2002-2003, there was a major branding initiative by Network Associates culminating in selection of the flag brand, McAfee. As a result, the security research organization became McAfee Research.

In 2003, SPARTA, Inc., an employee-owned company, acquired the Network Security branch of McAfee Research.

In 2005, SPARTA acquired the remaining branches of McAfee Research, which were organized into the Security Research Division (SRD) of the Information Systems Security Operation (ISSO).

In 2008, Cobham, plc, a British aerospace company, acquired SPARTA. There have been no organizational changes to SRD or ISSO that affect the security research.

On a separate path, TIS's primary commercial product, the Gauntlet Firewall, was acquired in 2002 from McAfee bySecure Computing Corporation (SCC), that used to be one of TIS's major competitors, because at the time McAfee wasn't interested in being a firewall vendor.The code base was integrated with Secure Computing's firewall product and branded Sidewinder Firewall, which then returned to McAfee when Secure Computing was acquired by them in 2008, and re-branded McAfee Enterprise Firewall. The end of this product line came in 2013, following McAfee's acquisition of another major firewall vendor, Finland-basedStonesoft. McAfee announced in October 2013 the intention to migrate their existing installed base of firewalls to Stonesoft's own Stonegate.

References

[edit]
  1. ^Stephen Walker, Oral history interview, 8 November 2012.Charles Babbage Institute, University of Minnesota
  2. ^Schaefer, Marvin (2013-11-20)."Oral history interview with Marvin Schaefer".University Digital Conservancy.
  3. ^Anthes, Gary H. (14 May 1990)."Move over, Unix: Here comes Mach!".Computerworld. pp. 97–98. Retrieved15 April 2024.
  4. ^"Trusted Information Systems Initial Public Offering". encyclopedia.com. 1996-08-30. Retrieved2010-04-11.

External links

[edit]
International
National
Retrieved from "https://en.wikipedia.org/w/index.php?title=Trusted_Information_Systems&oldid=1328941073"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp