M2M in the Real World: Security Best Practices and Lessons Learned
|
|
- Marilyn Walker
- 6 years ago
- Views:
Transcription
1 M2M in the Real World: Security Best Practices and Lessons Learned Tyson Macaulay VP Global Telecommunications Strategy & Corporate Development Oct 10, 2013
2 Agenda and Topics M2M compliance and regulatory risks and lesson M2M service provider OPEX, security and lessons M2M threats and controls M2M access M2M roaming Case studies in 4G security
3 Compliance and Regulatory
4 Security Requirements in the IOT Business Requirements - top two 1. Profitability (and/or Efficiency) 2. Regularity and Legal compliance Operations Requirements Audit demonstrates operation compliance Need IOT security standards onem2m, ISO, ETSI Evolving from works such as ISA 99 / IEC
5 IOT CONOPS : new compliance challenges End node End-point Network Application and Storage Old Dimensions of compliance Gateway Application layer (multitenant and roles) New Dimensions of compliance Service Layer Network 5
6 OPEX and security
7 OPEX and security Backhaul is a major operational cost Getting data from the edges across the middle of the network Measured in hundreds of Gbps to Tbps ~30% up to 60% of OPEX in 3G/4G illicit traffic is parasitic Attack traffic from the Internet Attack traffic from subscribers Assume 5% of device are compromised or malfunctioning Torrents and P2P (copyright violations) Pirate drops and compromised services Botnet C&C and outcomes (DOS, spam,, etc)
8 Service Provider OPEX risks today
9 Service Provider OPEX risks 2018
10 M2M threats and controls
11 M2M / IOT reference design Cloud / DC Compute Storage 4G endpoint M2M Gateway M2M endpoint Enterprise Service Provider Network M2M endpoint Consumer ISP M2M endpoint
12 Top Risks to 4G wireless Vulnerabilities Threats Risks Customers suffer fraud Mobile malware + Phishing + SMiShing Wireless APN Back-haul Spectrum U/L and D/L limits Over-the-air signaling DOS Illicit (U/L+D/L) traffic causes excess provisioning and expense Malicious devices with mobile attack apps (ie mobile DDOS) + Mobile malware (rogue proxy and relay) IP range scanning, port scanning Service degradation or outage Operation cost increases Infrastructure DOS (enb- Femtocell-Microcell, MME) M2M devices fragility Edge-based services and caching Telephony and Media /DOS (T/DOS) Cell outages and/or whole-network impacts Machine and M2M service failures, increased maintenance Lawful Intercept Compliance VOIP and Content Delivery infrastructure attacks Customer dis-satisfaction / churn Regulatory non-compliance Meaningful to M2M
13 Wireless Broadband Threat: APN flooding HSPA+ (20Mbps) trials Attacks flood network as broadband devices activate IPS and FW deployed, and tuned for inbound / outbound 60%+ of wireless APN recovered National launch 3G/4G services reduced to 2G speeds without security (pipes fill with attack traffic) 13 October 31, 2013 McAfee Confidential Internal Use Only
14 M2M / IOT security solutions design Off-line image protection
15 M2M Roaming and off-lload security Device heavy Device lite Find / Locate / Wipe Wireless APN DNSBL App whitelist IPS GTP IPS Mobile-AV Carrier-loaded web proxy app enobeb (4G) 3G data fallback SGW (4G) PGW (4G) Carrier-loaded DNS app NobeB (3G) On-Net Wifi offload SGSN GGSN DNSBL SaaS Web / DLP Proxy Third-party Wifi offload
16 Case studies
17 Carrier A North American operator (>40M subs) Primary Vulnerability: Spectrum Limits, Over-the-air signaling DOS Threats: Malicious devices, Mobile malware Risks: higher OPEX + reduced operational efficiency Solutions: GTP-enabled IPS on PGW Operational Security Mobile malware C&C streams M2M fragility Mobile2mobile attacks Mobile to internet attacks Identify IMEI Value-added Security To be determined Status: Operation deployment (25% of PGW) Future: Full operational coverage - Q1 2015
18 Carrier B Multi-nation operator (> 100M subs) Primary Vulnerability: Customer suffer fraud, Wireless APN backhaul, Infrastructure DOS, Edge-based services Threats: Mobile malware, Illicit traffic, Lawful Intercept Compliance Risks: Customer churn + higher OPEX + non-compliance Solutions: GTP-enabled IPS on enb Operational Security Mobile malware C&C streams M2M fragility Mobile2mobile attacks Mobile to internet attacks Infrastructure hardening Traffic replication Identify IMEI Value-added Security Family safety Enterprise device monitoring Status: Proof of concept and testing Future: Operational deployment - Q Future: Value-added service 2015/16
19 Carrier C North American Operator (> 8M subs) Primary Vulnerability: Wireless APN backhaul, Telephony and Media DOS Threats: Illicit traffic, Service outages Risks: Customer churn + higher OPEX + non-compliance Solutions: IPS outside PGW + GGSN, IPS in Content Delivery Infra Operational Security Mobile to internet attacks Infrastructure hardening Value-added Security TBD - planning Status: Full operational coverage Future: Value-added service planning Q1 2014
20 Contact Telco team Tyson Macaulay VP Global Telco Strategy Eric Tuckness Sr Director, Consumer BD Telco Rodel Alejo Director, SaaS Product Management Nipank Mehta Mgr, Sales Engineering October 31, 2013
21 Back-up
22 IPv6 packet staining Untreated IPv6 packet Stain applied as Destination Option header extension Control network Packet Manipulation Device IOT Application Provider network IOT Service Provider network 22 Gateway device may read stain and apply policy or pass to endpoint End point device reads stain and applies policy.
23 IP header staining
24 Chip-based packet processing Network processing unit Central processing unit IP offload engine Security stain Options / Ext header subengine 24
Intelligent and Secure Network
Intelligent and Secure Network BIG-IP IP Global Delivery Intelligence v11.2 IP Intelligence Service Brian Boyan - b.boyan@f5.com Tony Ganzer t.ganzer@f5.com 2 Agenda Welcome & Intro Introduce F5 IP Intelligence
More informationTaking Over Telecom Networks
Taking Over Telecom Networks Hardik Mehta (@hardw00t) Loay Abdelrazek (@sigploit) Taking Over Telecom Networks - Hardik Mehta (@hardw00t) and Loay Abdelrazek (@sigploit) 1 Press Release: some highlights
More informationCybersecurity for Service Providers
Cybersecurity for Service Providers Alexandro Fernandez, CISSP, CISA, CISM, CEH, ECSA, ISO 27001LA, ISO 27001 LI, ITILv3, COBIT5 Security Advanced Services February 2018 There are two types of companies:
More informationApplication Security. Rafal Chrusciel Senior Security Operations Analyst, F5 Networks
Application Security Rafal Chrusciel Senior Security Operations Analyst, F5 Networks r.chrusciel@f5.com Agenda Who are we? Anti-Fraud F5 Silverline DDOS protection WAFaaS Threat intelligence & malware
More informationMobile Security Fall 2013
Mobile Security 14-829 Fall 2013 Patrick Tague Class #4 Telecom System Security General Vulnerabilities Service interruption vulnerabilities Due to increased capacity offered by high speed communication
More informationAddressing Current and Future Wireless Demand
Addressing Current and Future Wireless Demand Dave Wolter Executive Director Radio Technology AT&T Architecture and Planning Rising Demand and The Need to Innovate in the Network 6,732% growth over 13
More informationLeveraging Wi-Fi Calling To Reduced Operator Costs and Improve the Customer Experience
Leveraging Wi-Fi Calling To Reduced Operator Costs and Improve the Customer Experience Steve Northridge Email: Steve.Northridge@Oracle.com Twitter: @stevenorthridge 3 Photo Source: Boston Public Library
More informationAngelo Gentili Head of Business Development, EMEA Region, PartnerNET
Angelo Gentili Head of Business Development, EMEA Region, PartnerNET The Innovation Solution in the Business Security Field. PartnerNet introduces Seqrite Welcome To Dynamic. Scalable. Future-Ready. Why
More informationLTE Backhaul Considerations. June 25,
LTE Backhaul Considerations June 25, 2012 1 AGENDA LTE Requirements and Backhaul Considerations Backhaul Framework and Architecture How to Manage the Network Evolution 2 LTE Business model challenge imperatives:
More informationProteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro
Proteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro 2 Customer Challenges 3 Most Attacks Include Phishing Emails 5 Advanced Malware Difficult to
More informationEnterprise D/DoS Mitigation Solution offering
Enterprise D/DoS Mitigation Solution offering About the Domain TCS Enterprise Security and Risk Management (ESRM) offers full services play in security with integrated security solutions. ESRM s solution
More informationBusiness Strategy Theatre
Business Strategy Theatre Security posture in the age of mobile, social and new threats Steve Pao, GM Security Business 01 May 2014 In the midst of chaos, there is also opportunity. - Sun-Tzu Security:
More informationWhere is the Network Edge? MEC Deployment Options, Business Case & SDN Considerations
Where is the Network Edge? MEC Deployment Options, Business Case & SDN Considerations Ian Goetz, Chief Architect, Vodafone Global Account, Juniper Networks August, 2016 Market Trends & The Network Environment
More informationSecurity Landscape Thorsten Stoeterau Security Systems Engineer - Barracuda Networks
Security Landscape 2018 Thorsten Stoeterau Security Systems Engineer - Barracuda Networks Traditional threat vectors Network Perimeter Email User Remote Access Web Applications Remote Users https://csi.barracuda.com
More informationBest Practices in Healthcare Risk Management. Balancing Frameworks/Compliance and Practical Security
Best Practices in Healthcare Risk Management Balancing Frameworks/Compliance and Practical Security Our industry is full of jargon terms that make it difficult to understand what we are buying To accelerate
More informationIoT Security and Risk Management
SESSION ID: GPS1-R03 IoT Security and Risk Management Tyson Macaulay Chief Security Strategist, Fortinet IoT Security is a BIG STORY! Security as a % of IT Budget 4% 7% 20 Billion+ devices? 2% Source:
More informationARCHITECTING THE NETWORK FOR THE MOBILE IPV6 TRANSITION. Gary Hauser Sr. Marketing Mgr. Mobility Sector Member 3GPP RAN3 WG
ARCHITECTING THE NETWORK FOR THE MOBILE IPV6 TRANSITION Gary Hauser Sr. Marketing Mgr. Mobility Sector Member 3GPP RAN3 WG ghauser@juniper.net AGENDA! The State of Standards IPv6 & Transition in Mobile!
More informationMobile Security Fall 2012
Mobile Security 14-829 Fall 2012 Patrick Tague Class #5 Telecom Infrastructure Attacks Announcements Project teams and topics need to be set soon Project topics must be approved before the proposal can
More informationCato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief
Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based
More informationChristopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud
Christopher Covert Principal Product Manager Enterprise Solutions Group Copyright 2016 Symantec Endpoint Protection Cloud THE PROMISE OF CLOUD COMPUTING We re all moving from challenges like these Large
More informationProtect your business in today s fast-changing security and risk environment.
FACT SHEET Protect your business in today s fast-changing security and risk environment. Email is the main way your business communicates internally and externally, so you rely on it being available all
More informationIntroduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview
IBM Watson on the IBM Cloud Security Overview Introduction IBM Watson on the IBM Cloud helps to transform businesses, enhancing competitive advantage and disrupting industries by unlocking the potential
More informationCISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1
CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/
More informationUnified Access and Aggregation Network Allowing Fixed and Mobile Networks to Converge: The COMBO project
Unified Access and Aggregation Network Allowing Fixed and Mobile Networks to Converge: The COMBO project P. Chanclou, S. Gosselin, T. Mamouni, D. Breuer, E. Weis, J. Torrijos 1 Agenda 2 COMBO project Key
More informationIntel Network Builders Solution Brief. Etisalat* and Intel Virtualizing the Internet. Flexibility
Intel Network Builders Solution Brief Etisalat* and Intel Virtualizing the Internet Gateway Gi-LAN for Service Flexibility Introduction Etisalat Group* is one of the world s leading telecom groups in emerging
More informationA different approach to Application Security
雲端時代企業應用的安全與挑戰 A different approach to Application Security Protecting your most critical business assets APPLICATION ACCESS APPLICATION PROTECTION F5 Networks, Inc 2 F5 s Comprehensive Security Solutions
More informationSecuring Your Business Against the Diversifying Targeted Attacks Leonard Sim
Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim Manager, Client & Partner Services, Asia 1 Agenda 2010 Threats Targeted Attacks Defense Against Targeted Attacks Questions 2
More informationLeverage SDN Principles in LTE to Meet Future Network Demands
Leverage SDN Principles in LTE to Meet Future Network Demands PLATFORM FOR PROFITABLE GROWTH The Role of SDN in LTE Networks SDN refers to specific technologies considered promising for mobile network
More informationCopyright 2011 Trend Micro Inc.
Copyright 2011 Trend Micro Inc. 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF
More informationAddressing Security, Governance and Performance Issues with an XML Gateway as part of a Service Oriented Architecture. Vic Morris CEO Vordel
Addressing Security, Governance and Performance Issues with an XML Gateway as part of a Service Oriented Architecture Vic Morris CEO Vordel Service Oriented Architecture Simple projects implement light
More information5G Reimagined: New Business Models and Enhanced User Experiences
5G Reimagined: New Business Models and Enhanced User Experiences Panelists: Brian Daly Director, Core Network & Government/Regulatory Standards, AT&T Fred Kemmerer Senior Consultant, Strategic Options
More informationSmart and Secured Infrastructure. Rajesh Kumar Technical Consultant
Smart and Secured Infrastructure Rajesh Kumar Technical Consultant IoT Use Cases Smart Cities Connected Vehicles / V2X / ITS Industrial Internet / IIoT / Industry 4.0 Enterprise IoT / Smart Buildings Technical
More informationMobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management
Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management June 29, 2011 1 Forward-Looking Statements This presentation
More informationWELCOME! Using Microsoft Office 365 for a Robust Mail and Conferencing System
WELCOME! Using Microsoft Office 365 for a Robust Mail and Conferencing System Collect Learn Today Cards What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters
More informationF5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe
F5 comprehensive protection against application attacks Jakub Sumpich Territory Manager Eastern Europe j.sumpich@f5.com Evolving Security Threat Landscape cookie tampering Identity Extraction DNS Cache
More informationSecurity Gap Analysis: Aggregrated Results
Email Security Gap Analysis: Aggregrated Results Average rates at which enterprise email security systems miss spam, phishing and malware attachments November 2017 www.cyren.com 1 Email Security Gap Analysis:
More informationDr. Fiona Williams Ericsson
Dr. Fiona Williams Ericsson Safeguarding a new secure energy world 22.09.16 Dr. Fiona Williams, Terni Innovation Event Slide No. 2 success 2016 All rights reserved. success objective The success project
More informationComprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline
Comprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline PRESENTED BY: RICH BIBLE, EMEA SILVERLINE SA November 22, 2018 1 2018 F5 NETWORKS DDoS and Application Attack
More informationBrochure. Dialogic BorderNet Session Border Controller Solutions
Dialogic BorderNet Session Border Controller Solutions Dialogic BorderNet Solutions Supercharge Connections between Networks, Services and Subscribers with Ease and Scale The BorderNet family of session
More informationRedundancy for Corporate Broadband WHITE PAPER
Redundancy for Corporate Broadband WHITE PAPER Introduction Over the past twenty years, broadband service providers have been using different mediums to deliver their services. From wireless to wired (fiber,
More informationReal-time Communications Security and SDN
Real-time Communications Security and SDN 2016 [Type here] Securing the new generation of communications applications, those delivering real-time services including voice, video and Instant Messaging,
More informationEndpoint Protection : Last line of defense?
Endpoint Protection : Last line of defense? First TC Noumea, New Caledonia 10 Sept 2018 Independent Information Security Advisor OVERVIEW UNDERSTANDING ENDPOINT SECURITY AND THE BIG PICTURE Rapid development
More informationRADWIN IP Backhaul Solutions. Application Brochure. Meeting the escalating demand for IP backhaul
Application Brochure RADWIN IP Backhaul Solutions Meeting the escalating demand for IP backhaul With the escalating demand for high bandwidth applications, service providers are focused on extending their
More informationCDG Technology Forum Inter-Technology Networking
CDG Technology Forum Inter-Technology Networking The Impact of 4G on the Packet Core Network April 30, 2008 Gennady Sirota Vice President, Product Management Safe Harbor Statement This presentation contains
More information2018 Cyber Security Predictions
2018 Cyber Security Predictions Rampa Manoonsin Country Manager, Thailand Symantec At a Glance 175M endpoints under protection $5B+ FY18E revenue 2100+ patents Leader in 4 Gartner MQs SWG, EPP, DLP and
More informationSecuring LTE Networks What, Why, and How
Securing LTE Networks What, Why, and How As security threats evolve, service providers must implement comprehensive security for both their LTE network infrastructures and connected devices to protect
More informationCato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN
Cato Cloud Software-defined and Cloud-based Secure Enterprise Network Solution Brief NETWORK + SECURITY IS SIMPLE AGAIN Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The
More informationThe importance of RAN to Core validation as networks evolve to support 5G
The importance of RAN to Core validation as networks evolve to support 5G Stephen Hire Vice President Asia Pacific Cobham Wireless October 2017 Commercial in Confidence Cobham Wireless The industry standard
More informationResilient WAN and Security for Distributed Networks with Cisco Meraki MX
Resilient WAN and Security for Distributed Networks with Cisco Meraki MX Daghan Altas, Director of Product Management BRKSEC-2900 Agenda Problem Cisco CNG Live network creation demo (45m) Product Brief
More informationMoshe Elias, Product Marketing, Allot. Network Intelligence to See, Control & Secure IT
Moshe Elias, Product Marketing, Allot Network Intelligence to See, Control & Secure IT The Digital World is Evolving Internet has become a way of life Commoditization of IT Connected everything Services
More informationReduce Your Network's Attack Surface
WHITE PAPER Reduce Your Network's Attack Surface Ixia's ThreatARMOR Frees Up Security Resources and Personnel The Threat Landscape When you re dealing with network security, one of the primary measurements
More informationDelivering Integrated Cyber Defense for the Cloud Generation Darren Thomson
Delivering Integrated Cyber Defense for the Generation Darren Thomson Vice President & CTO, EMEA Region Symantec In 2009 there were 2,361,414 new piece of malware created. In 2015 that number was 430,555,582
More informationUnderstand iwag Solution for 3G Mobile Data
Understand iwag Solution for 3G Mobile Data Contents Introduction Prerequisites Requirements Components Used Background Information Acronyms Explanation of Terminology Used Understand Mobility Services
More informationCitrix SD-WAN for Optimal Office 365 Connectivity and Performance
Solution Brief Citrix SD-WAN for Optimal Office 365 Connectivity and Performance Evolving Needs for WAN Network Architecture Enterprise networks have historically been architected to provide users access
More informationCisco s Appliance-based Content Security: IronPort and Web Security
Cisco s Appliance-based Content Security: IronPort E-mail and Web Security Hrvoje Dogan Consulting Systems Engineer, Security, Emerging Markets East 2010 Cisco and/or its affiliates. All rights reserved.
More information21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING
WWW.HCLTECH.COM 21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING THE AGE OF DISRUPTION: THE AGE OF CYBER THREATS While the digital era has brought with it significant advances in technology, capabilities
More informationAutomating the Top 20 CIS Critical Security Controls
20 Automating the Top 20 CIS Critical Security Controls SUMMARY It s not easy being today s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises
More informationOver-The-Top (OTT) Aggregation Solutions
Over-The-Top (OTT) Aggregation Solutions Omkar Dharmadhikari, Wireless Architect odharmadhikari@cablelabscom CableLabs February 12, 2019 Agenda Introduction Why aggregation is important? Traditional Aggregation
More informationSecurity for SIP-based VoIP Communications Solutions
Tomorrow Starts Today Security for SIP-based VoIP Communications Solutions Enterprises and small to medium-sized businesses (SMBs) are exposed to potentially debilitating cyber attacks and exploitation
More informationIntegrating Communications Compliance into the Next Generation 4G LTE Network
SS8 : WHITEPAPER : INTEGRATING CC INTO THE NEXT GENERATION 4G LTE NETWORK Integrating Communications Compliance into the Next Generation 4G LTE Network All telecommunication providers that currently or
More informationCisco Firepower with Radware DDoS Mitigation
Cisco Firepower with Radware DDoS Mitigation Business Decision Maker Presentation Eric Grubel VP Business development, Radware February 2017 DDoS in the news French hosting firm flooded with 1 Tbps traffic
More informationToday s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps
Today s workforce is Mobile Most applications are Web-based apps Cloud and SaaSbased applications are being deployed and used faster than ever Hybrid Cloud is the new normal. % plan to migrate >50% of
More informationOverview of the Juniper Networks Mobile Cloud Architecture
Overview of the Juniper Networks Mobile Cloud Architecture Laying the Foundation for a Next-Generation Secure Distributed Telco Cloud White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale,
More informationSmall cells Contents. Overview & market drivers. Small cell and HetNet architecture. Deployment considerations. Introduction. Deployment scenarios
Small cells Contents Introduction Overview & market drivers Small cell and HetNet architecture Deployment considerations Deployment scenarios Small cell site approach Macro scalability 20 UNIK4230 Mobile
More informationIPv6 deployment (challenges) for mobile
IPv6 deployment (challenges) for mobile George Manousakis Network Engineer gmanousak@cosmote.gr 5 December 2017 / Annual UK IPv6 Council Meeting Since 2015 common brand name for all services (fixed/mobile/b2b/etc)
More informationSecure Telephony Enabled Middle-box (STEM)
Report on Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen 04/14/2003 Dr. Mark Stamp - SJSU - CS 265 - Spring 2003 Table of Content 1. Introduction 1 2. IP Telephony Overview.. 1 2.1 Major Components
More informationFuture Internet and 5G Using Customer Edge Switching and Ubiquitous Trust Processing + what is it and what are the benefits
Future Internet and 5G Using Customer Edge Switching and Ubiquitous Trust Processing + what is it and what are the benefits Raimo Kantola raimo.kantola@aalto.fi www.re2ee.org August 21 st, 2015 What is
More informationNever Drop a Call With TecInfo SIP Proxy White Paper
Innovative Solutions. Trusted Performance. Intelligently Engineered. Never Drop a Call With TecInfo SIP Proxy White Paper TecInfo SD-WAN product - PowerLink - enables real time traffic like VoIP, video
More informationCABLE MSO AND TELCO USE CASE HANDBOOK
CALE MSO AND TELCO USE CASE HANDOOK ackground Service providers, including cable multiple-system operators, or MSOs, telecom network operators and other broadband providers, manage and secure multiple
More informationBusiness Case for the Cisco ASR 5500 Mobile Multimedia Core Solution
Business Case for the Cisco ASR 5500 Mobile Multimedia Core Solution Executive Summary The scale, use and technologies of mobile broadband networks are changing rapidly. Mobile broadband growth continues
More informationCHALLENGES TO LTE PROGRESS. The Evolution of Mobile Broadband and Regulatory Policy
CHALLENGES TO LTE PROGRESS The Evolution of Mobile Broadband and Regulatory Policy LTE North America, Dallas, Texas, November 21-22, 2013 4G Americas Board of Governors Exabytes per Month Traffic Growth
More informationIPv6 migration strategies for mobile networks
migration strategies for mobile s White paper To cope with the increasing demand for IP addresses, most mobile operators (MNOs) have deployed Carrier Grade Network Address Translation (CG-NAT). Introducing
More informationChanging the Voice of
Changing the Voice of Telecommunications Level 3 Solutions for Voice Service Providers Competitive: It is a word you know well. As a voice services provider, you face a unique set of challenges that originate
More informationDesigning and Building a Cybersecurity Program
Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (CSF) Larry Wilson lwilson@umassp.edu ISACA Breakfast Meeting January, 2016 Designing & Building a Cybersecurity
More informationAllot Corporate Presentation
Allot Corporate Presentation (NASDAQ, TASE: ALLT) November 2018 Forward Looking Statements This presentation contains forward-looking statements, which express the current beliefs and expectations of Company
More information5G NSA for MME. Feature Summary and Revision History
Feature Summary and Revision History, on page 1 Feature Description, on page 2 How It Works, on page 5 Configuring, on page 10 Monitoring and Troubleshooting, on page 13 Feature Summary and Revision History
More informationWhat s next for your data center? Power Your Evolution with Physical and Virtual ADCs. Jeppe Koefoed Wim Zandee Field sales, Nordics
What s next for your data center? Power Your Evolution with Physical and Virtual ADCs. Jeppe Koefoed Wim Zandee Field sales, Nordics Vision: Everything as a service Speed Scalability Speed to Market
More informationCOPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1
COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1 Worldwide Infrastructure Security Report Highlights Volume XIII C F Chui, Principal Security Technologist COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 2 Overview This presentation
More informationPROVIDING SECURE INTERNET SERVICES ARBOR TMS INTEGRATION
PROVIDING SECURE INTERNET SERVICES ARBOR TMS INTEGRATION HANNU AHOLA, ALCATEL-LUCENT September 16 th, 2011 AGENDA 1. Introduction 2. Arbor solution overview 3. Integrated threat mitigation 4. Use cases
More informationTOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS
TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS 1 Introduction Your data and infrastructure are at the heart of your business. Your employees, business partners, and
More informationOVERVIEW. Virtual Solutions for Your NFV Environment
Contents Introduction 3 Build a Virtualized Network with F5 s 4 Virtual Firewall (vfw) 4 Virtual CGNAT (vcgn) 4 Virtual Policy Charging Enforcement Function (vpcef) 4 Virtual Content Insertion (vci) 4
More informationCato Networks. Network Security as a Service
Cato s Security as a Service SHLOMO KRAMER, CEO Founder: Check Point (CHKP), Imperva (IMPV) Investor: Palo Alto s (PANW), Trusteer, GUR SHATZ, CTO VP R&D, PM: Imperva (IMPV) Founder: Incapsula (Imperva
More informationRadware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper
Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper Table of Contents Abstract...3 Understanding Online Business
More informationMicrosoft Security Management
Microsoft Security Management MICROSOFT SECURITY MANAGEMENT SECURITY MANAGEMENT CHALLENGES Some large financial services organizations have as many as 40 or more different security vendors inside their
More informationCybersecurity Roadmap: Global Healthcare Security Architecture
SESSION ID: TECH-W02F Cybersecurity Roadmap: Global Healthcare Security Architecture Nick H. Yoo Chief Security Architect Disclosure No affiliation to any vendor products No vendor endorsements Products
More informationThe SANS Institute Top 20 Critical Security Controls. Compliance Guide
The SANS Institute Top 20 Critical Security Controls Compliance Guide February 2014 The Need for a Risk-Based Approach A common factor across many recent security breaches is that the targeted enterprise
More informationExperimental Analysis of the Femtocell Location Verification Techniques
Experimental Analysis of the Femtocell Location Verification Techniques Ravishankar Borgaonkar, Kevin Redon and Jean-Pierre Seifert Security in Telecommunication Technical University Berlin and Deutsche
More informationArbor White Paper Keeping the Lights On
Arbor White Paper Keeping the Lights On The Importance of DDoS Defense in Business Continuity Planning About Arbor Networks Arbor Networks Inc., the cyber security division of NETSCOUT, helps secure the
More informationDeliver Strong Mobile App Security and the Ultimate User Experience
Deliver Strong Mobile App Security and the Ultimate User Experience The Presenters Will LaSala, Director of Services @ VASCO Will has been with VASCO since 2001 and over the years has been involved in
More informationSupply Chain Integrity and Security Assurance for ICT. Mats Nilsson
Supply Chain Integrity and Security Assurance for ICT Mats Nilsson The starting point 2 B Internet users 85% Population coverage 5+ B Mobile subscriptions 10 years of Daily upload E-Books surpassing Print
More informationCisco Cloud Security. How to Protect Business to Support Digital Transformation
Cisco Cloud Security How to Protect Business to Support Digital Transformation Dragan Novakovic Cybersecurity Consulting Systems Engineer January 2018. Security Enables Digitization Digital Disruption,
More informationRuss McRee Bryan Casper
Russ McRee Bryan Casper About us We re part of the security incident response team for Microsoft Online Services Security & Compliance We ask more questions than provide answers This presentation is meant
More informationSeceon s Open Threat Management software
Seceon s Open Threat Management software Seceon s Open Threat Management software (OTM), is a cyber-security advanced threat management platform that visualizes, detects, and eliminates threats in real
More informationWireless over Pseudowires
Wireless over Pseudowires Presented by: Giles Heron Director of Data Network Consulting October 31 st 2006 Agenda The challenge of mobile backhaul Wireless over Pseudowires Reference designs Synchronisation
More informationAT&T Endpoint Security
AT&T Endpoint Security November 2016 Security Drivers Market Drivers Online business 24 x 7, Always on Globalization Virtual Enterprise Business Process / IT Alignment Financial Drivers CapEx / OpEx Reduction
More informationLTE and the path to LTE MTC
JULY 2015 TELIT white paper LTE and the path to LTE MTC A short paper on LTE and optimizing LTE Advanced for Machine Type Communications LTE s Evolutionary Path LTE is distinguished from earlier networks
More informationINICTEL-UNI 15/11/2010. Tecnología de Banda Ancha Inalámbrica LTE
INICTEL-UNI 15/11/2010 Tecnología de Banda Ancha Inalámbrica LTE 1 2Market Overview 2 LTE Presentation / Alcatel-Lucent. Title January 2008 Market Trends iphone (Apple) and G1 (Google) are bandwidth drivers
More informationIBM Next Generation Intrusion Prevention System
IBM Next Generation Intrusion Prevention System Fadly Yahaya SWAT Optimizing the World s Infrastructure Oct 2012 Moscow 2012 IBM Corporation Please note: IBM s statements regarding its plans, directions,
More informationSecurity Policy (EN) v1.3
Security Policy (EN) v1.3 Author: Erik Klein Langenhorst Date: Sept 21, 2017 Classificatie: 2 Intended for stakeholders only Security Policy (EN) v1.5 Pagina 1 van 9 Version History Version Date Name Changes
More informationWi-Fi PROFESSIONAL SERVICES SPEED TIME TO MARKET FOR CARRIER Wi-Fi NETWORKS
Wi-Fi PROFESSIONAL SERVICES SPEED TIME TO MARKET FOR CARRIER Wi-Fi NETWORKS Application Note Table of contents Introduction / 1 New revenue opportunities with lightradio Wi-Fi / 2 Simplify evolution with
More information