acm-header
Sign In

Communications of the ACM

ACM News

Playing It Safe With Two Networks


View as: Print Mobile App Share:
Cryptography Research founder and president Paul Kocher

Cryptography Research's Paul Kocher views the two monitors on his A network computer where sensitive work is done. To his right are his laptop and a separate monitor for that computer, which is only used on the Internet-connected B network.

Credit: James Martin / CNet

There are two separate computer networks, two different systems on every employee's desk and twice the normal number of servers storing data at Cryptography Research.

To keep hackers out of the network the company runs disparate and unconnected networks—an A network for sensitive data and core engineering work that is not connected to the Internet, and a B network used for e-mail, Web surfing and other Internet activities.

"We built the networks out at least 10 years ago as soon as we started getting really sensitive client data," says Paul Kocher, founder and president of Cryptography Research. "We had to decide whether to secure the infrastructure that was connected to the outside, or to build a parallel system. We have been repeatedly thankful we did what we did and have never looked back."

 From CNet
View Full Article
 


 

No entries found

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account