Meeting the Information Needs of Aviation

For more information please contact:

Copyright © 2008-2016 Air Informatics® LLC

Connected e-Enabled airplanes and IT networked systems and have thrust the aviation industry into an age of great opportunity and great peril. The airplane is now a node on the network. New threats have emerged that impact flight operations and business reputation in previously unimaginable ways. Threats no longer require a physical presence at the airplane or airport. Air Informatics® LLC provides the most robust resources and tools to cost effectively minimize e-Enabled aircraft, network, information and air worthiness risks.

e-Enabled Information Security Risk Assessment

Threats target both the e-Enabled airplane and its operations as well as the business reputation and profitability of the airline. Air Informatics® LLC protect the airplane from all manner of threats including:

  1. Accidental modification, changes and flaws

  2. Open source code and operating system flaws

  3. Network distributed viruses, malware and malicious code

  4. Individuals and groups intent on industrial espionage

  5. Individuals intending to prove their technical prowess in a public way

  6. Criminals with an intent to defraud

  7. Anarchitists and terrorist

The Air Informatics® LLC e-Enabled Cloud®, e-Enabled Informatics®, e-Enabled PKI®, and e-Enabled Security® architecture is designed as a cost effective solution to minimize your investment and operational cost while maximizing your protection.

To reduce your costs, we provide:

  1. An industry wide solution

  2. International scope and service

  3. Centralized security control administration and management

  4. A consolidated infrastructure for an effective response

  5. The best practices in the industry

  6. Implementation assurance

  7. Consistent controls selection

  8. Support across heterogeneous aircraft and onboard systems

  9. Support for multiple manufacturers

  10. A trusted path between the airplane and the airline

Our centralized solution supports different:

  1. National and international laws

  2. Export, intercept, privacy, and airworthiness regulations

We provide a robust Defense-in-Depth, providing multiple solutions, multi-layered e-Enabled Security® technologies and services, including:

  1. Cryptographic and non-cryptographic, application and transportation layer

  2. Effective Digital Certificate and PKI issue, distribution, storage, management and approved access

  3. Redundancy, back up and proactive account management

  4. Scheduled updates, enhancements, periodic and reactive maintenance

  5. Identity and access management

  6. Full tracking, recording, auditing, security verification and validation

  7. Port, MAC and IP address persistence tracking, uploaded, downloaded checks to assure sender and receiver authenticity

  8. Incident response administration

  9. Rapid delivery and application of update and patches for identified software flaws and newly discovered vulnerabilities