Type | Private |
---|---|
Industry | Computer security |
Founded | 1989 U.K. | (as X-Tel Services Limited)
Founder | Hugh Smith, Graeme Lunt, Julian Onions |
Headquarters | Nottingham, England |
Key people | Stephen Kingan (CEO) |
Products | Nexor Sentinel, Nexor Guardian, Nexor Merlin, Nexor Data Diode, Nexor Border Gateway, MMHS |
Services | CyberShield Secure |
Owner | Stephen Kingan |
Website | www |
Nexor Limited is a privately held company based in Nottingham, providing products and services to safeguard government, defence and critical national infrastructure computer systems. It was originally known as X-Tel Services Limited.
Nexor Limited [1] was founded in 1989 as X-Tel Services Limited out of the University of Nottingham and UCL, following research into X.400 and X.500 systems for the ISODE project. In 1992 Stephen Kingan joined the business as CEO. [2] In 1993 X-Tel Services Limited was renamed Nexor Limited. In 1996 3i invested in the business to launch Nexor Inc. In 2004 Kingan and Nigel Fasey acquired the business. In 2008 Colin Robbins was appointed to the board as CTO. In 2012 Kingan acquired 100% ownership of Nexor. In October 2013, the company moved its headquarters from Nottingham Science Park to the NG2 Business Park. [3]
Nexor customers include NATO, [4] [5] European Defence Agency, [6] [7] UK MoD, [8] [9] US DOD, [10] Canadian DND, [11] Foreign and Commonwealth Office [12] and Met Office. [13] [14] Nexor designed and deployed the first public Internet search engine ALIWEB and the associated robots exclusion standard. Nexor is a contributor to the Internet Engineering Task Force, having worked on Internet RFCs 1086, [15] 1165, [16] 1488, [17] 1606 [18] and 1778. [19] Nexor developed a Microsoft Exchange Client for Unix. [20] Nexor was the first organisation to be awarded the Intellect Best Practice Certificate. [21] Nexor has run regular demonstrations at the Coalition Warrior Interoperability Demonstration. [22] [23] Nexor was the first organisation to achieve TickItPlus [24] a quality-management certification program for software development. Nexor has strategic partnerships with Boldon James [25] and QinetiQ. [26] Nexor's Data Diode product is supplied via an OEM relationship with Fox-IT. Nexor is a supplier of the UK Government G-Cloud Cloudstore, [27] and an Official cyber security supplier to the UK Government. [28] Nexor won 2013 DSEi innovation challenge. [29]
Nexor is a contributor to Cyber Champions a community initiative to promote best practices in digital literacy and online safety awareness to schools, youth organisations and interest groups across the UK. [30] Nexor sponsors the Cyber Security Challenge designed to promote careers in cyber security. [31] Nexor was in the first batch of companies to achieve the UK’s Cyber Essential standard [32] and a contributor and industry launch partner to the PAS754 software development standard led by the Trustworthy Software Initiative. In 2015 Nexor launched a consulting arm - Qonex [33] [34] [35] [36]
Nexor is primarily focused on Secure Information Exchange for defence, governments and critical infrastructure.
Products and services include:
Several Nexor products have been evaluated under the Common Criteria scheme to obtain independent verification of their claimed functionality, including:
Nexor has been a contributor on the following collaborative research and development projects:
Paradise (1989-2002) (Piloting aResearch Directory in an OSI Environment) was part of the ESPRIT COSINE [41] project to establish a pan-European computer-based network infrastructure that enabled research workers to communicate with each other using OSI. It was later prefixed NameFlow-Paradise. [42] Paradise implemented a distributed X.500 systems, across over 700 DSAs in over 30 countries. The project is documented in the NameFLOW archive [43] Quipu was the major X.500 implementation used in Paradise. Implementations also came from Inria [44] led by Christian Huitema and Siemens DirX, [45] originating from the Thorn [46] project, implementing the ECMA TR32 [47] standard. David Goodman [48] was the project manager.
MAITS (Multilingual Application Interface for Telematic Services [49] ) developed multilingual interfaces for X.400 and X.500 on top of Paradise.
Password [50] [51] [52] (1993-1995) (Piloting aSecure Service Within OSI R&D) was a European Community-sponsored VALUE program, [53] comprising consortia from France (Inria), Germany (GMD Darmstadt) and the UK (UCL and Nexor), to establish a pilot security infrastructure for network applications for the European research community. The consortium developed secured applications based on X.509, including the OSISEC PKI. The primary application was PEM, a forerunner of S/MIME and SEEOTI. Goodman of UCL was the project manager, and Joerg Reichelt [54] was the Nexor lead engineer.
Eurocoop (1991-1992) [55] (Esprit III Project 5303) [56] and the follow on project Eurocode (1992-1995) [57] (Esprit III Project 6155) [56] aimed to develop powerful and effective systems for supporting distributed collaborative work. Partners included Aarhus University, GMD Darmstadt, Rank Xerox and ICL. The approach adopted was to integrate components from a number of existing systems and to develop new collaborative tools based on the study of a large-scale technical application that encompasses many collaboration problems. Single components tools were developed that can be integrated with existing tools and that are able to interoperate with each other. ICW [58] was a closely related DTI funded project. Pippa Hennessy [59] was the Nexor project manager.
Regis [60] [61] (1995–1998) was a collaborative project with Diamond Cable Communications and University of Sheffield to investigate problems inherent in providing regional business communities with low-cost, high-speed access to local information services. Robbins was the Nexor project manager.
The EU ACTS Project Renaissance [60] [62] [63] (1995–97) was led by Fretwell Downing to develop a virtual vocational training environment, with the University of Sheffield, Diamond Cable Communications and Yorkshire Cable and delivered to the UK National Centre for Popular Music. Harold Combs [64] was the Nexor project manager.
The iGRC [65] project (2010-2012), was a collaborative project with HP, Assuria, Infogov, Cranfield University, Loughborough University and Birkbeck, University of London to automate threat level and control status changes for real-time management of the complexity, risk and resilience of secure information infrastructure.
CloudFilter [66] [67] (2012–13) was an EPSRC collaborative project with Imperial College to explore novel methods for exercising control over sensitive data propagation across multiple cloud providers.
A project led by 2iC to deliver a proof-of-concept demonstration for a Cross Domain Tactical Service Bus, [68] winning the DSEI Innovation Award 2013. [69]
Project with De Montfort University to research, develop and implement the use of hardware, as a robust alternative to software in high assurance network security devices. [70]
The Defence Science and Technology Laboratory (Dstl) on behalf of the UK Ministry of Defence established a programme to realise the potential benefits from novel technology to front line forces. A consortium, led by QinetiQ (called Sirius, comprising over 40 organisations) provides the experience and research capability for CSIIS. [71] In September 2014, Nexor won the best research poster at the Annual Symposium of the UK Information Assurance Advisory Council (IAAC) based on CSIIS work. [72]
An innovate UK funded consortium to lead R&D in connected and autonomous CAVs on-road implementation, in which Nexor provided cyber security services. [73]
Many Nexor employees (current and former) have made notable contributions to the Internet or business community, including:
Computer security, cybersecurity, or information technology security is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.
European Strategic Programme on Research in Information Technology (ESPRIT) was a series of integrated programmes of information technology research and development projects and industrial technology transfer measures. It was a European Union initiative managed by the Directorate General for Industry of the European Commission.
The Internet protocol suite, commonly known as TCP/IP, is a framework for organizing the set of communication protocols used in the Internet and similar computer networks according to functional criteria. The foundational protocols in the suite are the Transmission Control Protocol (TCP), the User Datagram Protocol (UDP), and the Internet Protocol (IP). Early versions of this networking model were known as the Department of Defense (DoD) model because the research and development were funded by the United States Department of Defense through DARPA.
The Open Systems Interconnection model is a conceptual model that 'provides a common basis for the coordination of [ISO] standards development for the purpose of systems interconnection'. In the OSI reference model, the communications between a computing system are split into seven different abstraction layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable applications are remote login and command-line execution.
A virtual private network (VPN) is a mechanism for creating a secure connection between a computing device and a computer network, or between two networks, using an insecure communication medium such as the public Internet.
The Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. In operation since before 1985, NTP is one of the oldest Internet protocols in current use. NTP was designed by David L. Mills of the University of Delaware.
An application layer is an abstraction layer that specifies the shared communications protocols and interface methods used by hosts in a communications network. An application layer abstraction is specified in both the Internet Protocol Suite (TCP/IP) and the OSI model. Although both models use the same term for their respective highest-level layer, the detailed definitions and purposes are different.
Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in securing HTTPS remains the most publicly visible.
QinetiQ is a multinational defence technology company headquartered in Farnborough, Hampshire. It operates primarily in the defence, security and critical national infrastructure markets and run testing and evaluation capabilities for air, land, sea and target systems.
In computing, security-evaluated operating systems have achieved certification from an external security-auditing organization, the most popular evaluations are Common Criteria (CC) and FIPS 140-2.
The ISODE software, more formally the ISO Development Environment, was an implementation of the OSI upper layer protocols, from transport layer to application layer, which was used in the Internet research community to experiment with implementation and deployment of OSI during the late 1980s and early 1990s.
The Department of the Air Force Office of Special Investigations (OSI) is a U.S. federal law enforcement agency that reports directly to the Secretary of the Air Force. OSI is also a U.S. Air Force field operating agency under the administrative guidance and oversight of the Inspector General of the Department of the Air Force. By federal statute, OSI provides independent criminal investigative, counterintelligence and protective service operations worldwide and outside of the traditional military chain of command. Proactively, OSI identifies, investigates, and neutralizes serious criminal, terrorist, and espionage threats to personnel and resources of the Air Force, Space Force, and the U.S. Department of Defense, thereby protecting the national security of the United States.
Datagram Transport Layer Security (DTLS) is a communications protocol providing security to datagram-based applications by allowing them to communicate in a way designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the stream-oriented Transport Layer Security (TLS) protocol and is intended to provide similar security guarantees. The DTLS protocol datagram preserves the semantics of the underlying transport—the application does not suffer from the delays associated with stream protocols, but because it uses UDP or SCTP, the application has to deal with packet reordering, loss of datagram and data larger than the size of a datagram network packet. Because DTLS uses UDP or SCTP rather than TCP, it avoids the "TCP meltdown problem", when being used to create a VPN tunnel.
Safelayer Secure Communications S.A. is a Spanish private company founded in May 1999. It develops software products on the public key infrastructure area. Safelayer's technology is part of the three major certification and digital identity projects in Spain: Fábrica Nacional de Moneda y Timbre, the Spanish ID card DNI electrónico and the Spanish E-passport. Safelayer's technology also secures the NATO X400 messaging system.
Rapiscan Systems is an American privately held company that specialises in walk-through metal detectors and X-ray machines for screening airport luggage and cargo. The company is owned by OSI Systems.
Colin Robbins is a network protocol and software engineer credited for research work in distributed directory systems and a co-inventor of LDAP. Educated at Alleyn's School, he holds a BSc, Computer Science & Electronic Engineering, with first class honours, from University College London.
The cyber security community in the United Kingdom is diverse, with many stakeholders groups contributing to support the UK Cyber Security Strategy. The following is a list of some of these stakeholders.
SWIPSY was a firewall toolkit produced by the Defence Evaluation and Research Agency in the UK. The SWIPSY toolkit was an ITSEC E3 evaluated product that allowed additional code to be added to its security ‘compartments’ without affecting the evaluation status of the toolkit itself.
A long-running debate in computer science known as the Protocol Wars occurred from the 1970s to the 1990s when engineers, organizations and nations became polarized over the issue of which communication protocol would result in the best and most robust computer networks. This culminated in the Internet–OSI Standards War in the late 1980s and early 1990s, which was ultimately "won" by the Internet protocol suite ("TCP/IP") by the mid-1990s and has since resulted in most other protocols disappearing.