Strong encryption and superior availability at the same time. Complies with the stringent demands posed by mission-critical systems (MCS)

Size: px
Start display at page:

Download "Strong encryption and superior availability at the same time. Complies with the stringent demands posed by mission-critical systems (MCS)"

Transcription

1 Strong encryption and superior availability at the same time Complies with the stringent demands posed by mission-critical systems (MCS) Fanless, robust hardware integrated in the C20 platform End-to-end encryption to prevent cyber-attacks in packet-based transport networks (MPLS-TP) Random numbers generated by quantum physics (QRNG) Can be extended with a Quantum Key Distribution (QKD) server Centralized and decentralized key distribution Made and developed in Germany and Switzerland Offers security and high levels of availability

2 Solution Brief Security in mission-critical systems Security is a basic requirement of mission-critical systems. But MCS networks are at high risk due to the rising number of attacks, attempts at manipulation and espionage. Networks and dedicated lines are susceptible to attack in many ways. Optical networks in particular are not secure. Without encryption systems, these networks and lines would be easy prey to hackers. Attacks are possible with a minimum of technical expertise. The optical fibre can be cut (spliced), the splittercoupler method applied (i.e. by bending the line), or non-touching methods used where all of the data traffic is read by highly sensitive photo detectors. Afterwards all the information collated is analysed. Active attacks like denial-of-service, spoofing, forging and improper usage, viruses, worms and Trojans enhance the options of passive attacks and risk the security of the infrastructure. KEYMILE trusted security management as well as deploying encryption technology with encryption hardware as well as key management and generation. KEYMILE is a technologically leading supplier for telecommunication equipment with major facilities in Germany and in Switzerland. As a competent consultant for mission-critical networks we offer KEYMILE trusted security. This comprises complying with all applicable security requirements scoping the production facilities in Germany, security-screened and certified employees and central network KEYMILE also offers additional security improvements with its encryption card for the C20 platform. It reinforces the security mind-set of integrity, trust, authorization and authentication and ensures that data, communications, devices and services can be verified. 2

3 Very secure communications The offers encryption of infrastructure that provides mission-critical applications for controlling and monitoring energy networks, gas and oil pipelines, railway companies, local authorities, military networks and air-traffic control centres: Control and signalling in railway networks Linking branches and data centers Automating power in high-voltage lines SCADA applications for oil and gas Police and military networks Banks The C20 platform guarantees strong, trustworthy encryption with equally high levels of availability in mission-critical systems. It has been adapted to cope with these demands superbly. It offers ease of use, superior performance and is low cost, with high levels of availability at the same time. C20 platform and encryption card C20 is a hybrid multi-service access and transport platform that complies with the tough demands of mission-critical communications networks. It excels in offering top levels of availability, is robust and easy to operate and maintain. Its low energy consumption and extreme durability make it a future-proof option. By using the encryption card in the C20, SDH/PDH-based networks as well as PTN (packet-based transport networks) can be operated securely in a node. C20 Subrack ESDH Network 1PDH Network Packet Network STM-1/4 n x 2 Mbps GbE 10 GbE STSME1L4I1COGETAG1XSecured SECUEthernet GSM-R 3 rd party Router Surveillance camera WLAN Router Figure 1: Encryption of packet-based applications 3

4 The encryption card: Offers end-to-end encryption against cyberattacks in packet-based transport networks (MPLS-TP) Causes no delay in PTP (Precision Time Protocol IEEE1588) packets Offers a redundant encryption unit per card 4 x SFP+/10 GbE ports per unit It offers tamper-protected features to prevent mechanical manipulation Also comes with an integrated physical QRNG random-number generator Existing C20 MPLS-TP infrastructure can be retrofitted with the encryption solution. Advantages of Layer 2 encryption: Minor impact on network performance Low latency of under one microsecond No bandwidth losses due to overheads Transparency of voice, data, video etc. Data throughput of up to 10 Gbps Less configuration required due to low complexity Easy implementation on Layer 2 Consequently, KEYMILE offers an encryption solution that doesn t risk availability in missioncritical systems which is a crucial factor. Quantum cryptography Encryption is only as secure as the random numbers generated and the key it s accessed with. To maintain confidentiality and integrity in communications securely, the encryption technology is very important for the operators of mission-critical networks. Conventional mathematical keys are often not sufficient to guarantee adequate protection. Layer 2 encryption The KEYMILE encryption card encrypts all network traffic transparently and natively on Layer 2 in the unit. Layer 2 devices have two major advantages vis à vis Layer 3-based encryption with IPSec. These are a 62 % saving on overheads and low latency of under one microsecond instead of several milliseconds or even seconds. For the encryption card on the C20 platform, KEYMILE uses a hardware-based QRNG (Quantum Random Number Generator) to generate highly secure keys that really are random. This technology works with quantum states of photons, or light particles. In quantum physics, the occurrence of certain phenomena is truly random. In this case it s the reflection or transmission of a photon via a semi-permeable mirror. Depending on whether the photons are

5 Solution Brief reflected or let through by the mirror, a 0 or a 1 is registered. Based on its inherent randomness, this process is ideal for generating true, non-deterministic random numbers. In the case of central key management, key distribution and management is performed with a secure, hardware-based QRNG randomnumber generator via the key management server. An IDQ Quantum Key Distribution (QKD) server can be added to the C20 solution. The key exchange is executed via the QKD server which is connected via dark fibres. As a result, a man-in-the-middle attack is prevented completely, as the mere attempt at reading the key will involve a change in the polarisation condition of the photons and the attack will be noticed. The independent UNEM network management software monitors the hardware. This process merely checks the signals on the card (keep alive, alarm monitoring, checking redundancy etc.). The management software can t access the card itself directly. The keys must be distributed in a way that is highly trustworthy and protected. This can also be done by generating the keys locally. The decentralized approach specifies that all nodes must be able to communicate with one another. In decentralized systems there is no single-point-of-failure because of dependence on infrastructure. This method prevents the creation of network islands. Key management The purpose of key management is on the one hand to allocate a secret key at the beginning and on the other hand to generate and manage the master keys used. & Oil ys lwa Gas Rai C22 C22 red u Sec C Ser C22 ver 1 ETH GbE C25 RS-232 ities hor Aut C25 C22 city ctri Ele rid G e c eo Vid nferen co ing d Tra Figure 2: Secure communication in mission-critical networks 5

6 ECU1Figure 3: Encryption without changing the main assembly Solution Brief Trustworthy security State-of-the-art, verified and recommended encryption algorithms are applied to guarantee maximum security. Encryption and authentication are carried out through the most secure encryption process available at the moment which is also recommended by the BSI (Federal Office for Information Security) in the TR technical directive. The session keys are updated every 60 seconds and offer fully automatic key management based on the set and forget principle. Asymmetrical encryption processes master key (key encrypting) Algorithm ECC Elliptic Curve Diffie-Hellman ECDH Key length 521 Bit NIST P-521 defined in the FIPS standard Key replacement 60 minutes automatic/manual Authentication X.509 certificate Symmetrical encryption process session key (data encrypting) Algorithm AES-GCM (Galois/counter mode encryption and authentication) Key length 256 Bit Key replacement 60 seconds automatic Centralized and decentralized key distribution Deploy & forget Without changing the network infrastructure, the can be integrated into the existing network easily. This is called bump-in-the-wire deployment. The unit is operated in a free slot on the C20 subrack and connected with the COGE5 core unit via an SFP. As a result, no PC SIPsec C23 1Secured C25 IPsec SECU

7 changes on further end devices nor a reorganisation of the network are required. IPSec installations on the other hand are complex and time-consuming. Compatibility Encryption in the node means that existing terminal equipment that supports no or weak encryption can still be used. This saves significant network-expansion costs. The KEYMILE cyber protection solution offers highly secure end-to-end encryption for MPLS-TP-based infrastructure. Backdoor-free Failsafe operation Failsafe operation plays a vital role in missioncritical networks. Therefore, as a unit the is designed to be redundant. Two completely independent encryption units, including current and random-number generator with quantum physics (QRNG), are located on one single card. KEYMILE guarantees a backdoor- and bug-free solution. The products are made in Germany and developed in Germany and Switzerland. ISO compliant certification underpins KEYMILE s cyber security strategy. On request, KEYMILE can offer access to the encryption card s source code. Flexibility Programmable FPGAs allow maximum operational flexibility. The technology offers better customisation and is ideal for high-speed encryption with a data throughput of up to 10 Gbps. Therefore, the solution can be adapted to future changes or expansion, offering optimum, long-term protection of investments. 7

8 KEYMILE cyber security KEYMILE has redefined security in mission-critical systems (MCS) by integrating strong encryption into the C20 platform and by partnering with ID Quantique from Switzerland. IDQ is the leading manufacturer of quantum-secure network encryption. Quantum-key generation, quantum-key distribution and the Layer 2 encryption devices are certified to international FIPS, common-criteria and CAPS(UK) standards. The partnership with IDQ allows KEYMILE to offer encryption devices with data throughputs of 100 Mbps up to 10 x 10 Gbps from the CN4000-C8000 Centauris series to complement the integrated KEYMILE encryption card for the C20 at 10 Gbps. The IDQ devices are compatible with one another and can be configured and managed conveniently via the IDQ CM7 management platform. KEYMILE s cyber-security solution offers a future-proof way of safeguarding investments thanks to its robustness and ability to adapt. KEYMILE s specialists in the cyber security competence centre are on hand to support customers from the planning phase to operation of the infrastructure

Full Hybrid Multi-service Access & Transport Platform for Communications Networks in Mission-Critical Systems

Full Hybrid Multi-service Access & Transport Platform for Communications Networks in Mission-Critical Systems Full Hybrid Multi-service Access & Transport Platform for Communications Networks in Mission-Critical Systems XMC20 for Mission-Critical Systems Network Solutions for Mission-Critical Systems KEYMILE defines

More information

XMC20 Full Hybrid Multi-service Access & Transport Platform for Communications Networks in Mission-Critical Systems

XMC20 Full Hybrid Multi-service Access & Transport Platform for Communications Networks in Mission-Critical Systems XMC20 Full Hybrid Multi-service Access & Transport Platform for Communications Networks in Mission-Critical Systems XMC20 for Mission-Critical Systems Network Solutions for Mission-Critical Systems ABB

More information

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES CASE STUDY Application of High-Assurance Network Encryption Sector : Use Case: Solution: CCTV security HD video Layer 2 network architecture A Major

More information

We are securing the past in a fast moving future. FOX605 multiservice platform.

We are securing the past in a fast moving future. FOX605 multiservice platform. CO M M U N I C AT I O N N E T W O R K S We are securing the past in a fast moving future. FOX605 multiservice platform. 3 FOX605 MULTISERVICE PLATFORM FOR UTILITY NETWORKS Operational networks of utilities

More information

ADVANCED DEFENCE-GRADE

ADVANCED DEFENCE-GRADE ADVANCED DEFENCE-GRADE 1-10GBPS certified ENCRYPTION CN6000 Series Senetas CN6000 Series Encryptors scalable, efficient and certified maximum protection of network data without performance compromise.

More information

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES CASE STUDY Application of High-Assurance Network Encryption Sector: Use Case: Solution: Goverment CCTV security HD video transmission in real time Layer

More information

INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK

INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK CASE STUDY Application of High-Assurance Network Encryption Sector: Use Case: Solution: Government CCTV security Real-time HD video transmission across Layer

More information

Full Hybrid Multi-service Access & Transport Platform for Communications Networks in Mission-Critical Systems

Full Hybrid Multi-service Access & Transport Platform for Communications Networks in Mission-Critical Systems Full Hybrid Multi-service Access & Transport Platform for Communications Networks in Mission-Critical Systems XMC20 for Mission-Critical Systems Network Solutions for Mission-Critical Systems KEYMILE defines

More information

HIGH-ASSURANCE FLEXIBLE 1-10GBPS ENCRYPTION CN6000 SERIES

HIGH-ASSURANCE FLEXIBLE 1-10GBPS ENCRYPTION CN6000 SERIES HIGH-ASSURANCE FLEXIBLE 1-10GBPS ENCRYPTION CN6000 SERIES WHO SHOULD READ THIS DOCUMENT Layer 2 Data Networks Managers and Support staff; Data Network Architects, Data Security Managers and staff, Chief

More information

Practical application of Quantum Key Distribution and wider security implications.

Practical application of Quantum Key Distribution and wider security implications. Practical application of Quantum Key Distribution and wider security implications. Luke Beeson, VP Security 1 The exploding threat landscape. BT's viewpoint. What really matters: Alignment to business

More information

TopSec Product Family Voice encryption at the highest security level

TopSec Product Family Voice encryption at the highest security level Secure Communications Product Brochure 01.01 TopSec Product Family Voice encryption at the highest security level TopSec Product Family At a glance The TopSec product family provides end-to-end voice encryption

More information

Getting to Grips with Public Key Infrastructure (PKI)

Getting to Grips with Public Key Infrastructure (PKI) Getting to Grips with Public Key Infrastructure (PKI) What is a PKI? A Public Key Infrastructure (PKI) is a combination of policies, procedures and technology that forms a trust infrastructure to issue

More information

VERSATILE ENTRY-LEVEL

VERSATILE ENTRY-LEVEL VERSATILE and compact ENTRY-LEVEL 10Mbps-1Gbps ENCRYPTION CN4000 Series Introducing Senetas CN4000 Series Encryptors versatile, entry-level, high-performance encryptors for network data security without

More information

VPN Overview. VPN Types

VPN Overview. VPN Types VPN Types A virtual private network (VPN) connection establishes a secure tunnel between endpoints over a public network such as the Internet. This chapter applies to Site-to-site VPNs on Firepower Threat

More information

SENETAS CERTIFIED HIGH-ASSURANCE NETWORK ENCRYPTION FOR GOVERNMENT

SENETAS CERTIFIED HIGH-ASSURANCE NETWORK ENCRYPTION FOR GOVERNMENT SENETAS CERTIFIED HIGH-ASSURANCE NETWORK ENCRYPTION FOR GOVERNMENT WHO SHOULD READ THIS DOCUMENT Layer 2 Data Networks Managers and Support staff, Data Network Architects, Data Security Managers and staff,

More information

SENETAS CN8000 MULTI-LINK 10x10 GBPS ENCRYPTOR FREQUENTLY ASKED QUESTIONS

SENETAS CN8000 MULTI-LINK 10x10 GBPS ENCRYPTOR FREQUENTLY ASKED QUESTIONS SENETAS CN8000 MULTI-LINK 10x10 GBPS ENCRYPTOR FREQUENTLY ASKED QUESTIONS The CN8000 provides multi-port / multi-link, high-density modularity and flexible multi-tenancy capabilities. The equivalent of

More information

Cisco VPN Internal Service Module for Cisco ISR G2

Cisco VPN Internal Service Module for Cisco ISR G2 Data Sheet Cisco VPN Internal Service Module for Cisco ISR G2 Compact Versatile High-Performance VPN Module The Cisco VPN Internal Service Module (VPN ISM) is a module for the Cisco Integrated Services

More information

SENETAS ENCRYPTION KEY MANAGEMENT STATE-OF-THE-ART KEY MANAGEMENT FOR ROBUST NETWORK SECURITY

SENETAS ENCRYPTION KEY MANAGEMENT STATE-OF-THE-ART KEY MANAGEMENT FOR ROBUST NETWORK SECURITY SENETAS ENCRYPTION KEY MANAGEMENT STATE-OF-THE-ART KEY MANAGEMENT FOR ROBUST NETWORK SECURITY WHO SHOULD READ THIS DOCUMENT System Integrators, Cloud and Data Centre Service Providers, Layer 2 Data Networks

More information

SENETAS CERTIFIED HIGH-ASSURANCE ENCRYPTION FOR THE DEFENCE INDUSTRY

SENETAS CERTIFIED HIGH-ASSURANCE ENCRYPTION FOR THE DEFENCE INDUSTRY SENETAS CERTIFIED HIGH-ASSURANCE ENCRYPTION FOR THE DEFENCE INDUSTRY XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXX-SP0817 The defence industry has become dependent upon the fixed, high-speed

More information

Data Security at Smart Assessor

Data Security at Smart Assessor Data Security at Smart Assessor Page 1 Contents Data Security...3 Hardware...3 Software...4 Data Backups...4 Personnel...5 Web Application Security...5 Encryption of web application traffic...5 User authentication...5

More information

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE Cryptographic Appliances with Integrated Level 3+ Hardware Security Module The BlackVault hardware security platform keeps cryptographic material

More information

Network Encryption. Dr. Michael Ritter. September 18 th, 2015

Network Encryption. Dr. Michael Ritter. September 18 th, 2015 Network Encryption Dr. Michael Ritter September 18 th, 2015 What the heck is Elliptic Curve Diffie-Hellman? Dr. Michael Ritter September 18 th, 2015 ADVA Optical Networking at a Glance Value-added connectivity

More information

UNDERSTANDING SENETAS LAYER 2 ENCRYPTION TECHNICAL-PAPER

UNDERSTANDING SENETAS LAYER 2 ENCRYPTION TECHNICAL-PAPER 1 UNDERSTANDING SENETAS LAYER 2 ENCRYPTION TECHNICAL-PAPER CN encryption devices are purpose built hardware appliances that have been designed and developed in Australia by Senetas Corporation since 1997.

More information

White paper. Combatant command (COCOM) next-generation security architecture

White paper. Combatant command (COCOM) next-generation security architecture Combatant command () next-generation security architecture using NSA Suite B Table of Contents Combatant command () next-generation security architecture using NSA Suite B NSA Commercial Solution for Classified

More information

AVAYA FABRIC CONNECT SOLUTION WITH SENETAS ETHERNET ENCRYPTORS

AVAYA FABRIC CONNECT SOLUTION WITH SENETAS ETHERNET ENCRYPTORS AVAYA FABRIC CONNECT SOLUTION WITH SENETAS ETHERNET ENCRYPTORS This document describes government certified Ethernet encryption solutions for networks incorporating Avaya s IEEE 802.1aq (SPB) Fabric Connect

More information

Substation. Communications. Power Utilities. Application Brochure. Typical users: Transmission & distribution power utilities

Substation. Communications. Power Utilities. Application Brochure. Typical users: Transmission & distribution power utilities Power Utilities Application Brochure Communications Typical users: Transmission & distribution power utilities For more than 30 years, RAD has worked closely with its worldwide energy utility customers

More information

Encryption in high-speed optical networks

Encryption in high-speed optical networks Encryption in high-speed optical networks MRV at a Glance Designing and providing metro packet-optical solutions that power the world s largest networks Over $2B of field-proven installed base 1000+ GLOBAL

More information

Optical Transport Platform

Optical Transport Platform Optical Transport Platform Bandwidth expansion on demand MICROSENS fiber optic solutions - intelligent, reliable, high-performance Optical Transport Platform The MICROSENS Optical Transport Platform provides

More information

Understanding Layer 2 Encryption

Understanding Layer 2 Encryption Understanding Layer 2 Encryption TECHNICAL WHITEPAPER Benefits of Layer 2 Encryption Lowest cost of ownership Better bandwith efficiency (up to 50%) Minimal ongoing maintenance routing updates transparent

More information

Managed Services Rely on us to manage your business services

Managed Services Rely on us to manage your business services Managed Services Rely on us to manage your business services Your business relies on a number of interconnected systems used by different departments from HR, Marketing, Sales and IT. Keeping all these

More information

CN9000 Series 100Gbps Encryptors

CN9000 Series 100Gbps Encryptors CN9000 Series 100Gbps Encryptors Senetas CN9000 Series, 100 Gigabits streamed in 1 second Ultra-Fast, Ultra-Secure, Ultra-Reliable The CN9000 series from Senetas sets a new benchmark for encryption performance;

More information

Assessments Audits CERTIFICATION

Assessments Audits CERTIFICATION IT SECURITY Cyber Security Training Consulting Analyses Assessments Audits CERTIFICATION Increasing connectivity of equipment, systems and applications in cyberspace networks harbours additional risks.

More information

White Paper for Wacom: Cryptography in the STU-541 Tablet

White Paper for Wacom: Cryptography in the STU-541 Tablet Issue 0.2 Commercial In Confidence 1 White Paper for Wacom: Cryptography in the STU-541 Tablet Matthew Dodd matthew@cryptocraft.co.uk Cryptocraft Ltd. Chapel Cottage Broadchalke Salisbury Wiltshire SP5

More information

CardOS Secure Elements for Smart Home Applications

CardOS Secure Elements for Smart Home Applications Infineon Security Partner Network Partner Use Case CardOS Secure Elements for Smart Home Applications Using cryptographic functionality provided by ATOS to secure embedded platforms in Smart Home applications.

More information

Seven Criteria for a Sound Investment in WAN Optimization

Seven Criteria for a Sound Investment in WAN Optimization Seven Criteria for a Sound Investment in WAN Optimization Introduction WAN optimization technology brings three important business benefits to IT organizations: Reduces branch office infrastructure costs

More information

HIGH-ASSURANCE ENCRYPTION SOLUTIONS SECURING FINANCIAL SERVICES DATA IN TRANSIT SOLUTION PAPER

HIGH-ASSURANCE ENCRYPTION SOLUTIONS SECURING FINANCIAL SERVICES DATA IN TRANSIT SOLUTION PAPER HIGH-ASSURANCE ENCRYPTION SOLUTIONS SECURING FINANCIAL SERVICES DATA IN TRANSIT SOLUTION PAPER COMPLIANCE & OBLIGATION Financial Services is one of the most tightly regulated business sectors. The FSA,

More information

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS) Internet Communications Made Safe SteelGate Overview SteelGate Overview SteelGate is a high-performance VPN firewall appliance that Prevent Eliminate threats & attacks at the perimeter Stop unauthorized

More information

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc.

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc. Submitted by SPYRUS, Inc. Contents DT5000 and DT6000 Technology Overview...2 Why DT5000 and DT6000 Encryption Is Different...3 Why DT5000 and DT6000 Encryption Is Different - Summary...4 XTS-AES Sector-Based

More information

MPLS VPN: Business Ready Networks. The cost-effective, scalable and robust network solution

MPLS VPN: Business Ready Networks. The cost-effective, scalable and robust network solution MPLS VPN: Business Ready Networks The cost-effective, scalable and robust network solution 1 Mayuri Ghosh Senior Research Analyst Digital Transformation Practice mayurig@frost.com Priorities and issues

More information

Security Specification

Security Specification Security Specification Security Specification Table of contents 1. Overview 2. Zero-knowledge cryptosystem a. The master password b. Secure user authentication c. Host-proof hosting d. Two-factor authentication

More information

Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications

Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications Infineon Network Use Case Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications Providing Infineon customers with an easy path to integrating TPM support into their products and systems

More information

New Security Features in DLMS/COSEM

New Security Features in DLMS/COSEM New Security Features in DLMS/COSEM A comparison to the Smart Meter Gateway Workshop on Power Line Communications 2015 (HRW), Robin Massink (DNV GL), Gerd Bumiller (HRW) 21.09.2015 21.09.2015 1 Initiated

More information

TeamViewer Security Statement

TeamViewer Security Statement TeamViewer Security Statement 2017 TeamViewer GmbH, Last update: 05/2017 Target Group This document is aimed at professional network administrators. The information in this document is of a rather technical

More information

Requirements for Building Effective Government WLANs

Requirements for Building Effective Government WLANs White Paper Government Requirements for Building Effective Government WLANs CJ Mathias Farpoint Group Introduction With governments just now beginning the adoption of wireless LANs as a key component of

More information

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : ISACA CISA ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : http://killexams.com/pass4sure/exam-detail/cisa QUESTION: 390 Applying a digital signature to data traveling in a

More information

PKI Credentialing Handbook

PKI Credentialing Handbook PKI Credentialing Handbook Contents Introduction...3 Dissecting PKI...4 Components of PKI...6 Digital certificates... 6 Public and private keys... 7 Smart cards... 8 Certificate Authority (CA)... 10 Key

More information

Authentication Technology for a Smart eid Infrastructure.

Authentication Technology for a Smart eid Infrastructure. Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts

More information

WEI Conference SDG&E TCRI Project April 25, 2018 Mark Fowler, CISSP

WEI Conference SDG&E TCRI Project April 25, 2018 Mark Fowler, CISSP WEI Conference SDG&E TCRI Project April 25, 2018 Mark Fowler, CISSP San Diego Gas & Electric Subsidiary of Sempra Energy 4100 Full-Time Employees Regulated public utility Providing clean, safe & reliable

More information

Smart Meter Security. Martin Klimke, Principle of Technical Marketing Infineon Chip Card and Security

Smart Meter Security. Martin Klimke, Principle of Technical Marketing Infineon Chip Card and Security Smart Meter Security Martin Klimke, Principle of Technical Marketing Infineon Chip Card and Security Smart Grids: Advanced power control, intelligence and communications New Business models and Services

More information

Virtual private networks

Virtual private networks Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible

More information

Securing Network Communications

Securing Network Communications Securing Network Communications Demonstration: Securing network access with Whitenoise Labs identity management, one-time-pad dynamic authentication, and onetime-pad authenticated encryption. Use of Whitenoise

More information

THETARAY ANOMALY DETECTION ALGORITHMS ARE A GAME CHANGER

THETARAY ANOMALY DETECTION ALGORITHMS ARE A GAME CHANGER Utility Network UPGRADES MADE SIMPLE MATHEMATICAL EVOLUTIONS FOR RISK MANAGEMENT: THETARAY ANOMALY DETECTION ALGORITHMS ARE A GAME CHANGER WHITEPAPER 1 THE UTILITY TELECOMMUNICATIONS INFRASTRUCTURE The

More information

Marc Hentsch Sales Engineer

Marc Hentsch Sales Engineer Marc Hentsch Sales Engineer marc.hentsch@idquantique.com Ch. de la Marbrerie, 3 Tel: +41 (0)22 301 83 71 1227 Carouge / Geneva Fax: +41 (0)22 301 83 79 Switzerland www.idquantique.com Presentation outline

More information

R&S SITLine ETH Ethernet Encryptor Secure data transmission via landline, radio relay and satellite links up to 40 Gbit/s

R&S SITLine ETH Ethernet Encryptor Secure data transmission via landline, radio relay and satellite links up to 40 Gbit/s SITLine-ETH_bro_en_5214-0724-12_v1100.indd 1 Product Brochure 11.00 You act. We protect. Encryption and IT security by Rohde & Schwarz SIT. Secure Communications R&S SITLine ETH Ethernet Encryptor Secure

More information

Securing V2X communications with Infineon HSM

Securing V2X communications with Infineon HSM Infineon Security Partner Network Securing V2X communications with Infineon HSM Savari and Infineon The Sign of Trust for V2X Products SLI 97 www.infineon.com/ispn Use case Application context and security

More information

Quantum Secure Network - Architecture and Applications -

Quantum Secure Network - Architecture and Applications - [NEC Group Internal Use Only] 4 th ETSI/IQS Workshop on Quantum-Safe Cryptography Quantum Secure Network - Architecture and Applications - A. Tajima 1, T. Kondoh 1, T. Ochi 1, M. Fujiwara 2, K. Yoshino

More information

Datacryptor AP Layer 3 IP Encryptor

Datacryptor AP Layer 3 IP Encryptor > Datacryptor AP Layer 3 IP Encryptor www.thalesesec.com SECURITY Technical Specifications Cryptography Protocols Key Management Physical Interfaces Device Management Security Features Certifications Regulatory

More information

ABB Communication Networks Latest News FOX615 / References with TROPOS Mesh

ABB Communication Networks Latest News FOX615 / References with TROPOS Mesh Christian Köhler, Network Management Forum, 09. October 2013 ABB Communication Networks Latest News FOX615 / References with TROPOS Mesh October 14, 2013 Slide 1 Why ABB for Utility Communication solutions

More information

About FIPS, NGE, and AnyConnect

About FIPS, NGE, and AnyConnect About FIPS, NGE, and AnyConnect, on page 1 Configure FIPS for the AnyConnect Core VPN Client, on page 4 Configure FIPS for the Network Access Manager, on page 5 About FIPS, NGE, and AnyConnect AnyConnect

More information

HARDWARE SECURITY MODULES (HSMs)

HARDWARE SECURITY MODULES (HSMs) HARDWARE SECURITY MODULES (HSMs) Cryptography: The basics Protection of data by using keys based on complex, randomly-generated, unique numbers Data is processed by using standard algorithms (mathematical

More information

e-commerce Study Guide Test 2. Security Chapter 10

e-commerce Study Guide Test 2. Security Chapter 10 e-commerce Study Guide Test 2. Security Chapter 10 True/False Indicate whether the sentence or statement is true or false. 1. Necessity refers to preventing data delays or denials (removal) within the

More information

Cigré Colloquium SC D2 / India 2013 Paper D SMART, UTILITY-GRADE WI-FI MESH FOR DISTRIBUTION GRIDS

Cigré Colloquium SC D2 / India 2013 Paper D SMART, UTILITY-GRADE WI-FI MESH FOR DISTRIBUTION GRIDS P. Schwyter, Ph.Schneider - ABB Switzerland Ltd. Cigré Colloquium SC D2 / India 2013 Paper D2-01-04 SMART, UTILITY-GRADE WI-FI FOR DISTRIBUTION GRIDS October 21, 2013 Slide 1 D2-01_04 Authors & Topics

More information

Communication Service Provider

Communication Service Provider Communication Service Provider Rigstar Industrial Telecom Calgary, Alberta rigstar.ca 227 Exploration Avenue SE 403.243.0600 info@rigstar.ca Content Vision Section #1. Vision & Mission Statement 02 Section

More information

TopSec Mobile Secure voice encryption for smartphones and laptops

TopSec Mobile Secure voice encryption for smartphones and laptops Secure Communications Product Brochure 02.00 TopSec Mobile Secure voice encryption for smartphones and laptops TopSec Mobile At a glance The TopSec Mobile is a mobile encryption device for secure worldwide

More information

Paul A. Karger

Paul A. Karger Privacy and Security Threat Analysis of the Federal Employee Personal Identity Verification (PIV) Program Paul A. Karger karger@watson.ibm.com Outline Identify specific problem with FIPS 201 Problem of

More information

zsah Cloud Offering Security FAQ In partnership with Clearswift

zsah Cloud Offering Security FAQ In partnership with Clearswift zsah Cloud Offering Security FAQ In partnership with Clearswift zsah s Cloud Offering Overview zsah Main office and Data Centres Our main office is located in central London with support staff available

More information

SECURITY OF CPS: SECURE EMBEDDED SYSTEMS AS A BASIS

SECURITY OF CPS: SECURE EMBEDDED SYSTEMS AS A BASIS SECURITY OF CPS: SECURE EMBEDDED SYSTEMS AS A BASIS Christoph Krauß, christoph.krauss@aisec.fraunhofer.de Dagstuhl Seminar 11441: Science and Engineering of CPS, November 2011 Overview Introduction Securing

More information

Choosing the Right. Ethernet Solution. How to Make the Best Choice for Your Business

Choosing the Right. Ethernet Solution. How to Make the Best Choice for Your Business Choosing the Right Ethernet Solution How to Make the Best Choice for Your Business TABLE OF CONTENTS Introduction 3 CH. 1 Why Do Organizations Choose Ethernet? 4 CH. 2 What Type of Ethernet Solutions Will

More information

Optical MSAN. For active and passive optical Ethernet

Optical MSAN. For active and passive optical Ethernet Optical MSAN For active and passive optical Ethernet Optical MSAN MileGate Fibre Series We have been very happy with the quality of KEYMILE products since the start of the optical-fibre expansion project.

More information

IP VPn COMMITTED TO QUALITY

IP VPn COMMITTED TO QUALITY IP VPn COMMITTED TO QUALITY Intraselect THE RIGHT SERVICE FOR ALL AND ANY REQUIREMENTS CONNECTIVITY TAILORED TO YOUR BUSINESS Businesses face an array of connectivity challenges. They need high bandwidth

More information

Alcatel OmniAccess 200 Series

Alcatel OmniAccess 200 Series Alcatel OmniAccess Alcatel OmniAccess 200 Series Security Appliance The corporate enterprise s most valued asset is mission critical data whether it is accessed by only a few or many thousands of employees.

More information

Network Capacity Expansion System

Network Capacity Expansion System Network Capacity Expansion System Expanding Capacity of Wide Area Networks at Remote and Mobile Sites Multisite and global organizations today are facing several unique wide area network (WAN) challenges:

More information

TB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored

TB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored the onbase cloud ONBASE CLOUD // Experience Matters The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, an established history of

More information

MASP Chapter on Safety and Security

MASP Chapter on Safety and Security MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio

More information

WHITE PAPER. Eliminating GPS Dependency for Real-Time Wide-Area Syncrophasor Applications. White paper by Net Insight

WHITE PAPER. Eliminating GPS Dependency for Real-Time Wide-Area Syncrophasor Applications. White paper by Net Insight Eliminating GPS Dependency for Real-Time Wide-Area Syncrophasor Applications White paper by Net Insight Net Insight AB, Sweden September 2012 WHITE PAPER ABSTRACT Today s society is becoming increasingly

More information

CompTIA Security+ (2008 Edition) Exam

CompTIA Security+ (2008 Edition) Exam CompTIA SY0-201 CompTIA Security+ (2008 Edition) Exam Version: 7.20 Topic 1, Volume A QUESTION NO: 1 Which of the following cryptography types provides the same level of security but uses smaller key sizes

More information

Secure Connectivity for Multi-Site Organisations

Secure Connectivity for Multi-Site Organisations Secure Connectivity for Multi-Site Organisations Solution for Critical Connections Flexible Solution for Diverse Environments Insta is a (Virtual Private Networking) solution enabling secure connectivity

More information

Securing IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region

Securing IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region Securing IoT devices with STM32 & STSAFE Products family Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region 2 The leading provider of products and solutions for Smart Driving and

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 2 Cryptographic Tools First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Cryptographic Tools cryptographic algorithms

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

VIKING. Vital Infrastructure, Networks, Information and Control Systems Management. A Research Project in the EU Seventh Framework Programme

VIKING. Vital Infrastructure, Networks, Information and Control Systems Management. A Research Project in the EU Seventh Framework Programme VIKING Vital Infrastructure, Networks, Information and Control Systems Management A Research Project in the EU Seventh Framework Programme Mathias Ekstedt, PhD Industrial Information and Control Systems

More information

BIG DATA INDUSTRY PAPER

BIG DATA INDUSTRY PAPER BIG DATA INDUSTRY PAPER Encryption Key Management INFORMATION-RICH BIG DATA IS UNDER INCREASING THREAT OF THEFT AND BUSINESS DISRUPTION. AS THE NETWORKS AND TECHNOLOGIES THAT ENABLE BIG DATA COLLECTION,

More information

Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015

Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015 Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015 What Could It Cost You? Average of $0.58 a record According to the Verizon

More information

4K DisplayPort Single Display KVM over IP Extender

4K DisplayPort Single Display KVM over IP Extender 1 4K DisplayPort Single Display KVM over IP Extender KE9950 / KE9952 The KE9950 / KE9952 4K DisplayPort Single Display KVM over IP Extender consists of a high performance IP-based transmitter (KE9950T

More information

ACCESSNET -T IP For professional TETRA communications. /en

ACCESSNET -T IP For professional TETRA communications.  /en For professional TETRA communications is the comprehensive and efficient solution for all professional mobile radio applications. www.hytera.de /en At a glance For professional TETRA Communications TETRA

More information

GPON Gigabit Passive Optical Network

GPON Gigabit Passive Optical Network GPON Gigabit Passive Optical Network A comprehensive product portfolio for high demand networks. Datacom products meet the various requirements for fiber optical network solutions, providing outstanding

More information

Automate sharing. Empower users. Retain control. Utilizes our purposebuilt cloud, not public shared clouds

Automate sharing. Empower users. Retain control. Utilizes our purposebuilt cloud, not public shared clouds EXECUTIVE BRIEF SHAREBASE BY HYLAND Automate sharing. Empower users. Retain control. With ShareBase by Hyland, empower users with enterprise file sync and share (EFSS) technology and retain control over

More information

Introducing Campus Networks

Introducing Campus Networks Cisco Enterprise Architecture Introducing Campus Networks 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 2-2 Campus Data Center Combines switching

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

100GBPS, ULTRA-FAST, CERTIFIED HIGH- ASSURANCE NETWORK ENCRYPTION FOR MEGA DATA

100GBPS, ULTRA-FAST, CERTIFIED HIGH- ASSURANCE NETWORK ENCRYPTION FOR MEGA DATA 100GBPS, ULTRA-FAST, CERTIFIED HIGH- ASSURANCE NETWORK ENCRYPTION FOR MEGA DATA Common use case scenarios for 100Gbps certified high-assurance encryption security demanding full line-rate network performance.

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

Connecting Securely to the Cloud

Connecting Securely to the Cloud Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico

More information

INDUSTRIAL SECURITY STORMSHIELD PROTECTION FOR OPERATIONAL NETWORKS. Unified Threat Management and Next-Generation Firewalls Solutions

INDUSTRIAL SECURITY STORMSHIELD PROTECTION FOR OPERATIONAL NETWORKS. Unified Threat Management and Next-Generation Firewalls Solutions INDUSTRIAL SECURITY STORMSHIELD PROTECTION FOR OPERATIONAL NETWORKS Unified Threat Management and Next-Generation Firewalls Solutions Our mission To make the digital world a sustainable and trustworthy

More information

Using Distributed Intelligence to Aid MicroGrid and Distribution Technology Deployment

Using Distributed Intelligence to Aid MicroGrid and Distribution Technology Deployment Using Distributed Intelligence to Aid MicroGrid and Distribution Technology Deployment Aqper 2014 February 18, 2014 Presented by Bob Leigh, CEO of LocalGrid Technologies Outline Who are we? Industry Trends

More information

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a nd International Workshop on Materials Engineering and Computer Sciences (IWMECS 05) Study on data encryption technology in network information security Jianliang Meng, Tao Wu a School of North China Electric

More information

Security analysis and assessment of threats in European signalling systems?

Security analysis and assessment of threats in European signalling systems? Security analysis and assessment of threats in European signalling systems? New Challenges in Railway Operations Dr. Thomas Störtkuhl, Dr. Kai Wollenweber TÜV SÜD Rail Copenhagen, 20 November 2014 Slide

More information

What can the OnBase Cloud do for you? lbmctech.com

What can the OnBase Cloud do for you? lbmctech.com What can the OnBase Cloud do for you? lbmctech.com The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, long tracks of outstanding

More information

FOX615 / FOX612 EROP1 / EROP1-F Router interface module.

FOX615 / FOX612 EROP1 / EROP1-F Router interface module. COMMUNICATION NETWORKS FOX615 / FOX612 / -F Router interface module. 01 complements the FOX multiservice features with sophisticated IP / routing capabilities across MPLS and SDH transport networks 01

More information

Metro Ethernet for Government Enhanced Connectivity Drives the Business Transformation of Government

Metro Ethernet for Government Enhanced Connectivity Drives the Business Transformation of Government Metro Ethernet for Government Enhanced Connectivity Drives the Business Transformation of Government Why You Should Choose Cox Metro Ethernet To meet the critical demands of better supporting local emergency

More information

Datacryptor Key Features. Page 1 of 5. Document Number 40676

Datacryptor Key Features. Page 1 of 5. Document Number 40676 Datacryptor 2000 Key Features Secure Point-to-point Communications for Leased Line Links, Frame Relay, X.25 and IP Networks. Transparent to Data Protocols over Private or public Networks. Standard, high

More information