IPv6, The Pathway to Improved IT & IoT Security.
|
|
- Hester Robertson
- 6 years ago
- Views:
Transcription
1 IPv6, The Pathway to Improved IT & IoT Security
2 AGENDA IPv6 is now a Business Decision! New Security Features SOC s & Sensors Next Steps
3 I LIKE A GOOD IPV6 FICTION Running IPv4 & IPv6 in parallel increases CAPEX/OPEX 2x Deployment will take years My gear does not support IPv6 My Customers & Partners don t use or want IPv6 IPv6 is slower because of the larger header We don t need that many addresses IPv6 is just a fad waiting till IPv9 Many, Many more Source:
4 IPV6 BUSINESS CASE Decrease OPEX/CAPEX, Increase Competiveness & Agility
5 THE BUSINESS REALITY OPEX/CAPX : WELLS FARGO Greater space for growth Reduced requirement for readdressing duplicate address space in mergers/ acquisitions Support for low-functionality end-points that may lack DHCP and static addressing capabilities (IoT, even Android devices) Reduce reliance on NAT (and associated logging complexity) More universally geo-locate address space (assuming ULA usage is reduced compared to RFC1918) Simplification of routing tables through improved summarization International Commerce
6 THE BUSINESS REALITY OPEX/CAPX : MICROSOFT Improved peer-to-peer networking for communications Personalized user experience using IP-based location services We see minor performance benefits as address translators are removed and implementations are improved NAT64 & NAT 444 (CGN) obscure location data, and cause service failures Market opportunities increase when customers mandate IPv6 support IPv6 allows faster infrastructure growth for services experiencing rapid customer usage Microsoft corporate IT efforts are based on a belief that IPv6 support is a cost of business, with returns on investment to be seen only over a very long time frame.
7 THE BUSINESS REALITY OPEX/CAPX : FACEBOOK Easier management of networks: Flatter, simpler, and more manageable. End-to-end connectivity integrity: Direct addressing is possible, due to vast address space Shortest path, no additional latency (middle boxes). Improved User Experience & Higher Engagement: One address per user (or household), no additional latency (10-15% faster). Improved interoperability and mobility capabilities (which are already widely embedded in network devices) Reference:
8 THE BUSINESS REALITY OPEX/CAPX : COMCAST Reduce costs based on depleted IPv4 addresses USD 9.50/IPv4 address (In Bulk) USD 35.00/IPv4 address in cloud Reduce operational complexity One IPv6 address per user/household Increase service offerings and become more competitive IoT wireless and analytics
9 THE BUSINESS REALITY OPEX/CAPX : LINKEDIN Better Use Experience 10% to 40% faster mobile (LTE) users applications NOTE: Just purchased by Microsoft Reference:
10 OUT WITH THE OLD THE BUSINESS REALITY OPEX/CAPX : IPV4 END OF LIFE
11 IN WITH THE NEW IMPACT ON COMPETITION THE BUSINESS REALITY OPEX/CAPX : IPV6 ONLY Wireless: High Bandwidth 4G LTE NG Wireless & 5G Wireless Low Bandwidth Low Power Cognitive radio (TV Whitespace) & IoT Networks (LoRaWan) IoT & IoTT (Internet of Trusted Things) 6LowPan (IPv6 for low power systems) Car-toCar/Car-to-Infrastructure Communications Many New Wireless networks already exist Cellular infrastructure does not exist Many international smart cites, smart buildings, smart transportation system
12 DID I MENTION THE US GROWTH? Reference:
13 DID I MENTION THE WORLD GROWTH? Reference:
14 EVERYONE IS DOING IPV6! Capable Prefered ~ Users Americas 18.55% 17.22% 114,465,082 Europe 13.04% 12.53% 92,278,761 Oceania 7.44% 6.72% 4,652,665 Asia 5.01% 3.96% 308,201,990 Africa 0.25% 0.24% 60,420,617 Reference:
15 SUMMARY IPV6 IS NOW A BUSINESS DISCUSSION NOT A TECHNICAL DISCUSSION! RISK AND CYBER SECURITY HEADACHE IF NOT MANAGED!
16 NEW SECURITY FEATURES INCREASE THE COSTS TO THE ATTACKERS! REDUCE COSTS TO DEFENDERS!
17 IPV6 HELPS REMOVE THE SCARS 1. Re-Architect for better Operations & Security! 2. Justifications to perform the SANS Top 20 Inventory of Authorized and Unauthorized Devices Inventory of Authorized and Unauthorized Software Secure Configurations for Hardware and Software Continuous Vulnerability Assessment and Remediation 3. Justifies removing devices which do not support IPv6 4. Update existing products which do support IPv6 Security Engineering for New Infrastructure
18 LAW OF SMALL VS. LARGE NUMBER 45 Min Scan all Internet IP s (no DNS) 500,000+ Years /24 < 1 Min Scan smallest range (no DNS) /64 < 500 Years /24 < 1 Min Reverse DNS Scan /64 < 500 Years Simplifies identification of Bots, C&C, active attacks
19 NAT VS. END-TO-END PRINCIPLE IPv4 Overlapping Addresses Anyone can insert a NAT Router Anyone can connect end-device Requires renumbering Static or DHCP NAT disassociates trust IPv6 Unique Addresses Quickly identify routers Quickly identify end-devices Auto-numbering feature if required Auto-configuration and/or DHCP Restore end-to-end Trust Unique Addresses speed internal identification of badne
20 SINGLE ADDRESS VS. MULTIPLE ADDRESSES IPv4 One address for all services (Default) On Link Across the enterprise Mapped across the Internet IPv6 Multiple addresses (Default) On Link (FE80:: ) Across Enterprise (ULA) Internet (Global inbound connection) Internet (Privacy Addresses) Different services different addresses Management and Monitoring API s & Webservers Patching & Backup Address provides simplified security policies
21 LAW OF SMALL VS. BIG ADDRESSES IPv4 No Geo-location context No Network context No rack context IPv6 Map to Physical location Network location VLan Rack Overlay network Wireless, wired & data centers Application Address provides Internal context
22 NAT STATEFULNESS IMPACTS POWER IPv4 Hosts 1 Application 1 or more connections per application Keep alive for each IPv6 Hosts 1 Application 1 or more connection per application No Keep Alive needed Each Firewall/Routers with NAT Firewall/Router M-1 hosts with M-1 Hosts N-1 applications N-1 applications P-1 connections per application P-1 connections per application Maintain State for 1 to 15 min. Maintain state based on connection queues 3-14% power reduction and battery savings
23 SUMMARY INCREASING THE COSTS TO THE ATTACKERS! REDUCE COST TO DEFENDERS!
24 SOC S & SENSORS Things to Think About Today
25 NETWORK SENSOR Dependencies & Challenges Capable of detecting and processing all variations of any protocol Black lists & white lists Blocking Constraint Logging Management via IPv6 Research is OLD Opportunity Topology Hiding (Link Local)
26 NETWORK BLOCKING Dependencies & Challenges Capable of detecting and processing all variations of any protocol Black lists & white lists Blocking Constraint Logging Management via IPv6 Research is OLD Opportunity Topology Hiding (Link Local)
27 NETWORK HOST Dependencies & Challenges Choice of Address Assignment & Management Choices of Name Resolution & Management Addressing IP/MAC vs. DHCP Unique Identifier (DUID) Multiple Addresses Docker/VM <- Great BYOD/Devices moving on your network <-Track? VPN Problem IPv4 only vs. IPv6 only vs. IPv4/IPv6 IPv6 only network to IPv4 NAT64/DNS64
28 SEIM/ANALYTIC Dependencies & Challenges Processing IPv6 Addresses Geolocation Carrier Grade Nat (CGN) Lack of matching IPv4 with IPv6 devices/attacks Management via IPv6
29 AUDIT/ASSESSMENT/PEN TESTING (COMPLIANCE) Dependencies & Challenges Audit Processes & Tools Assessment Processing & Tools Pen testing Do you meet compliance if you have not testing IPv6? Security controls IPv4!= IPv6
30 SOC S & SENSORS Things to Think About Today
31 NEXT STEPS Disrupt6 Research?
32 ADVANCED SECURITY IPV6 FEATURES INDICATORS OF INTENT (IOI)
33 TRACKING THROUGH CYBERSPACE & TIME
34 ATTRIBUTION THROUGH TOR
35 A VISIT FROM ANONYMOUS
36 IPV4 & IPV6 DECOYS
37 ATTACKER & BROKER ATTRIBUTION RESULTS Privacy vs. Attribution: Provide Privacy to Users Deny Privacy and Attribute Attacker, Bots & Brokers Additional Findings: Statistical validation of attacker which reduced dependency on IP addresses Better Geo-location Statistical validation of other attributed including: Browser type, Networks, Operating Systems, Tunnels, VPN s, TOR, etc. Identified Data Brokers which scan and provide ($) vulnerability to others
38 AGENDA IPv6 is now a Business Decision and a Security Headache! New Security Features SOC s & Sensors Next Steps
39 IPv6, The Pathway to Improved IT & IoT Security
Business and Security Justification For IPv6 Only IoT Networks.
Business and Security Justification For IPv6 Only IoT Networks www.disrupt6.com @JoeKlein Joe.Klein@Disrupt6.com IPV6 BUSINESS CASE Decrease OPEX/CAPEX, Increase Competiveness & Agility The business reality
More informationIPv6 Implementation Best Practices For Service Providers
IPv6 Implementation Best Practices For Service Providers Brandon Ross Chief Network Architect and CEO 2013 Utilities Telecom Council Network Utility Force www.netuf.net @NetUF RFC 6540 - IPv6 Support Required
More informationENTERPRISE SECURITY MANAGEMENT. Frederick Verduyckt 20 September 2012
ENTERPRISE SECURITY MANAGEMENT Frederick Verduyckt 20 September 2012 SETTING THE AGENDA FOR THE NEXT DECADE JUNIPER NETWORKS IS TRANSFORMING THE EXPERIENCE AND ECONOMICS OF NETWORKING 2 Copyright 2012
More informationEducation Network Security
Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or
More informationTV WHITE SPACE CLOSING THE DIGITAL DIVIDE
TV WHITE SPACE CLOSING THE DIGITAL DIVIDE 65+ million People in Great Britain 11% of households don t have internet access (Office of National Statistics) www.nominet.uk/tvws TRANSFORMING THE INTERNET
More informationJourney to IPv6 A Real-World deployment for Mobiles
Journey to IPv6 A Real-World deployment for Mobiles APRICOT 2017 February 2017 Telstra Unrestricted Copyright Telstra Introduction Instructional Slide Jeff Schmidt- Technology Team Manager, Telstra Wireless
More informationInternet of Things. Internet of Everything. Presented By: Louis McNeil Tom Costin
Internet of Things Internet of Everything Presented By: Louis McNeil Tom Costin Agenda Session Topics What is the IoT (Internet of Things) Key characteristics & components of the IoT Top 10 IoT Risks OWASP
More informationJourney to IPv6: A Real-World deployment for Mobiles
Journey to IPv6: A Real-World deployment for Mobiles ISP Workshops Last updated 1 st March 2017 Telstra Unrestricted Acknowledgements p We would like to acknowledge Jeff Schmidt @ Telstra for permitting
More informationWhy IPv6? Roque Gagliano LACNIC
Why IPv6? Roque Gagliano LACNIC Agenda Initial Concepts. IPv6 History. What is IPv6? Planning IPv6. Agenda Initial Concepts. IPv6 History. What is IPv6? Planning IPv6. Some initial concepts. IPv6 is the
More informationCisco 5921 Embedded Services Router
Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms
More informationEnterprise IPv6, Affecting Positive Change
Enterprise IPv6, Affecting Positive Change Rich Lewis IPv6 Product Manager, Oracle Global IT TXv6TF, March 2014 I am not an Oracle spokesperson, the views and opinions expressed in this presentation are
More informationSimplifying the remote acquisition, cloud management, and multiscreen distribution of professional live video over IP
Simplifying the remote acquisition, cloud management, and multiscreen distribution of professional live video over IP Dejero simplifies the remote acquisition, cloud management, and multiscreen distribution
More informationSecurity Operations & Analytics Services
Security Operations & Analytics Services www.ecominfotech.biz info@ecominfotech.biz Page 1 Key Challenges Average time to detect an attack (Dwell time) hovers around 175 to 210 days as reported by some
More informationIntegrated DHCP, DNS & IP Address Management
Integrated DHCP, DNS & IP Address Management. Cisco Prime Network Registrar Charlie Mascari, Product Manager Network Management Technology Group September 2011 2010 Cisco and/or its affiliates. All rights
More informationAT&T SD-WAN Network Based service quick start guide
AT&T SD-WAN Network Based service quick start guide After you order your AT&T SD-WAN Network Based service, you can: Create administrator accounts Log in to the SD-WAN orchestrator Configure business policy
More informationIoT & SCADA Cyber Security Services
RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au
More informationExecutive Summary...1 Chapter 1: Introduction...1
Table of Contents Executive Summary...1 Chapter 1: Introduction...1 SSA Organization... 1 IRM Strategic Plan Purpose... 3 IRM Strategic Plan Objectives... 4 Relationship to Other Strategic Planning Documents...
More informationInfrastructure Blind Spots Continue to Fuel Personal Data Breaches. Sanjay Raja Lumeta Corporation Lumeta Corporation
Infrastructure Blind Spots Continue to Fuel Personal Data Breaches Sanjay Raja Lumeta Corporation Why Is Real-Time Network & Cloud Situational Awareness Critical? Today s business drivers enable a greater
More informationDYNAMIC SPECTRUM MANAGEMENT CONNECTING THE WORLD
DYNAMIC SPECTRUM MANAGEMENT CONNECTING THE WORLD Why dynamic spectrum management? GLOBAL INTERNET TRAFFIC WILL TRIPLE OVER THE NEXT FIVE YEARS (CISCO 2016). 7.5 Billion People in the world 4 Billion Don
More informationCisco 5921 Embedded Services Router
Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router. It is designed to operate on small, low-power, Linux-based platforms to extend
More informationWhy, When & How? Asela Galappattige Sri Lanka Telecom PLC
Why, When & How? Asela Galappattige Sri Lanka Telecom PLC LkNOG Conference, Colombo Sri Lanka, 20 th Oct 2017 Precursor World has run out of IPv4 addresses IPv6 is the new Network Address Scheme for the
More informationAchieving End-to-End Security in the Internet of Things (IoT)
Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of
More informationWorkshop on the IPv6 development in Saudi Arabia 8 February 2009; Riyadh - KSA
Transition to IPv6 Drivers and Challenges Dr. Abdelfattah ABUQAYYAS ICT Consultant CITC- KSA 1 MAIN POINTS The ICT sector is developing rapidly - new services, and new modes of service delivery. The Internet
More informationOpen Digital: The Digital Services Opportunity Explored
inform innovate accelerate optimize Open Digital: The Digital Services Opportunity Explored Nik Willetts, Chief Strategy Officer APNOMS 2013 Hiroshima, September 26, 2013 2013 TM Forum 1 Who we are TM
More informationNETWORKING &SECURITY SOLUTIONSPORTFOLIO
NETWORKING &SECURITY SOLUTIONSPORTFOLIO NETWORKING &SECURITY SOLUTIONSPORTFOLIO Acomprehensivesolutionsportfoliotohelpyougetyourbusiness securelyconnected.clickononeofoursolutionstoknowmore NETWORKING
More informationmbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017
mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud
More informationGLOBAL PKI TRENDS STUDY
2018 GLOBAL PKI TRENDS STUDY Sponsored by Thales esecurity Independently conducted by Ponemon Institute LLC SEPTEMBER 2018 EXECUTIVE SUMMARY #2018GlobalPKI Mi Ponemon Institute is pleased to present the
More informationddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks
ddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks 2 WHAT IS A DDOS-ATTACK AND WHY ARE THEY DANGEROUS? Today's global network is a dynamically developing
More informationUNIK Building Mobile and Wireless Networks Maghsoud Morshedi
UNIK4700 - Building Mobile and Wireless Networks Maghsoud Morshedi IoT Market https://iot-analytics.com/iot-market-forecasts-overview/ 21/11/2017 2 IoT Management Advantages Remote provisioning Register
More informationIPv6 support. Chris Mitchell. Program Manager Microsoft Corporation Windows Networking & Communications IPv6
IPv6 support Chris Mitchell Program Manager Microsoft Corporation Windows Networking & Communications IPv6 Introduction New scenarios and IPv6 Microsoft s IPv6 support Migration and roadmap 2 New Engaging
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationFuture Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group
Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies
More informationPersonal Cybersecurity
Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions
More informationSimplifying the Branch Network
Simplifying the Branch Network By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Aruba, a Hewlett Packard Enterprise company Executive Summary A majority of IT organizations are experiencing
More informationIPv6 Migration Framework Case of Institutions in Ethiopia
IPv6 Migration Framework Case of Institutions in Ethiopia Kidist Mekonnen Zemen Bank, Addis Ababa, Ethiopia kidistmt@yahoo.com Taye Abdulkadir HiLCoE School of Computer Science and Technology, Addis Ababa,
More informationCarrier Grade NAT - Observations and Recommendations. Chris Grundemann North American IPv6 Summit 11 April 2012
Carrier Grade NAT - Observations and Recommendations Chris Grundemann North American IPv6 Summit 11 April 2012 Agenda CGN Technology CGN Challenges CGN Architectures Conclusions 2 Cable Television Laboratories,
More informationManaging the Migration to IPv6 Throughout the Service Provider Network White Paper
Managing the Migration to IPv6 Throughout the Service Provider Network Managing the Migration to IPv6 Throughout the Service Provider Network White Paper Introduction Service providers are feeling increasing
More information10 Hidden IT Risks That Might Threaten Your Business
(Plus 1 Fast Way to Find Them) Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine
More informationCisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018
Cisco SD-WAN Intent-based networking for the branch and WAN Carlos Infante PSS EN Spain March 2018 Aug-12 Oct-12 Dec-12 Feb-13 Apr-13 Jun-13 Aug-13 Oct-13 Dec-13 Feb-14 Apr-14 Jun-14 Aug-14 Oct-14 Dec-14
More informationSecuring Your Most Sensitive Data
Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way
More informationCisco Exam Questions & Answers
Cisco 648-375 Exam Questions & Answers Number: 648-375 Passing Score: 800 Time Limit: 120 min File Version: 22.1 http://www.gratisexam.com/ Cisco 648-375 Exam Questions & Answers Exam Name: Cisco Express
More informationCopyright 2017 Ford Motor Company, All Rights Reserved
- Research Analyst Digitization - IT Research and Innovation - PhD Candidate University of Michigan Dearborn - Machine Learning in Automotive Security - Vice Chair - IEEE SEM 01 02 03 04 05 Intro Ford
More informationPortnox CORE. On-Premise. Technology Introduction AT A GLANCE. Solution Overview
Portnox CORE On-Premise Technology Introduction Portnox CORE provides a complete solution for Network Access Control (NAC) across wired, wireless, and virtual networks for enterprise managed, mobile and
More informationSkybox Security Vulnerability Management Survey 2012
Skybox Security Vulnerability Management Survey 2012 Notice: This document contains a summary of the responses to a June 2012 survey of 100 medium to large enterprise organizations about their Vulnerability
More informationMASERGY S MANAGED SD-WAN
MASERGY S MANAGED New Performance Options for Hybrid Networks Business Challenges WAN Ecosystem Features and Benefits Use Cases INTRODUCTION Organizations are leveraging technology to transform the way
More informationDHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1
Addressing the Evolving Cybersecurity Tom Tollerton, CISSP, CISA, PCI QSA Manager Cybersecurity Advisory Services DHG presenter Tom Tollerton, Manager DHG IT Advisory 704.367.7061 tom.tollerton@dhgllp.com
More informationSecure wired and wireless networks with smart access control
Secure wired and wireless networks with smart access control Muhammad AbuGhalioun Senior Presales Consultant Hewlett-Packard Enterprise Aruba Saudi Arabia Managing risk in today s digital enterprise Increasingly
More informationIntelligent and Secure Network
Intelligent and Secure Network BIG-IP IP Global Delivery Intelligence v11.2 IP Intelligence Service Brian Boyan - b.boyan@f5.com Tony Ganzer t.ganzer@f5.com 2 Agenda Welcome & Intro Introduce F5 IP Intelligence
More informationCisco Unified Data Center Strategy
Cisco Unified Data Center Strategy How can IT enable new business? Holger Müller Technical Solutions Architect, Cisco September 2014 My business is rapidly changing and I need the IT and new technologies
More informationMorgan Stanley Digital Day. London, March
Morgan Stanley Digital Day London, March 20 2017 Atos business profile 2016 revenue: 11.7 billion By Division By Business Unit By Market 6% 27% 11% 56% 11% 8% 17% 18% 17% 20% 17% 35% 14% 15% 28% Infrastructure
More informationThe Next Opportunity in the Data Centre
The Next Opportunity in the Data Centre Application Centric Infrastructure Soni Jiandani Senior Vice President, Cisco THE NETWORK IS THE INFORMATION BROKER FOR ALL APPLICATIONS Applications Are Changing
More informationCisco Connected Factory Accelerator Bundles
Data Sheet Cisco Connected Factory Accelerator Bundles Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment
More informationMicrosoft 365 Business FAQs
Microsoft 365 Business FAQs Last updated April 27 th, 2018 Table of Contents General... 3 What is Microsoft 365 Business?... 3 Who should consider adopting Microsoft 365 Business?... 3 How can I get Microsoft
More informationCTO PoV: Enterprise Networks (Part 2) Security for IoT & Cloud
CTO PoV: Enterprise Networks (Part 2) Security for IoT & Cloud Khalid Raza CTO & Co-Founder Viptela khalid@viptela.com Danny Johnson Director, Product Marketing Verizon daniel.johnson@verizonwireless.com
More informationShaw Communications IPv6 Deployment
Shaw Communications IPv6 Deployment Developing Company Momentum A Technical Paper prepared for SCTE/ISBE by Darren Gamble Systems Architect Shaw Communications 2728 Hopewell Place NE 403-781-4948 Darren.Gamble@sjrb.ca
More informationATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V
ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V WHITE PAPER Create the Data Center of the Future Accelerate
More informationElastiNET FOR MOBILE BACKHAUL
ElastiNET FOR MOBILE BACKHAUL OPTIMIZED MOBILE BACKHAUL TO SUPPORT 5G SERVICES ON 4G INFRASTRUCTURE The demand for mobile data is spiraling as consumers expect services, such as streamed mobile video,
More informationCyber Due Diligence: Understanding the New Normal in Corporate Risk
Cyber Due Diligence: Understanding the New Normal in Corporate Risk Gillian Stacey, Davies Ward Phillips & Vineberg LLP Donald Good, Navigant Consulting Peter Gronvall, Navigant Consulting 8:30 to 10:00
More informationTECHNOLOGIES DEMOS. Nokia Experience 14 demos. 25 Nokia Campus 5G Experimental Network ifun demo. 26 5G CV demo in anechoic room
TECHNOLOGIES DEMOS Nokia Experience 14 demos Visitors can take a demo tour into the network of the future to discover live 5G network, new 5G processing boards, Cloud based architecture and platform, microwave
More information"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More informationCND Exam Blueprint v2.0
EC-Council C ND Certified Network Defende r CND Exam Blueprint v2.0 CND Exam Blueprint v2.0 1 Domains Objectives Weightage Number of Questions 1. Computer Network and Defense Fundamentals Understanding
More informationPreparing your network for the next wave of innovation
Preparing your network for the next wave of innovation The future is exciting. Ready? 2 Executive brief For modern businesses, every day brings fresh challenges and opportunities. You must be able to adapt
More informationInternet of Things: Latest Technology Development and Applications
Internet of Things: Latest Technology Development and Applications Mr UY Tat-Kong Assistant Vice President Network Evolution Planning & Development 22 August 2014 Agenda Communication Technologies Development
More informationSystem Architecture Challenges in the Home M2M Network
System Architecture Challenges in the Home M2M Network Michael Starsinic InterDigital Communications M2M Background M2M Communications Machine-to-Machine or Machine-to-Man The Machine usually includes
More informationCyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities
SESSION ID: SBX3-W1 Cyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities Gary Hayslip Deputy Director, CISO City of San Diego, CA @ghayslip City of San Diego by the Numbers 11,000+
More informationIPv6 Readiness in the Communication Service Provider Industry
IPv6 Readiness in the Communication Service Provider Industry An Incognito Software Report Published April 2014 Executive Summary... 2 Methodology and Respondent Profile... 3 Methodology... 3 Respondent
More informationHow SD-WAN will Transform the Network. And lead to innovative, profitable business outcomes
How SD-WAN will Transform the Network And lead to innovative, profitable business outcomes By 2020, more than 50 percent of WAN edge infrastructure refresh initiatives will be based on SD-WAN versus traditional
More informationOverview of the Juniper Mobile Cloud Architecture Laying the Foundation for a Next-gen Secure Distributed Telco Cloud. Mobile World Congress 2017
Overview of the Juniper Mobile Cloud Laying the Foundation for a Next-gen Secure Telco Cloud Mobile World Congress 2017 Summary Mobile Challenges and Trends through 2020 Business Drivers Enable new revenue
More information#ericssonlive Slide title 70 pt CAPITALS Slide subtitle minimum 30 pt
#ericssonlive Market, Industry & technology evolution - Pioneering at the digital frontier Ulf Ewaldsson CTO & Head of Strategy Situational context Macro-economy Recessionary trends impact technology sector
More informationOver Cellular. Jim Weikert Strategic Marketing Manager ProSoft Technology Technical Track
Accessing EtherNet/IP Networks Over Cellular www.odva.org Jim Weikert Strategic Marketing Manager ProSoft Technology Technical Track Introduction Pervasiveness of Cellular 100% annual increase in iphone
More informationDell helps you simplify IT
Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SAI2803BU The Road to Micro- Segmentation with VMware NSX #VMworld #SAI2803BU Disclaimer This presentation may contain product features that are currently under development. This overview of new technology
More informationIP Mobility vs. Session Mobility
IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when
More informationARM mbed mbed OS mbed Cloud
ARM mbed mbed OS mbed Cloud MWC Shanghai 2017 Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud applications Analytics
More informationIBM Power Systems: Open innovation to put data to work Dexter Henderson Vice President IBM Power Systems
IBM Power Systems: Open innovation to put data to work Dexter Henderson Vice President IBM Power Systems 2014 IBM Corporation Powerful Forces are Changing the Way Business Gets Done Data growing exponentially
More informationSmall Cells as a Service rethinking the mobile operator business
Small Cells as a Service rethinking the mobile operator business Mats Eriksson, CEO Arctos Labs Scandinavia AB -02-18 1 Executive summary Mobile operators (MNOs) face a huge challenge in meeting the data
More informationReinvent Your 2013 Security Management Strategy
Reinvent Your 2013 Security Management Strategy Laurent Boutet 18 septembre 2013 Phone:+33 6 25 34 12 01 Email:laurent.boutet@skyboxsecurity.com www.skyboxsecurity.com What are Your Key Objectives for
More informationOktober 2018 Dell Tech. Forum München
Oktober 2018 Dell Tech. Forum München Virtustream Digital Transformation & SAP Jan Büsen Client Solutions Executive, Virtustream The Business Agenda: Digital IT = Competitive Advantage Business Driven
More informationDevice Discovery for Vulnerability Assessment: Automating the Handoff
Device Discovery for Vulnerability Assessment: Automating the Handoff O V E R V I E W While vulnerability assessment tools are widely believed to be very mature and approaching commodity status, they are
More informationThe Nasuni Security Model
White Paper Nasuni enterprise file services ensures unstructured data security and privacy, enabling IT organizations to safely leverage cloud storage while meeting stringent governance and compliance
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationNetworks. Capital markets day 2017 N O V E M B E R 7-8, N E W Y O R K. Ericsson Internal Page 1
Networks Capital markets day 2017 N O V E M B E R 7-8, 2 0 1 7 N E W Y O R K Ericsson Internal 2017-10-06 Page 1 Fredrik Jejdling Executive Vice President & Head of Networks Ericsson Internal 2017-10-06
More informationPREPARING FOR SOC CHANGES. AN ARMANINO WHITE PAPER By Liam Collins, Partner-In-Charge, SOC Audit Practice
PREPARING FOR SOC CHANGES AN ARMANINO WHITE PAPER By Liam Collins, Partner-In-Charge, SOC Audit Practice On May 1, 2017, SSAE 18 went into effect and superseded SSAE 16. The following information is here
More informationInternet of Things Toolkit for Small and Medium Businesses
Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors
More informationSecuring the Empowered Branch with Cisco Network Admission Control. September 2007
Securing the Empowered Branch with Cisco Network Admission Control September 2007 Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. 1 Contents 1 The Cisco Empowered Branch 2 Security Considerations
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More informationSecuring Digital Transformation
September 4, 2017 Securing Digital Transformation DXC Security Andreas Wuchner, CTO Security Innovation Risk surface is evolving and increasingly complex The adversary is highly innovative and sophisticated
More informationBuild a Software-Defined Network to Defend your Business
Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net Kappa Data 2020 Software Defined Secure Networks Juniper s Innovation in Secure Networks
More informationIPv6 Security Safe, Secure, and Supported.
IPv6 Security Safe, Secure, and Supported. Andy Davidson Hurricane Electric and LONAP adavidson@he.net Twitter: @andyd MENOG 9 Muscat, Oman, Tuesday 4 th October 2011 Don t Panic! IPv6 is not inherently
More informationTestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified
TestOut Network Pro - English 4.1.x COURSE OUTLINE Modified 2017-07-06 TestOut Network Pro Outline - English 4.1.x Videos: 141 (18:42:14) Demonstrations: 81 (10:38:59) Simulations: 92 Fact Sheets: 145
More informationFederal Agency Firewall Management with SolarWinds Network Configuration Manager & Firewall Security Manager. Follow SolarWinds:
Federal Agency Firewall Management with SolarWinds Network Configuration Manager & Firewall Security Manager Introduction What s different about Federal Government Firewalls? The United States Federal
More informationWhat's the big deal about IPv6? A plain-english guidebook for non-technical managers
What's the big deal about IPv6? A plain-english guidebook for non-technical managers Why should I care about IPv6? 2. We're all going to IPv6 Your network administrators will tell you that IPv6 is the
More informationBest Practices for PCI DSS Version 3.2 Network Security Compliance
Best Practices for PCI DSS Version 3.2 Network Security Compliance www.tufin.com Executive Summary Payment data fraud by cyber criminals is a growing threat not only to financial institutions and retail
More informationConnectivity 101 for Remote Monitoring Systems
Connectivity 101 for Remote Monitoring Systems Paul Wacker Moxa, Inc. Manager - Edge Connectivity Ariana Drivdahl Moxa, Inc. Product Marketing Manager Pain Points of Remote Monitoring Pressure to enhance
More informationSecurity and networks
Security and networks Creating a secure business in a hyper connected world SHIV K. BAKHSHI, PH.D. VP, INDUSTRY RELATIONS, GROUP FUNCTION TECHNOLOGY ITU Regional workshop, Algiers, Algeria, FeBruary 12,
More informationSecurity-as-a-Service: The Future of Security Management
Security-as-a-Service: The Future of Security Management EVERY SINGLE ATTACK THAT AN ORGANISATION EXPERIENCES IS EITHER ON AN ENDPOINT OR HEADING THERE 65% of CEOs say their risk management approach is
More informationSimple and Secure Micro-Segmentation for Internet of Things (IoT)
Solution Brief Simple and Secure Micro-Segmentation for Internet of Things (IoT) A hardened network architecture for securely connecting any device, anywhere in the world Tempered Networks believes you
More informationUnisys Security. Enabling Business Growth with Advanced Security Solutions. Tom Patterson, Vice President, Security Solutions, Unisys
Unisys Security Enabling Business Growth with Advanced Security Solutions Tom Patterson, Vice President, Security Solutions, Unisys Unisys EMEA Security Examples Leading European bank Stealth(core) Leading
More informationHIPrelay Product. The Industry's First Identity-Based Router Product FAQ
HIPrelay Product The Industry's First Identity-Based Router Product FAQ Q. What is the HIPrelay? The HIPrelay is an identity-based router that seamlessly extends identity-defined micro-segments (IDMS)
More informationSchool of Computer Sciences Universiti Sains Malaysia Pulau Pinang
School of Computer Sciences Universiti Sains Malaysia Pulau Pinang Information Security & Assurance Assignment 2 White Paper Virtual Private Network (VPN) By Lim Teck Boon (107593) Page 1 Table of Content
More information