IPv6, The Pathway to Improved IT & IoT Security.

Size: px
Start display at page:

Download "IPv6, The Pathway to Improved IT & IoT Security."

Transcription

1 IPv6, The Pathway to Improved IT & IoT Security

2 AGENDA IPv6 is now a Business Decision! New Security Features SOC s & Sensors Next Steps

3 I LIKE A GOOD IPV6 FICTION Running IPv4 & IPv6 in parallel increases CAPEX/OPEX 2x Deployment will take years My gear does not support IPv6 My Customers & Partners don t use or want IPv6 IPv6 is slower because of the larger header We don t need that many addresses IPv6 is just a fad waiting till IPv9 Many, Many more Source:

4 IPV6 BUSINESS CASE Decrease OPEX/CAPEX, Increase Competiveness & Agility

5 THE BUSINESS REALITY OPEX/CAPX : WELLS FARGO Greater space for growth Reduced requirement for readdressing duplicate address space in mergers/ acquisitions Support for low-functionality end-points that may lack DHCP and static addressing capabilities (IoT, even Android devices) Reduce reliance on NAT (and associated logging complexity) More universally geo-locate address space (assuming ULA usage is reduced compared to RFC1918) Simplification of routing tables through improved summarization International Commerce

6 THE BUSINESS REALITY OPEX/CAPX : MICROSOFT Improved peer-to-peer networking for communications Personalized user experience using IP-based location services We see minor performance benefits as address translators are removed and implementations are improved NAT64 & NAT 444 (CGN) obscure location data, and cause service failures Market opportunities increase when customers mandate IPv6 support IPv6 allows faster infrastructure growth for services experiencing rapid customer usage Microsoft corporate IT efforts are based on a belief that IPv6 support is a cost of business, with returns on investment to be seen only over a very long time frame.

7 THE BUSINESS REALITY OPEX/CAPX : FACEBOOK Easier management of networks: Flatter, simpler, and more manageable. End-to-end connectivity integrity: Direct addressing is possible, due to vast address space Shortest path, no additional latency (middle boxes). Improved User Experience & Higher Engagement: One address per user (or household), no additional latency (10-15% faster). Improved interoperability and mobility capabilities (which are already widely embedded in network devices) Reference:

8 THE BUSINESS REALITY OPEX/CAPX : COMCAST Reduce costs based on depleted IPv4 addresses USD 9.50/IPv4 address (In Bulk) USD 35.00/IPv4 address in cloud Reduce operational complexity One IPv6 address per user/household Increase service offerings and become more competitive IoT wireless and analytics

9 THE BUSINESS REALITY OPEX/CAPX : LINKEDIN Better Use Experience 10% to 40% faster mobile (LTE) users applications NOTE: Just purchased by Microsoft Reference:

10 OUT WITH THE OLD THE BUSINESS REALITY OPEX/CAPX : IPV4 END OF LIFE

11 IN WITH THE NEW IMPACT ON COMPETITION THE BUSINESS REALITY OPEX/CAPX : IPV6 ONLY Wireless: High Bandwidth 4G LTE NG Wireless & 5G Wireless Low Bandwidth Low Power Cognitive radio (TV Whitespace) & IoT Networks (LoRaWan) IoT & IoTT (Internet of Trusted Things) 6LowPan (IPv6 for low power systems) Car-toCar/Car-to-Infrastructure Communications Many New Wireless networks already exist Cellular infrastructure does not exist Many international smart cites, smart buildings, smart transportation system

12 DID I MENTION THE US GROWTH? Reference:

13 DID I MENTION THE WORLD GROWTH? Reference:

14 EVERYONE IS DOING IPV6! Capable Prefered ~ Users Americas 18.55% 17.22% 114,465,082 Europe 13.04% 12.53% 92,278,761 Oceania 7.44% 6.72% 4,652,665 Asia 5.01% 3.96% 308,201,990 Africa 0.25% 0.24% 60,420,617 Reference:

15 SUMMARY IPV6 IS NOW A BUSINESS DISCUSSION NOT A TECHNICAL DISCUSSION! RISK AND CYBER SECURITY HEADACHE IF NOT MANAGED!

16 NEW SECURITY FEATURES INCREASE THE COSTS TO THE ATTACKERS! REDUCE COSTS TO DEFENDERS!

17 IPV6 HELPS REMOVE THE SCARS 1. Re-Architect for better Operations & Security! 2. Justifications to perform the SANS Top 20 Inventory of Authorized and Unauthorized Devices Inventory of Authorized and Unauthorized Software Secure Configurations for Hardware and Software Continuous Vulnerability Assessment and Remediation 3. Justifies removing devices which do not support IPv6 4. Update existing products which do support IPv6 Security Engineering for New Infrastructure

18 LAW OF SMALL VS. LARGE NUMBER 45 Min Scan all Internet IP s (no DNS) 500,000+ Years /24 < 1 Min Scan smallest range (no DNS) /64 < 500 Years /24 < 1 Min Reverse DNS Scan /64 < 500 Years Simplifies identification of Bots, C&C, active attacks

19 NAT VS. END-TO-END PRINCIPLE IPv4 Overlapping Addresses Anyone can insert a NAT Router Anyone can connect end-device Requires renumbering Static or DHCP NAT disassociates trust IPv6 Unique Addresses Quickly identify routers Quickly identify end-devices Auto-numbering feature if required Auto-configuration and/or DHCP Restore end-to-end Trust Unique Addresses speed internal identification of badne

20 SINGLE ADDRESS VS. MULTIPLE ADDRESSES IPv4 One address for all services (Default) On Link Across the enterprise Mapped across the Internet IPv6 Multiple addresses (Default) On Link (FE80:: ) Across Enterprise (ULA) Internet (Global inbound connection) Internet (Privacy Addresses) Different services different addresses Management and Monitoring API s & Webservers Patching & Backup Address provides simplified security policies

21 LAW OF SMALL VS. BIG ADDRESSES IPv4 No Geo-location context No Network context No rack context IPv6 Map to Physical location Network location VLan Rack Overlay network Wireless, wired & data centers Application Address provides Internal context

22 NAT STATEFULNESS IMPACTS POWER IPv4 Hosts 1 Application 1 or more connections per application Keep alive for each IPv6 Hosts 1 Application 1 or more connection per application No Keep Alive needed Each Firewall/Routers with NAT Firewall/Router M-1 hosts with M-1 Hosts N-1 applications N-1 applications P-1 connections per application P-1 connections per application Maintain State for 1 to 15 min. Maintain state based on connection queues 3-14% power reduction and battery savings

23 SUMMARY INCREASING THE COSTS TO THE ATTACKERS! REDUCE COST TO DEFENDERS!

24 SOC S & SENSORS Things to Think About Today

25 NETWORK SENSOR Dependencies & Challenges Capable of detecting and processing all variations of any protocol Black lists & white lists Blocking Constraint Logging Management via IPv6 Research is OLD Opportunity Topology Hiding (Link Local)

26 NETWORK BLOCKING Dependencies & Challenges Capable of detecting and processing all variations of any protocol Black lists & white lists Blocking Constraint Logging Management via IPv6 Research is OLD Opportunity Topology Hiding (Link Local)

27 NETWORK HOST Dependencies & Challenges Choice of Address Assignment & Management Choices of Name Resolution & Management Addressing IP/MAC vs. DHCP Unique Identifier (DUID) Multiple Addresses Docker/VM <- Great BYOD/Devices moving on your network <-Track? VPN Problem IPv4 only vs. IPv6 only vs. IPv4/IPv6 IPv6 only network to IPv4 NAT64/DNS64

28 SEIM/ANALYTIC Dependencies & Challenges Processing IPv6 Addresses Geolocation Carrier Grade Nat (CGN) Lack of matching IPv4 with IPv6 devices/attacks Management via IPv6

29 AUDIT/ASSESSMENT/PEN TESTING (COMPLIANCE) Dependencies & Challenges Audit Processes & Tools Assessment Processing & Tools Pen testing Do you meet compliance if you have not testing IPv6? Security controls IPv4!= IPv6

30 SOC S & SENSORS Things to Think About Today

31 NEXT STEPS Disrupt6 Research?

32 ADVANCED SECURITY IPV6 FEATURES INDICATORS OF INTENT (IOI)

33 TRACKING THROUGH CYBERSPACE & TIME

34 ATTRIBUTION THROUGH TOR

35 A VISIT FROM ANONYMOUS

36 IPV4 & IPV6 DECOYS

37 ATTACKER & BROKER ATTRIBUTION RESULTS Privacy vs. Attribution: Provide Privacy to Users Deny Privacy and Attribute Attacker, Bots & Brokers Additional Findings: Statistical validation of attacker which reduced dependency on IP addresses Better Geo-location Statistical validation of other attributed including: Browser type, Networks, Operating Systems, Tunnels, VPN s, TOR, etc. Identified Data Brokers which scan and provide ($) vulnerability to others

38 AGENDA IPv6 is now a Business Decision and a Security Headache! New Security Features SOC s & Sensors Next Steps

39 IPv6, The Pathway to Improved IT & IoT Security

Business and Security Justification For IPv6 Only IoT Networks.

Business and Security Justification For IPv6 Only IoT Networks. Business and Security Justification For IPv6 Only IoT Networks www.disrupt6.com @JoeKlein Joe.Klein@Disrupt6.com IPV6 BUSINESS CASE Decrease OPEX/CAPEX, Increase Competiveness & Agility The business reality

More information

IPv6 Implementation Best Practices For Service Providers

IPv6 Implementation Best Practices For Service Providers IPv6 Implementation Best Practices For Service Providers Brandon Ross Chief Network Architect and CEO 2013 Utilities Telecom Council Network Utility Force www.netuf.net @NetUF RFC 6540 - IPv6 Support Required

More information

ENTERPRISE SECURITY MANAGEMENT. Frederick Verduyckt 20 September 2012

ENTERPRISE SECURITY MANAGEMENT. Frederick Verduyckt 20 September 2012 ENTERPRISE SECURITY MANAGEMENT Frederick Verduyckt 20 September 2012 SETTING THE AGENDA FOR THE NEXT DECADE JUNIPER NETWORKS IS TRANSFORMING THE EXPERIENCE AND ECONOMICS OF NETWORKING 2 Copyright 2012

More information

Education Network Security

Education Network Security Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or

More information

TV WHITE SPACE CLOSING THE DIGITAL DIVIDE

TV WHITE SPACE CLOSING THE DIGITAL DIVIDE TV WHITE SPACE CLOSING THE DIGITAL DIVIDE 65+ million People in Great Britain 11% of households don t have internet access (Office of National Statistics) www.nominet.uk/tvws TRANSFORMING THE INTERNET

More information

Journey to IPv6 A Real-World deployment for Mobiles

Journey to IPv6 A Real-World deployment for Mobiles Journey to IPv6 A Real-World deployment for Mobiles APRICOT 2017 February 2017 Telstra Unrestricted Copyright Telstra Introduction Instructional Slide Jeff Schmidt- Technology Team Manager, Telstra Wireless

More information

Internet of Things. Internet of Everything. Presented By: Louis McNeil Tom Costin

Internet of Things. Internet of Everything. Presented By: Louis McNeil Tom Costin Internet of Things Internet of Everything Presented By: Louis McNeil Tom Costin Agenda Session Topics What is the IoT (Internet of Things) Key characteristics & components of the IoT Top 10 IoT Risks OWASP

More information

Journey to IPv6: A Real-World deployment for Mobiles

Journey to IPv6: A Real-World deployment for Mobiles Journey to IPv6: A Real-World deployment for Mobiles ISP Workshops Last updated 1 st March 2017 Telstra Unrestricted Acknowledgements p We would like to acknowledge Jeff Schmidt @ Telstra for permitting

More information

Why IPv6? Roque Gagliano LACNIC

Why IPv6? Roque Gagliano LACNIC Why IPv6? Roque Gagliano LACNIC Agenda Initial Concepts. IPv6 History. What is IPv6? Planning IPv6. Agenda Initial Concepts. IPv6 History. What is IPv6? Planning IPv6. Some initial concepts. IPv6 is the

More information

Cisco 5921 Embedded Services Router

Cisco 5921 Embedded Services Router Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms

More information

Enterprise IPv6, Affecting Positive Change

Enterprise IPv6, Affecting Positive Change Enterprise IPv6, Affecting Positive Change Rich Lewis IPv6 Product Manager, Oracle Global IT TXv6TF, March 2014 I am not an Oracle spokesperson, the views and opinions expressed in this presentation are

More information

Simplifying the remote acquisition, cloud management, and multiscreen distribution of professional live video over IP

Simplifying the remote acquisition, cloud management, and multiscreen distribution of professional live video over IP Simplifying the remote acquisition, cloud management, and multiscreen distribution of professional live video over IP Dejero simplifies the remote acquisition, cloud management, and multiscreen distribution

More information

Security Operations & Analytics Services

Security Operations & Analytics Services Security Operations & Analytics Services www.ecominfotech.biz info@ecominfotech.biz Page 1 Key Challenges Average time to detect an attack (Dwell time) hovers around 175 to 210 days as reported by some

More information

Integrated DHCP, DNS & IP Address Management

Integrated DHCP, DNS & IP Address Management Integrated DHCP, DNS & IP Address Management. Cisco Prime Network Registrar Charlie Mascari, Product Manager Network Management Technology Group September 2011 2010 Cisco and/or its affiliates. All rights

More information

AT&T SD-WAN Network Based service quick start guide

AT&T SD-WAN Network Based service quick start guide AT&T SD-WAN Network Based service quick start guide After you order your AT&T SD-WAN Network Based service, you can: Create administrator accounts Log in to the SD-WAN orchestrator Configure business policy

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au

More information

Executive Summary...1 Chapter 1: Introduction...1

Executive Summary...1 Chapter 1: Introduction...1 Table of Contents Executive Summary...1 Chapter 1: Introduction...1 SSA Organization... 1 IRM Strategic Plan Purpose... 3 IRM Strategic Plan Objectives... 4 Relationship to Other Strategic Planning Documents...

More information

Infrastructure Blind Spots Continue to Fuel Personal Data Breaches. Sanjay Raja Lumeta Corporation Lumeta Corporation

Infrastructure Blind Spots Continue to Fuel Personal Data Breaches. Sanjay Raja Lumeta Corporation Lumeta Corporation Infrastructure Blind Spots Continue to Fuel Personal Data Breaches Sanjay Raja Lumeta Corporation Why Is Real-Time Network & Cloud Situational Awareness Critical? Today s business drivers enable a greater

More information

DYNAMIC SPECTRUM MANAGEMENT CONNECTING THE WORLD

DYNAMIC SPECTRUM MANAGEMENT CONNECTING THE WORLD DYNAMIC SPECTRUM MANAGEMENT CONNECTING THE WORLD Why dynamic spectrum management? GLOBAL INTERNET TRAFFIC WILL TRIPLE OVER THE NEXT FIVE YEARS (CISCO 2016). 7.5 Billion People in the world 4 Billion Don

More information

Cisco 5921 Embedded Services Router

Cisco 5921 Embedded Services Router Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router. It is designed to operate on small, low-power, Linux-based platforms to extend

More information

Why, When & How? Asela Galappattige Sri Lanka Telecom PLC

Why, When & How? Asela Galappattige Sri Lanka Telecom PLC Why, When & How? Asela Galappattige Sri Lanka Telecom PLC LkNOG Conference, Colombo Sri Lanka, 20 th Oct 2017 Precursor World has run out of IPv4 addresses IPv6 is the new Network Address Scheme for the

More information

Achieving End-to-End Security in the Internet of Things (IoT)

Achieving End-to-End Security in the Internet of Things (IoT) Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of

More information

Workshop on the IPv6 development in Saudi Arabia 8 February 2009; Riyadh - KSA

Workshop on the IPv6 development in Saudi Arabia 8 February 2009; Riyadh - KSA Transition to IPv6 Drivers and Challenges Dr. Abdelfattah ABUQAYYAS ICT Consultant CITC- KSA 1 MAIN POINTS The ICT sector is developing rapidly - new services, and new modes of service delivery. The Internet

More information

Open Digital: The Digital Services Opportunity Explored

Open Digital: The Digital Services Opportunity Explored inform innovate accelerate optimize Open Digital: The Digital Services Opportunity Explored Nik Willetts, Chief Strategy Officer APNOMS 2013 Hiroshima, September 26, 2013 2013 TM Forum 1 Who we are TM

More information

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

NETWORKING &SECURITY SOLUTIONSPORTFOLIO NETWORKING &SECURITY SOLUTIONSPORTFOLIO NETWORKING &SECURITY SOLUTIONSPORTFOLIO Acomprehensivesolutionsportfoliotohelpyougetyourbusiness securelyconnected.clickononeofoursolutionstoknowmore NETWORKING

More information

mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017

mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017 mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud

More information

GLOBAL PKI TRENDS STUDY

GLOBAL PKI TRENDS STUDY 2018 GLOBAL PKI TRENDS STUDY Sponsored by Thales esecurity Independently conducted by Ponemon Institute LLC SEPTEMBER 2018 EXECUTIVE SUMMARY #2018GlobalPKI Mi Ponemon Institute is pleased to present the

More information

ddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks

ddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks ddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks 2 WHAT IS A DDOS-ATTACK AND WHY ARE THEY DANGEROUS? Today's global network is a dynamically developing

More information

UNIK Building Mobile and Wireless Networks Maghsoud Morshedi

UNIK Building Mobile and Wireless Networks Maghsoud Morshedi UNIK4700 - Building Mobile and Wireless Networks Maghsoud Morshedi IoT Market https://iot-analytics.com/iot-market-forecasts-overview/ 21/11/2017 2 IoT Management Advantages Remote provisioning Register

More information

IPv6 support. Chris Mitchell. Program Manager Microsoft Corporation Windows Networking & Communications IPv6

IPv6 support. Chris Mitchell. Program Manager Microsoft Corporation Windows Networking & Communications IPv6 IPv6 support Chris Mitchell Program Manager Microsoft Corporation Windows Networking & Communications IPv6 Introduction New scenarios and IPv6 Microsoft s IPv6 support Migration and roadmap 2 New Engaging

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies

More information

Personal Cybersecurity

Personal Cybersecurity Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions

More information

Simplifying the Branch Network

Simplifying the Branch Network Simplifying the Branch Network By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Aruba, a Hewlett Packard Enterprise company Executive Summary A majority of IT organizations are experiencing

More information

IPv6 Migration Framework Case of Institutions in Ethiopia

IPv6 Migration Framework Case of Institutions in Ethiopia IPv6 Migration Framework Case of Institutions in Ethiopia Kidist Mekonnen Zemen Bank, Addis Ababa, Ethiopia kidistmt@yahoo.com Taye Abdulkadir HiLCoE School of Computer Science and Technology, Addis Ababa,

More information

Carrier Grade NAT - Observations and Recommendations. Chris Grundemann North American IPv6 Summit 11 April 2012

Carrier Grade NAT - Observations and Recommendations. Chris Grundemann North American IPv6 Summit 11 April 2012 Carrier Grade NAT - Observations and Recommendations Chris Grundemann North American IPv6 Summit 11 April 2012 Agenda CGN Technology CGN Challenges CGN Architectures Conclusions 2 Cable Television Laboratories,

More information

Managing the Migration to IPv6 Throughout the Service Provider Network White Paper

Managing the Migration to IPv6 Throughout the Service Provider Network White Paper Managing the Migration to IPv6 Throughout the Service Provider Network Managing the Migration to IPv6 Throughout the Service Provider Network White Paper Introduction Service providers are feeling increasing

More information

10 Hidden IT Risks That Might Threaten Your Business

10 Hidden IT Risks That Might Threaten Your Business (Plus 1 Fast Way to Find Them) Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine

More information

Cisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018

Cisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018 Cisco SD-WAN Intent-based networking for the branch and WAN Carlos Infante PSS EN Spain March 2018 Aug-12 Oct-12 Dec-12 Feb-13 Apr-13 Jun-13 Aug-13 Oct-13 Dec-13 Feb-14 Apr-14 Jun-14 Aug-14 Oct-14 Dec-14

More information

Securing Your Most Sensitive Data

Securing Your Most Sensitive Data Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way

More information

Cisco Exam Questions & Answers

Cisco Exam Questions & Answers Cisco 648-375 Exam Questions & Answers Number: 648-375 Passing Score: 800 Time Limit: 120 min File Version: 22.1 http://www.gratisexam.com/ Cisco 648-375 Exam Questions & Answers Exam Name: Cisco Express

More information

Copyright 2017 Ford Motor Company, All Rights Reserved

Copyright 2017 Ford Motor Company, All Rights Reserved - Research Analyst Digitization - IT Research and Innovation - PhD Candidate University of Michigan Dearborn - Machine Learning in Automotive Security - Vice Chair - IEEE SEM 01 02 03 04 05 Intro Ford

More information

Portnox CORE. On-Premise. Technology Introduction AT A GLANCE. Solution Overview

Portnox CORE. On-Premise. Technology Introduction AT A GLANCE. Solution Overview Portnox CORE On-Premise Technology Introduction Portnox CORE provides a complete solution for Network Access Control (NAC) across wired, wireless, and virtual networks for enterprise managed, mobile and

More information

Skybox Security Vulnerability Management Survey 2012

Skybox Security Vulnerability Management Survey 2012 Skybox Security Vulnerability Management Survey 2012 Notice: This document contains a summary of the responses to a June 2012 survey of 100 medium to large enterprise organizations about their Vulnerability

More information

MASERGY S MANAGED SD-WAN

MASERGY S MANAGED SD-WAN MASERGY S MANAGED New Performance Options for Hybrid Networks Business Challenges WAN Ecosystem Features and Benefits Use Cases INTRODUCTION Organizations are leveraging technology to transform the way

More information

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1 Addressing the Evolving Cybersecurity Tom Tollerton, CISSP, CISA, PCI QSA Manager Cybersecurity Advisory Services DHG presenter Tom Tollerton, Manager DHG IT Advisory 704.367.7061 tom.tollerton@dhgllp.com

More information

Secure wired and wireless networks with smart access control

Secure wired and wireless networks with smart access control Secure wired and wireless networks with smart access control Muhammad AbuGhalioun Senior Presales Consultant Hewlett-Packard Enterprise Aruba Saudi Arabia Managing risk in today s digital enterprise Increasingly

More information

Intelligent and Secure Network

Intelligent and Secure Network Intelligent and Secure Network BIG-IP IP Global Delivery Intelligence v11.2 IP Intelligence Service Brian Boyan - b.boyan@f5.com Tony Ganzer t.ganzer@f5.com 2 Agenda Welcome & Intro Introduce F5 IP Intelligence

More information

Cisco Unified Data Center Strategy

Cisco Unified Data Center Strategy Cisco Unified Data Center Strategy How can IT enable new business? Holger Müller Technical Solutions Architect, Cisco September 2014 My business is rapidly changing and I need the IT and new technologies

More information

Morgan Stanley Digital Day. London, March

Morgan Stanley Digital Day. London, March Morgan Stanley Digital Day London, March 20 2017 Atos business profile 2016 revenue: 11.7 billion By Division By Business Unit By Market 6% 27% 11% 56% 11% 8% 17% 18% 17% 20% 17% 35% 14% 15% 28% Infrastructure

More information

The Next Opportunity in the Data Centre

The Next Opportunity in the Data Centre The Next Opportunity in the Data Centre Application Centric Infrastructure Soni Jiandani Senior Vice President, Cisco THE NETWORK IS THE INFORMATION BROKER FOR ALL APPLICATIONS Applications Are Changing

More information

Cisco Connected Factory Accelerator Bundles

Cisco Connected Factory Accelerator Bundles Data Sheet Cisco Connected Factory Accelerator Bundles Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment

More information

Microsoft 365 Business FAQs

Microsoft 365 Business FAQs Microsoft 365 Business FAQs Last updated April 27 th, 2018 Table of Contents General... 3 What is Microsoft 365 Business?... 3 Who should consider adopting Microsoft 365 Business?... 3 How can I get Microsoft

More information

CTO PoV: Enterprise Networks (Part 2) Security for IoT & Cloud

CTO PoV: Enterprise Networks (Part 2) Security for IoT & Cloud CTO PoV: Enterprise Networks (Part 2) Security for IoT & Cloud Khalid Raza CTO & Co-Founder Viptela khalid@viptela.com Danny Johnson Director, Product Marketing Verizon daniel.johnson@verizonwireless.com

More information

Shaw Communications IPv6 Deployment

Shaw Communications IPv6 Deployment Shaw Communications IPv6 Deployment Developing Company Momentum A Technical Paper prepared for SCTE/ISBE by Darren Gamble Systems Architect Shaw Communications 2728 Hopewell Place NE 403-781-4948 Darren.Gamble@sjrb.ca

More information

ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V

ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V WHITE PAPER Create the Data Center of the Future Accelerate

More information

ElastiNET FOR MOBILE BACKHAUL

ElastiNET FOR MOBILE BACKHAUL ElastiNET FOR MOBILE BACKHAUL OPTIMIZED MOBILE BACKHAUL TO SUPPORT 5G SERVICES ON 4G INFRASTRUCTURE The demand for mobile data is spiraling as consumers expect services, such as streamed mobile video,

More information

Cyber Due Diligence: Understanding the New Normal in Corporate Risk

Cyber Due Diligence: Understanding the New Normal in Corporate Risk Cyber Due Diligence: Understanding the New Normal in Corporate Risk Gillian Stacey, Davies Ward Phillips & Vineberg LLP Donald Good, Navigant Consulting Peter Gronvall, Navigant Consulting 8:30 to 10:00

More information

TECHNOLOGIES DEMOS. Nokia Experience 14 demos. 25 Nokia Campus 5G Experimental Network ifun demo. 26 5G CV demo in anechoic room

TECHNOLOGIES DEMOS. Nokia Experience 14 demos. 25 Nokia Campus 5G Experimental Network ifun demo. 26 5G CV demo in anechoic room TECHNOLOGIES DEMOS Nokia Experience 14 demos Visitors can take a demo tour into the network of the future to discover live 5G network, new 5G processing boards, Cloud based architecture and platform, microwave

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

CND Exam Blueprint v2.0

CND Exam Blueprint v2.0 EC-Council C ND Certified Network Defende r CND Exam Blueprint v2.0 CND Exam Blueprint v2.0 1 Domains Objectives Weightage Number of Questions 1. Computer Network and Defense Fundamentals Understanding

More information

Preparing your network for the next wave of innovation

Preparing your network for the next wave of innovation Preparing your network for the next wave of innovation The future is exciting. Ready? 2 Executive brief For modern businesses, every day brings fresh challenges and opportunities. You must be able to adapt

More information

Internet of Things: Latest Technology Development and Applications

Internet of Things: Latest Technology Development and Applications Internet of Things: Latest Technology Development and Applications Mr UY Tat-Kong Assistant Vice President Network Evolution Planning & Development 22 August 2014 Agenda Communication Technologies Development

More information

System Architecture Challenges in the Home M2M Network

System Architecture Challenges in the Home M2M Network System Architecture Challenges in the Home M2M Network Michael Starsinic InterDigital Communications M2M Background M2M Communications Machine-to-Machine or Machine-to-Man The Machine usually includes

More information

Cyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities

Cyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities SESSION ID: SBX3-W1 Cyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities Gary Hayslip Deputy Director, CISO City of San Diego, CA @ghayslip City of San Diego by the Numbers 11,000+

More information

IPv6 Readiness in the Communication Service Provider Industry

IPv6 Readiness in the Communication Service Provider Industry IPv6 Readiness in the Communication Service Provider Industry An Incognito Software Report Published April 2014 Executive Summary... 2 Methodology and Respondent Profile... 3 Methodology... 3 Respondent

More information

How SD-WAN will Transform the Network. And lead to innovative, profitable business outcomes

How SD-WAN will Transform the Network. And lead to innovative, profitable business outcomes How SD-WAN will Transform the Network And lead to innovative, profitable business outcomes By 2020, more than 50 percent of WAN edge infrastructure refresh initiatives will be based on SD-WAN versus traditional

More information

Overview of the Juniper Mobile Cloud Architecture Laying the Foundation for a Next-gen Secure Distributed Telco Cloud. Mobile World Congress 2017

Overview of the Juniper Mobile Cloud Architecture Laying the Foundation for a Next-gen Secure Distributed Telco Cloud. Mobile World Congress 2017 Overview of the Juniper Mobile Cloud Laying the Foundation for a Next-gen Secure Telco Cloud Mobile World Congress 2017 Summary Mobile Challenges and Trends through 2020 Business Drivers Enable new revenue

More information

#ericssonlive Slide title 70 pt CAPITALS Slide subtitle minimum 30 pt

#ericssonlive Slide title 70 pt CAPITALS Slide subtitle minimum 30 pt #ericssonlive Market, Industry & technology evolution - Pioneering at the digital frontier Ulf Ewaldsson CTO & Head of Strategy Situational context Macro-economy Recessionary trends impact technology sector

More information

Over Cellular. Jim Weikert Strategic Marketing Manager ProSoft Technology Technical Track

Over Cellular.  Jim Weikert Strategic Marketing Manager ProSoft Technology Technical Track Accessing EtherNet/IP Networks Over Cellular www.odva.org Jim Weikert Strategic Marketing Manager ProSoft Technology Technical Track Introduction Pervasiveness of Cellular 100% annual increase in iphone

More information

Dell helps you simplify IT

Dell helps you simplify IT Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme SAI2803BU The Road to Micro- Segmentation with VMware NSX #VMworld #SAI2803BU Disclaimer This presentation may contain product features that are currently under development. This overview of new technology

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

ARM mbed mbed OS mbed Cloud

ARM mbed mbed OS mbed Cloud ARM mbed mbed OS mbed Cloud MWC Shanghai 2017 Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud applications Analytics

More information

IBM Power Systems: Open innovation to put data to work Dexter Henderson Vice President IBM Power Systems

IBM Power Systems: Open innovation to put data to work Dexter Henderson Vice President IBM Power Systems IBM Power Systems: Open innovation to put data to work Dexter Henderson Vice President IBM Power Systems 2014 IBM Corporation Powerful Forces are Changing the Way Business Gets Done Data growing exponentially

More information

Small Cells as a Service rethinking the mobile operator business

Small Cells as a Service rethinking the mobile operator business Small Cells as a Service rethinking the mobile operator business Mats Eriksson, CEO Arctos Labs Scandinavia AB -02-18 1 Executive summary Mobile operators (MNOs) face a huge challenge in meeting the data

More information

Reinvent Your 2013 Security Management Strategy

Reinvent Your 2013 Security Management Strategy Reinvent Your 2013 Security Management Strategy Laurent Boutet 18 septembre 2013 Phone:+33 6 25 34 12 01 Email:laurent.boutet@skyboxsecurity.com www.skyboxsecurity.com What are Your Key Objectives for

More information

Oktober 2018 Dell Tech. Forum München

Oktober 2018 Dell Tech. Forum München Oktober 2018 Dell Tech. Forum München Virtustream Digital Transformation & SAP Jan Büsen Client Solutions Executive, Virtustream The Business Agenda: Digital IT = Competitive Advantage Business Driven

More information

Device Discovery for Vulnerability Assessment: Automating the Handoff

Device Discovery for Vulnerability Assessment: Automating the Handoff Device Discovery for Vulnerability Assessment: Automating the Handoff O V E R V I E W While vulnerability assessment tools are widely believed to be very mature and approaching commodity status, they are

More information

The Nasuni Security Model

The Nasuni Security Model White Paper Nasuni enterprise file services ensures unstructured data security and privacy, enabling IT organizations to safely leverage cloud storage while meeting stringent governance and compliance

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

Networks. Capital markets day 2017 N O V E M B E R 7-8, N E W Y O R K. Ericsson Internal Page 1

Networks. Capital markets day 2017 N O V E M B E R 7-8, N E W Y O R K. Ericsson Internal Page 1 Networks Capital markets day 2017 N O V E M B E R 7-8, 2 0 1 7 N E W Y O R K Ericsson Internal 2017-10-06 Page 1 Fredrik Jejdling Executive Vice President & Head of Networks Ericsson Internal 2017-10-06

More information

PREPARING FOR SOC CHANGES. AN ARMANINO WHITE PAPER By Liam Collins, Partner-In-Charge, SOC Audit Practice

PREPARING FOR SOC CHANGES. AN ARMANINO WHITE PAPER By Liam Collins, Partner-In-Charge, SOC Audit Practice PREPARING FOR SOC CHANGES AN ARMANINO WHITE PAPER By Liam Collins, Partner-In-Charge, SOC Audit Practice On May 1, 2017, SSAE 18 went into effect and superseded SSAE 16. The following information is here

More information

Internet of Things Toolkit for Small and Medium Businesses

Internet of Things Toolkit for Small and Medium Businesses Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors

More information

Securing the Empowered Branch with Cisco Network Admission Control. September 2007

Securing the Empowered Branch with Cisco Network Admission Control. September 2007 Securing the Empowered Branch with Cisco Network Admission Control September 2007 Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. 1 Contents 1 The Cisco Empowered Branch 2 Security Considerations

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

Securing Digital Transformation

Securing Digital Transformation September 4, 2017 Securing Digital Transformation DXC Security Andreas Wuchner, CTO Security Innovation Risk surface is evolving and increasingly complex The adversary is highly innovative and sophisticated

More information

Build a Software-Defined Network to Defend your Business

Build a Software-Defined Network to Defend your Business Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net Kappa Data 2020 Software Defined Secure Networks Juniper s Innovation in Secure Networks

More information

IPv6 Security Safe, Secure, and Supported.

IPv6 Security Safe, Secure, and Supported. IPv6 Security Safe, Secure, and Supported. Andy Davidson Hurricane Electric and LONAP adavidson@he.net Twitter: @andyd MENOG 9 Muscat, Oman, Tuesday 4 th October 2011 Don t Panic! IPv6 is not inherently

More information

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified TestOut Network Pro - English 4.1.x COURSE OUTLINE Modified 2017-07-06 TestOut Network Pro Outline - English 4.1.x Videos: 141 (18:42:14) Demonstrations: 81 (10:38:59) Simulations: 92 Fact Sheets: 145

More information

Federal Agency Firewall Management with SolarWinds Network Configuration Manager & Firewall Security Manager. Follow SolarWinds:

Federal Agency Firewall Management with SolarWinds Network Configuration Manager & Firewall Security Manager. Follow SolarWinds: Federal Agency Firewall Management with SolarWinds Network Configuration Manager & Firewall Security Manager Introduction What s different about Federal Government Firewalls? The United States Federal

More information

What's the big deal about IPv6? A plain-english guidebook for non-technical managers

What's the big deal about IPv6? A plain-english guidebook for non-technical managers What's the big deal about IPv6? A plain-english guidebook for non-technical managers Why should I care about IPv6? 2. We're all going to IPv6 Your network administrators will tell you that IPv6 is the

More information

Best Practices for PCI DSS Version 3.2 Network Security Compliance

Best Practices for PCI DSS Version 3.2 Network Security Compliance Best Practices for PCI DSS Version 3.2 Network Security Compliance www.tufin.com Executive Summary Payment data fraud by cyber criminals is a growing threat not only to financial institutions and retail

More information

Connectivity 101 for Remote Monitoring Systems

Connectivity 101 for Remote Monitoring Systems Connectivity 101 for Remote Monitoring Systems Paul Wacker Moxa, Inc. Manager - Edge Connectivity Ariana Drivdahl Moxa, Inc. Product Marketing Manager Pain Points of Remote Monitoring Pressure to enhance

More information

Security and networks

Security and networks Security and networks Creating a secure business in a hyper connected world SHIV K. BAKHSHI, PH.D. VP, INDUSTRY RELATIONS, GROUP FUNCTION TECHNOLOGY ITU Regional workshop, Algiers, Algeria, FeBruary 12,

More information

Security-as-a-Service: The Future of Security Management

Security-as-a-Service: The Future of Security Management Security-as-a-Service: The Future of Security Management EVERY SINGLE ATTACK THAT AN ORGANISATION EXPERIENCES IS EITHER ON AN ENDPOINT OR HEADING THERE 65% of CEOs say their risk management approach is

More information

Simple and Secure Micro-Segmentation for Internet of Things (IoT)

Simple and Secure Micro-Segmentation for Internet of Things (IoT) Solution Brief Simple and Secure Micro-Segmentation for Internet of Things (IoT) A hardened network architecture for securely connecting any device, anywhere in the world Tempered Networks believes you

More information

Unisys Security. Enabling Business Growth with Advanced Security Solutions. Tom Patterson, Vice President, Security Solutions, Unisys

Unisys Security. Enabling Business Growth with Advanced Security Solutions. Tom Patterson, Vice President, Security Solutions, Unisys Unisys Security Enabling Business Growth with Advanced Security Solutions Tom Patterson, Vice President, Security Solutions, Unisys Unisys EMEA Security Examples Leading European bank Stealth(core) Leading

More information

HIPrelay Product. The Industry's First Identity-Based Router Product FAQ

HIPrelay Product. The Industry's First Identity-Based Router Product FAQ HIPrelay Product The Industry's First Identity-Based Router Product FAQ Q. What is the HIPrelay? The HIPrelay is an identity-based router that seamlessly extends identity-defined micro-segments (IDMS)

More information

School of Computer Sciences Universiti Sains Malaysia Pulau Pinang

School of Computer Sciences Universiti Sains Malaysia Pulau Pinang School of Computer Sciences Universiti Sains Malaysia Pulau Pinang Information Security & Assurance Assignment 2 White Paper Virtual Private Network (VPN) By Lim Teck Boon (107593) Page 1 Table of Content

More information