Using GuardWare Oversight's interface, a Prime can select files to be encrypted for its contractors, place limits on the usage of assets with the files. The Prime can also embed labels into the encrypted files to provide information of the assets to the end users. The Prime passes the contractors the encrypted files through any channel they like.
GuardWare Protect, installed within the contractor SMEs, allows authorised users to open encrypted files and access assets. GuardWare Protect enforces any limits on the usage of those assets. Reports on the location and usage of the assets to GuardWare Oversight server belong to the relevant Prime.
The Prime's GuardWare Oversight server receives the usage reports from its contracts and displays the information within a drill-down dashboard. GuardWare Oversight also performs behavioural analysis to identify and alert security personnel to potential usage outliers.
Below is a short description of how GuardWare Oversight and GuardWare Protect combine to ensure the security and integrity of sensitive assets within the many supply chains in the defense industry. Details on the validation of the assets and reports generated are omitted from this description.