Home / News / Andy Ozment: DHS Adds Netflow Analysis Offering to Cyber Info-Sharing Program

Andy Ozment: DHS Adds Netflow Analysis Offering to Cyber Info-Sharing Program

cybersecurityThe Department of Homeland Security has authorized four companies to offer a network analysis service to their commercial and government clients as part of DHS’ Enhanced Cybersecurity Services voluntary information-sharing program.

The NetFlow Analysis tool will work to help AT&T, CenturyLink, Lockheed Martin and Verizon identify and examine malicious activity in enterprise computer systems, Andy Ozment, DHS assistant secretary for cybersecurity and communications, wrote in a blog article published Jan. 26.

He said DHS-accredited commercial services providers use sensitive or classified threat information from the ECS program to prevent unauthorized access and data transfer to their clients’ networks.

CSPs also offer domain name service sinkholing and email filtering services through the program.

An updated ECS Privacy Impact Assessment document from the department’s privacy office says the network analysis platform is not meant to collect, store or use personally identifiable information, Ozment added.

Nextgov’s Aliya Sternstein reported Monday the DHS may provide anonymized cybersecurity metrics information to the National Institute for Standards and Technology, FBI and National Security Agency for program evaluation purposes.

Some civil liberties advocacy groups said the department’s new privacy impact assessment report contains a loophole for agencies such as NSA to monitor Internet users, Sternstein writes.

Check Also

USCIS Launching System Modernization, Supply Chain Security Initiatives

The U.S. Citizenship and Immigration Services is working on modernizing its systems and fortifying software security at the supply chain level, Federal Times reported Friday. Adrian Monza, chief of the Department of Homeland Security component's cyber defense branch, told the publication that USCIS is launching “very significant” modernization efforts and that other agencies must be able to defend their networks against threats to financial databases.

Leave a Reply

Your email address will not be published. Required fields are marked *