| CJIS

CJIS Compliance for Communications and Data Transfer

Encrypt and control Criminal Justice Information (CJI) transferred, stored and shared for CJIS compliance (Criminal Justice Information Services).

Enable CJIS Compliance in the Cloud with End-to-End Encryption

 

AWS, GCP, and Azure cloud-enabled on-demand access to CJI for state and local governments and agencies that maintain public safety when using native FIPS endpoints. The CJIS Security Policy sets security requirements for organizations accessing data, as well as guidelines to protect the transmission, storage, and creation of criminal justice information (CJI) such as fingerprints, identity history, case/incident history, and criminal history record information (CHRI).

CJI transmitted or at rest outside the boundary of the physically secure location, the data needs immediate protection via encryption that is FIPS 140-2 certified.

XQ’s data-centric, end-to-end encryption and granular access controls help you support remote government workers and distributed agency teams:

  • Protect CJI stored in or shared via email systems like Gmail and Outlook as well as stored in the cloud, such as in S3 buckets, from access by unauthorized users with AES-256 bit encryption, FIPS 140-2 compliant modules, and two-factor authentication.

  • Self-hosted encryption keys and policy server so you never have to trust anyone (including cloud providers) with access to your data.

  • Prevent human error by enabling automatic encryption for CJIS-protected data

  • Automatically encrypt all data transfers to the cloud or partner sites.

  • Revoke access and reprovision access controls at any time.

  • Enable data loss prevention (DLP) rules.

  • Inspect when and where messages, files, and other data have been accessed to complete detailed audits.

  • Use XQ Secure Share for protected file exchanges and collaboration.

  • Maintain Control and Access Visibility

    Enable secure communication and data transfer between primes, subcontractors, and mission partners by implementing CUI practices for Access Control, Audit, and Accountability. Revoke access immediately, set expiration, and reprovision on a per data object basis to maintain control of CUI.

    Audit who has accessed CUI, when, and where. Integrate event logs with your SIEM such as qRadar, Splunk, or SolarWinds for advanced threat intelligence or export for analysis.

  • Automatic CUI Protections with Data Loss Prevention (DLP)

    Automatically enforce encryption and access controls that persist throughout supply chain workflows, by configuring DLP rules that detect CUI data before it is sent.

  • Data Control

    Your data is most at risk after it leaves your possession. With XQ, you retain the ability to know what happens to your data, revoke access to it or reprovision it with granular access controls for Data Lifecycle Management.

  • On-Prem to Hybrid Cloud Data Transfer

    XQ Secure Gateway is the most secure, scalable, and simple to maintain offering for a completely auditable trail of your micro-segmented data wherever it travels. For the first time, connect GCP, AWS, and Azure seamlessly and compliantly for new powerful workflows.

    For the first time, GCP, AWS, and Azure can be connected seamlessly while maintaining compliance and allowing you to unlock new and powerful workflows.

  • Policy Access Controls

    Geo-restrict, revoke or expire or reprovision access to data. Add dynamic custom policy constraints. Implement DLP rules to automatically apply controls to any workflow containing CUI.

  • Meet NIST 800-171 Security Guidelines

    With an added layer of data-centric encryption, you can improve your security posture while aligning with NIST 800-171 security recommendations for protecting CUI. Use the NIST Cybersecurity Framework to reduce your organization’s security risks and meet compliance standards.

Schedule a demo