Plan X: DARPA's Revolutionary Cyber Security Platform - InformationWeek
Government // Cybersecurity
07:00 AM
Joe Stanganelli
Joe Stanganelli
Connect Directly

Plan X: DARPA's Revolutionary Cyber Security Platform

DARPA's Plan X aims to make active cyber defense more accessible to the masses through agility, training, and intuitive interfaces.
1 of 6

(Image: DARPA)
(Image: DARPA)

Back on February 26, much of the Internet was burying itself in the thoroughly predictable pomp and circumstance of the FCC's live-streamed net neutrality vote. On the same day, another event -- quieter and less political -- related to the future of the Internet was live-streamed from Washington courtesy of the Christian Science Monitor.

The event, titled The Future of Cybersecurity Innovation, featured nearly two hours of talks on the best cyber security practices, both present and future. Headlining the event was the first public unveiling of Plan X -- a network security platform at least three years in the making, courtesy of the Defense Advanced Research Projects Agency (DARPA). Originally announced in May 2012 (and later outlined more thoroughly in October of that year), Plan X is the first DARPA project of its kind -- developed to enable Department of Defense (DoD) cyber missions in real-time. DARPA anticipates that some form of the program will eventually be made publicly available for both businesses and consumers. DARPA has already contributed portions of it to open source projects.

During the February event, program manager Frank Pound participated in a live interview. He demonstrated the third and current prototype of Plan X (completed in October) on a large touch-screen monitor and answered audience questions on its real-world future applications. Pound reports that the fourth Plan X prototype is due this month. Those applications included actual cyber warfare deployment in a realistic scenario, as well as everyday network management in both the home and the office.

Although Plan X has been described as in its nascent stages, it is already showing tremendous promise for the future of information security, the future of cyber defense, and the future of the Internet by making cyber security more accessible. The following slides offer an overview of some of the neatest accessibility features of DARPA's Plan X as publicly outlined thus far.

These features, in turn, have stimulated our curiosity at InformationWeek, and we want to know what you think. What features of Plan X do you see potentially helping your organization's network security efforts? Can you see yourself managing an offshoot to keep track of the security of your own home network? Does the potential for network immersion that Plan X offers excite you or frighten you? Let us know your thoughts and reactions in the comments section below.

Joe Stanganelli is founder and principal of Beacon Hill Law, a Boston-based general practice law firm. His expertise on legal topics has been sought for several major publications, including US News and World Report and Personal Real Estate Investor Magazine. Joe is also ... View Full Bio

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
1 of 6
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Ninja
4/27/2015 | 8:54:02 AM
Re: Dispelling the Myth of Difficulty is key

I knew I could always count on you to say something so basic,so true ,so Simply!

Simply Brilliant,Brilliant stuff!

What I would also like to add here is that with the Increasing amount of automation happening today in the IT-Security stuff;you don't really need Hard-core Super-trained Security Ninjas to run IT Security Shops enterprise-wide.

Sure its always good to have extra skills on board but the Companies/Organizations which provide most of these Security Tools have very-very good Customer Service Reps(who are all very well-versed in the art of Security today).

So if a Company has employees who may/may not be at cutting-edge its perfectly allright today;they can still manage comfortably.

On the other side,I also buy the Assertion(not entirely though) that a large part of the increased Security Awareness/Fear is just the result of more Connectivity (and/or media scaremongering) on part of Security Providers???

Good Post!


User Rank: Strategist
4/21/2015 | 8:30:30 AM
Dispelling the Myth of Difficulty is key
I read way too many essays which claim encryption, or authentication -- is too complex for ordinary people

eau contraire!

I could teach most folks familiar with eMail to use PGP or GnuPG via Thunderbird's plug-in ENIGMAIL is an hour or so.  

the take-away from this note is simple:   as soon as we have better packaging for this technology ( PGP; GnuPG ) everyday computer users will be able to make advantage of it in most everything they do

PGP/GnuPG provides real authentication, integrity, and security: when you need it.

authentication : proving your signature on a digital document

intergity : proving the validity of a digital document

security : restricting the content of a digital document to authorized personel

The Staying Power of Legacy Systems
Mary E. Shacklett, Mary E. Shacklett,  4/15/2019
Q&A: Red Hat's Robert Kratky Discusses Essentials of Docs
Joao-Pierre S. Ruth, Senior Writer,  4/15/2019
How Cloud Shifts Security Balance of Power to the Good Guys
Guest Commentary, Guest Commentary,  4/11/2019
White Papers
Register for InformationWeek Newsletters
Current Issue
A New World of IT Management in 2019
This IT Trend Report highlights how several years of developments in technology and business strategies have led to a subsequent wave of changes in the role of an IT organization, how CIOs and other IT leaders approach management, in addition to the jobs of many IT professionals up and down the org chart.
Flash Poll