Jericho Systems - EnterSpace® Decisioning Service

Introducing EnterSpace 9 Defense Grade Access Control with the “Precision of Labeling and Power of Segmentation”

Deployed by national security systems — now available for commercial enterprises.
EnterSpace 9 combines Attribute Based Access Control (ABAC) plus Data Labeling and Data Segmentation (DLDS®) for fine-grained access control to logical resources, including the ability to redact, mask, and anonymize sensitive pieces of information. Data Segmentation has become a crucial piece within the network enterprise, as it enables defense in depth for data at rest and data in motion across security domains. Jericho’s DLDS capability leverages both existing and “next-generation” IT infrastructures. It also maintains administrative autonomy and data security for the organization’s enterprise, while meeting compliance needs. EnterSpace 9 provides the following benefits:
  • Data-level security services to support robust information sharing between the law enforcement organization and its partners
  • Intelligence and information sharing while preserving individual privacy and civil liberties
  • Standardize information assurance architectures and data processes that support secure information sharing

Business ROI exclusively from EnterSpace 9:
  1. Offers fine-grained access control enforcement using policies with rules that leverage evaluation context attributes (Subject, Resource, Action & Environmental)
  2. Helps overcome Role Explosion issues that are usually prevalent with RBAC implementations by replacing role names with actual policies that capture the intended rules behind the need for that role
  3. Benefits include using centrally managed access control policies across the organization instead of having access control silos
  4. All policies are expressed in a standard policy language (XACML 3.0/2.0). XACML allows policies that can be expressed using rules that can be used to meet simple or complex access control requirements
  5. Meet compliance requirements with the ability to inspect all evaluation context attributes that were available for access control decisions in the generated AUDIT
  6. Cost saving by dynamically applying and testing new access control policies with immediate effect as opposed to requiring application code changes (SDLC cost)

Eliminate data leakage Enforce Compliance Protect Your Brand
  • Ease of Use
  • Automates time-intensive Manual Processes
  • Increases Efficiency of IT Systems
  • Reduces IT Overhead
  • Ensures Interoperability through use of Standards
  • Mitigates liability for Improper Handling

Learn More
White Papers and Data Sheets »
Watch the video »