secunet Security Networks AG SINA an Overview Sofia,
|
|
- Joy Chase
- 6 years ago
- Views:
Transcription
1 secunet Security Networks AG SINA an Overview Sofia,
2 Agenda 1 Some facts about secunet 2 SINA Portfolio 3 SINA References 4 Voice Solutions secunet Security Networks AG
3 Some facts about secunet Germany s leading specialist in the area of highly complex IT security solutions Security partnership with the Federal Government of Germany Major shareholder: Giesecke & Devrient Turnover in 2009: 56 million EUR Hamburg Essen Siegen Frankfurt Berlin Dresden Joint development of SINA by BSI (Federal Office for Information Security) and secunet Intellectual Property Rights for SINA: BSI Munich secunet Security Networks AG
4 Agenda 1 Some facts about secunet 2 SINA Portfolio 3 SINA References 4 Voice Solutions secunet Security Networks AG
5 Secure Inter-Network Architecture IT Security Platform IPsec-based VPN solutions Low administration costs due to use of easy-to-handle smartcards and online management Multi-Level-Security allows access to differently classified data Participation of mobile users in SINA secured networks secunet Security Networks AG
6 SINA Product Line Secure Inter-Network Architecture Clients Link Encryptors Gateways Mgmt. / Voice SINA Thin Client SINA L2 SINA Box (crypto gateway) SINA Management SINA Virtual Workstation SINA One Way Gateway 2 (data diode) Voice Since 2002 ~ SINA components secunet Security Networks AG
7 SINA Product Line Secure Inter-Network Architecture Clients Link Encryptors Gateways Mgmt. / (Voice) secunet Security Networks AG
8 SINA Application Scenarios Network 2 Network Secure Satellite Connect Secure Video Conferencing ThinClient 2 Terminal Server Hot Stand-by Secure Voice-Over-IP Mobile User 2 Office LAN secunet Security Networks AG
9 SINA Management PKI-based Identity Management for all SINA components Smartcards providing secure configuration for all SINA components All SINA components receive their configuration information - Initially: from SINA smartcards - Real-time: from the SINA Management Station over SINA secured channels Different SINA management models possible - Centralized all-in-one - Distributed secunet Security Networks AG
10 Gateways SINA Box Runs with SINA OS (SINA Linux) Boots from CD-ROM/Flash-ROM No information stored on Box itself All crypto keys, configuration data and SA on smartcard Throughput rates up to 1GB/Hot-Stand-by available For use up to SECRET UE secunet Security Networks AG
11 Gateways SINA L2 Throughput rate up to 10GBit/s Secures Fast or GB Ethernet structures Transparent Layer 2 transmission for VLAN, MPLS Seamless integration into the line between provider and LAN 100 MBit, 1GB, 10 GB variants available P2P and MP2MP secunet Security Networks AG
12 SINA Clients: Virtual Workstation Mobile solution for processing, transfer and storage of classified data Virtualisation technology: Allows parallel sessions on virtual, encapsulated PCs Offline security: CFS enables session-specific local storage of data Physical interface policy can be configured Bundle Solution: HW/SW Up to RESTREINT UE secunet Security Networks AG
13 SINA Clients: Thin Client No hard-drive, no sensitive data: Ideal for Home-office Graphic display of Terminal Server Protocols only Up to six parallel sessions with differently classified data possible Secure authentication Supports all standard TS protocols Up to SECRET UE secunet Security Networks AG
14 Agenda 1 Some facts about secunet 2 SINA Portfolio 3 SINA References 4 Voice Solutions secunet Security Networks AG
15 Some SINA References Military Communication Systems EU projects: Council, Commission, Agencies German Border Police, 400+ locations, fully meshed European Battlegroups German Ministry of Foreign Affair; Worldwide Embassy network, 200+ locations, centrally managed German Armed Forces and Ministry of Defense; 14,000+ components secunet Security Networks AG
16 SINA Worldwide Intranet for German Embassies 230 embassies, central location Berlin Information transfer via internet or satellite communications Online management of crypto components Mobile users can safely connect to network No data left in case of emergency Tokyo Kiev Berlin Vienna secunet Security Networks AG
17 SINA German Federal Police >400 locations Fully-meshed network Hamburg Berlin Munich Anywhere secunet Security Networks AG
18 SINA Usecase Defense Provide support for redundant network connections Allow access to data with different levels of classification Support mobile devices Mission VSAT VSAT Battlefield Information System SINA Mission Confidential VSAT National Restricted SINA Mail MOD SINA Intra net SINA Log SINA secunet Security Networks AG
19 Agenda 1 Some facts about secunet 2 SINA Portfolio 3 SINA References 4 Voice Solutions secunet Security Networks AG
20 Voice Solutions (I) Rohde & Schwarz TopSec Mobile: External voice encryption device with integrated mic/speaker Connects via Bluetooth interface to majority of mobile phones Hardware encryption: Elliptical curves + AES 256 bit Plug & Play secunet Security Networks AG
21 Voice Solutions (II) Secusmart: Secuvoice No external device needed; insertion of smartcard into micro SD-slot of mobile phone Limited to use with Nokia mobile phones Hardware encryption: Elliptical curves + AES 128 bit Plug & Play secunet Security Networks AG
22 Thank you very much for your attention! secunet Security Networks AG
Intelligent Solutions for the most Rigorous IT Security Requirements
Intelligent Solutions for the most Rigorous IT Security Requirements 1 2 1 2 3 Information Security from the Architects of Modern Encryption Systems SINA (Secure Inter-Network Architecture) enables the
More informationIntelligent Solutions for the Highest IT Security Requirements
Intelligent Solutions for the Highest IT Security Requirements 3 Information security from the architects of modern cryptographic systems SINA (Secure Inter-Network Architecture) enables the protected
More informationFMN / MLS Lessons learned. Praha November 12th, 2013 Holger W. Kalnischkies
FMN / MLS Lessons learned Praha November 12th, 2013 Holger W. Kalnischkies MLS a definition Protecting sensitve or confidental data is paramount to most organizations Having information of different security
More informationCompany profile secunet Security Networks AG
Company profile secunet Security Networks AG Profile in brief secunet is one of the leading German providers of high-quality IT security. Over 350 experts work in the areas of cryptography, e-government,
More informationTraining courses 2017 / 2018
Training courses 2017 / 2018 2 S33.201 SINA Basics Basic knowledge of IP and routing Basic knowledge of networks and VPN Basic knowledge of cryptography Administrators who use or will soon use an All-in-One
More informationConformity and Interoperability Key Prerequisites for Security of eid documents. Holger Funke, 27 th April 2017, ID4Africa Windhoek
Conformity and Interoperability Key Prerequisites for Security of eid documents Holger Funke, 27 th April 2017, ID4Africa Windhoek Agenda 1. About secunet Security Networks AG 2. Timeline of interoperability
More informationR&S SITLine ETH Ethernet Encryptor Secure data transmission via landline, radio relay and satellite links up to 40 Gbit/s
SITLine-ETH_bro_en_5214-0724-12_v1100.indd 1 Product Brochure 11.00 You act. We protect. Encryption and IT security by Rohde & Schwarz SIT. Secure Communications R&S SITLine ETH Ethernet Encryptor Secure
More informationCouncil of the European Union Brussels, 23 July 2015 (OR. en)
Council of the European Union Brussels, 23 July 2015 (OR. en) 6629/3/15 REV 3 INFORMATION NOTE From: To: Subject: General Secretariat of the Council Delegations CSCI 10 CSC 48 CIS 8 List of approved cryptographic
More informationMarket Trends and Veridos solutions for epassports & ID Documents
Market Trends and Veridos solutions for epassports & ID Documents Ludger Holtmann, Senior Product & Portfolio Manager Michael Ruhland-Bauer, Head of Product Mangement Documents Agenda Introducing Veridos
More informationTopSec Mobile Tap-proof phone calls
TopSec Mobile Tap-proof phone calls iphone Android smartphone PC Fixed network Satellite Secure Communications Product Brochure 03.00 TopSec Mobile At a glance The TopSec Mobile is a mobile encryption
More informationTopSec Mobile Secure voice encryption for smartphones and laptops
Secure Communications Product Brochure 02.00 TopSec Mobile Secure voice encryption for smartphones and laptops TopSec Mobile At a glance The TopSec Mobile is a mobile encryption device for secure worldwide
More informationCouncil of the European Union Brussels, 20 March 2017 (OR. en)
Council of the European Union Brussels, 20 March 2017 (OR. en) 6433/1/17 REV 1 INFORMATION NOTE From: To: Subject: General Secretariat of the Council Delegations CSCI 4 CSC 50 CIS 2 List of approved cryptographic
More informationSecure Connectivity for Multi-Site Organisations
Secure Connectivity for Multi-Site Organisations Solution for Critical Connections Flexible Solution for Diverse Environments Insta is a (Virtual Private Networking) solution enabling secure connectivity
More informationIP VPn COMMITTED TO QUALITY
IP VPn COMMITTED TO QUALITY Intraselect THE RIGHT SERVICE FOR ALL AND ANY REQUIREMENTS CONNECTIVITY TAILORED TO YOUR BUSINESS Businesses face an array of connectivity challenges. They need high bandwidth
More informationYour Secrets are Safe with Tiger
Your Secrets are Safe with Tiger The more important the message, the greater the outside interest In today s fast moving and everchanging world, secure communications are key to the accomplishment of a
More informationVPN Overview. VPN Types
VPN Types A virtual private network (VPN) connection establishes a secure tunnel between endpoints over a public network such as the Internet. This chapter applies to Site-to-site VPNs on Firepower Threat
More informationEuropean regime for interconnection
European regime for interconnection 8th September 2016 at D7, Tokyo International Forum 1 About us Becker Büttner Held has been operating since 1991. At BBH, lawyers, auditors and tax advisors work hand
More informationA New Satellite Paradigm
A New Satellite Paradigm Ronald van der Breggen Chief Commercial Officer LeoSat June, 2017 Telecommunication Challenges Global Fiber Not Ubiquitous Traditional SatCom Architecture Is Inefficient Polar
More informationCisco 5921 Embedded Services Router
Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms
More informationTHE ULTIMATE SOLUTION TO SECURE MOBILE COMMUNICATIONS AND DEVICES
THE ULTIMATE SOLUTION TO SECURE MOBILE COMMUNICATIONS AND DEVICES Mobility and cybersecurity concerns Why is it important? + 38% worldwide annual growth in enterprise cyber-attacks in 2015. Source : PwC
More informationGlobal Xpress. 10 things you need to know about GX. GLOBAL GOVERNMENT > Solution > GX 10 things
Global Xpress 10 things you need to know about GX GLOBAL GOVERNMENT > Solution > GX 10 things What does GX mean for Governments? The Global Xpress service complements Inmarsat s existing L-Band network
More informationNEXIUM THEATRE. Tactical networks for defence and security forces
w w w. t h a l e s g r o u p. c o m NEXIUM THEATRE Tactical networks for defence and security forces DEFENCE SECURITY B ased on its long experience and worldwide leadership in military communications and
More informationCisco 5921 Embedded Services Router
Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router. It is designed to operate on small, low-power, Linux-based platforms to extend
More informationTopSec Product Family Voice encryption at the highest security level
Secure Communications Product Brochure 01.01 TopSec Product Family Voice encryption at the highest security level TopSec Product Family At a glance The TopSec product family provides end-to-end voice encryption
More informationRequirements for an IAPP
Requirements for an IAPP Slide 1 Agenda Boeing Wireless LAN Environment Scenarios Campus Network (Multiple wireless LANs) Building Network (Wireless LAN/floor) Elements of an IAP Protocol Handoff Cross
More informationHomeland Security Information Sharing Architecture
Homeland Security Information Sharing Architecture National Defense Industrial Association Interoperability and Systems Integration Conference 2 April 2003 William F. Dawson Deputy Intelligence Community
More informationidirect Satellite Routers
idirect Satellite Routers Advancing a Connected World 0213 The idirect Intelligent Platform integrates advanced technology into idirect s product portfolio and management software to address the growing
More informationNational Cyber Security Strategy 2016
National Cyber Security Strategy 2016 26th of April 2017, Athens Samuel Rothenpieler, International Relations Advisor, Federal Office for Information Security (BSI) Mission Statement of the German Federal
More informationVeloCloud Cloud-Delivered WAN Fast. Simple. Secure. KUHN CONSULTING GmbH
VeloCloud Cloud-Delivered WAN Fast. Simple. Secure. 1 Agenda 1. Overview and company presentation 2. Solution presentation 3. Main benefits to show to customers 4. Deployment models 2 VeloCloud Company
More informationNew Security Features in DLMS/COSEM
New Security Features in DLMS/COSEM A comparison to the Smart Meter Gateway Workshop on Power Line Communications 2015 (HRW), Robin Massink (DNV GL), Gerd Bumiller (HRW) 21.09.2015 21.09.2015 1 Initiated
More informationidirect Satellite Routers
idirect Satellite Routers Advancing a Connected World 0316 idirect s product portfolio combines innovative technology and solutions to support all your networking requirements for bandwidth, location,
More informationCooperative ITS Corridor Joint Deployment
Cooperative ITS Corridor Joint Deployment Secure V2X Communication Glasgow, June 8th 2016 Markus Ullmann Federal Office for Information Security (BSI) Outline Cooperative Intelligent Transport System (C-ITS)
More informationTESTA-ng. TESTA 20 years of history October TESTA-ng Brief Presentation. October 2017
TESTA-ng TESTA 20 years of history TESTA-ng Brief Presentation 1 Agenda Introduction on TESTA Objectives Mission A brief history Who is connected today? Multiple communities of interests Applications using
More informationAVAYA FABRIC CONNECT SOLUTION WITH SENETAS ETHERNET ENCRYPTORS
AVAYA FABRIC CONNECT SOLUTION WITH SENETAS ETHERNET ENCRYPTORS This document describes government certified Ethernet encryption solutions for networks incorporating Avaya s IEEE 802.1aq (SPB) Fabric Connect
More informationVPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist
VPN World MENOG 16 Istanbul-Turkey By Ziad Zubidah Network Security Specialist What is this Van used for?! Armed Van It used in secure transporting for valuable goods from one place to another. It is bullet
More informationFeature Notes LCOS
Feature Notes LCOS 10.0 www.lancom-systems.com LCOS 10.0 A new milestone LCOS 10.0 The new version of LCOS packs a multitude of highlights! Your LANCOM devices now support Software-defined Networking (SDN)
More informationA Plexos International Network Operating Technology May 2006
A Plexos International Network Operating Technology May 2006 BY 4664 Jamestown Ave, Suite 325 Baton Rouge, LA 70808 225.218.8002 1.0 Introduction. is a software environment comprised of proven technologies
More informationCloud Security Best Practices
Cloud Security Best Practices Cohesive Networks - your applications secured Our family of security and connectivity solutions, VNS3, protects cloud-based applications from exploitation by hackers, criminal
More informationMind Over Matter: The Pragmatic, Strong, and Smart Approach to Security
Mind Over Matter: The Pragmatic, Strong, and Smart Approach to Security SESSION ID: SPO1-T09 Ammar Alkassar CEO Sirrix AG security technologies Saarbrücken, Germany Dr. Kim Nguyen Managing Director D-Trust
More informationParallelizing IPsec: switching SMP to On is not even half the way
Parallelizing IPsec: switching SMP to On is not even half the way Steffen Klassert secunet Security Networks AG Dresden June 11 2010 Table of contents Some basics about IPsec About the IPsec performance
More informationSupporting critical IP applications across the enterprise from VoIP and VPN, to streaming media
The idirect Intelligent Platform integrates advanced technology into idirect s product portfolio and management software to address the growing complexity of deploying and managing global IP networks.
More informationSecurity for Wireless Handhelds
wireless security solutions security applications developer toolkits professional services Security for Wireless Handhelds integrating strong, transparent security without increasing costs or time-to-market
More informationINTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES
INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES CASE STUDY Application of High-Assurance Network Encryption Sector : Use Case: Solution: CCTV security HD video Layer 2 network architecture A Major
More informationSECURITY ARCHITECTURES CARSTEN WEINHOLD
Department of Computer Science Institute of System Architecture, Operating Systems Group SECURITY ARCHITECTURES CARSTEN WEINHOLD MOTIVATION Common observations: Complex software has security bugs Users
More informationInmarsat Global Xpress. Global, Mobile, Trusted.
Inmarsat Global Xpress Global, Mobile, Trusted. The New Standard in Mobile Satellite Communications Global Xpress Changes Everything: Worldwide wideband coverage Seamless mobile roaming Interoperable with
More informationWireless LAN Example Scenario
CHAPTER 5 The wireless LAN relies on high-speed wireless hot spots. Unlike public hot spots which have begun to appear in airports, hotel lobbies, and coffee shops, allowing anyone with a wireless-enabled
More informationElectron Progress EAD
Electron Progress EAD Systems for early warning of the population with end - acoustic devices Sofia 2011 1 Who we are A Bulgarian company established in 1976 as Institute for Defense Electronics, which
More informationMarkus Bartsch. German Smart Metering and European Privacy Needs
Markus Bartsch German Smart Metering and European Privacy Needs Smart Grid (and Metering) Customer Satisfaction 3 Years 3 10 Years Identity Management Asset Management Feeder Automation Smart Meters Privacy
More informationHUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date
HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN Issue 1.1 Date 2014-03-14 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or
More informationNational Policy Governing the Use of High Assurance Internet Protocol Encryptor (HAIPE) Products
Committee on National Security Systems CNSS Policy No. 19 February 2007 National Policy Governing the Use of High Assurance Internet Protocol Encryptor (HAIPE) Products This document prescribes minimum
More informationHughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: FIPS Non-Proprietary Security Policy
Hughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: 3.1.0.4 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 0.5 Prepared for: Prepared by: Hughes Network
More informationExam: Title : Routing & Switching Exam (RSS) Ver :
Exam: 646-521 Title : Routing & Switching Exam (RSS) Ver : 01.02.04 Missing answer will be provided shortly. QUESTION 1 What does the Catalyst 6500 Network Analysis Module (NAM) do? (Choose two) A. Gives
More informationDIMETRA X CORE DATA SHEET DIMETRA X CORE
DIMETRA X CORE FOR GOVERNMENT ORGANISATIONS, PUBLIC SAFETY AGENCIES AND LARGE ENTERPRISES, MOBILE BROADBAND IS ON THE WAY. AND WHILE YOU DON T KNOW WHEN THAT CHANGE IS COMING YOU CAN BE READY FOR IT WITH
More informationPRODUCT OVERVIEW. SecurePIM. Components
SecurePIM SecurePIM provides secure communication and access to corporate data from ios and Android smartphones or tablets. It enables employees to work remotely, access business-critical data and connect
More informationIdentify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)
Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install
More informationThe new maximum security smartphone No Camera - No GPS - No Recorder
The new maximum security smartphone No Camera - No GPS - No Recorder The new maximum security smartphone DASS H-ONE Smartphone is your smart choice to be protected and connected the whole time. What is
More informationGiesecke+Devrient. Company Presentation
Giesecke+Devrient Company Presentation Our vision G+D makes the lives of billions of people more secure We want to be the global leading provider of security technologies, both in the digital and physical
More informationOpen Mobile API The enabler of Mobile ID solutions. Alexander Summerer, Giesecke & Devrient 30th Oct. 2014
The enabler of solutions Alexander Summerer, Giesecke & Devrient 30th Oct. 2014 SIMalliance Allows usage of Secure Elements in Mobile Devices Designed for Open Handset OS platforms Common API for Apps
More informationInmarsat Global Xpress Global, Mobile, Trusted. U.S. Government > Services > Global Xpress
Inmarsat Global Xpress Global, Mobile, Trusted. U.S. Government > Services > Global Xpress The New Standard in Mobile Satellite Communications As a long-trusted partner of the U.S. government sector, we
More informationSecure Extension of L3 VPN s over IP-Based Wide Area Networks
White Paper Secure Extension of L3 VPN s over IP-Based Wide Area Networks Abstract Authors This paper examines how recent network-based virtualization Mark Mitch Mitchiner technology innovation can be
More informationASEAN e-authentication Workshop Balwinder Sahota
ASEAN e-authentication Workshop Balwinder Sahota Agenda ASEAN Single Window (ASW) What is ATIGA Form D The information flow of ATIGA Form D and related documents Security Requirements Challenges in Implementation
More informationEXAM - N CompTIA Network+ Certification Exam. Buy Full Product.
CompTIA EXAM - N10-006 CompTIA Network+ Certification Exam Buy Full Product http://www.examskey.com/n10-006.html Examskey CompTIA N10-006 exam demo product is here for you to test the quality of the product.
More informationHigh Resistance Firewall genugate
High Resistance Firewall genugate Robust Security for Networks At the heart of the genugate solution is the application level gateway. This advanced security system checks all data stream content. The
More informationCisco Connected Government
Cisco Connected Government Business Overview Engr. Marnie Tolosa Business Development Manager Cisco Systems, Inc. 1 Agenda Overview of Cisco Connected Government How Do I Get There? Why Cisco? Discussion
More informationCSC 6575: Internet Security Fall 2017
CSC 6575: Internet Security Fall 2017 Network Security Devices IP Security Mohammad Ashiqur Rahman Department of Computer Science College of Engineering Tennessee Tech University 2 IPSec Agenda Architecture
More informationPacket Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI
Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI Topology Addressing Table R1 R2 R3 Device Interface IP Address Subnet Mask Default Gateway Switch Port G0/0 192.168.1.1 255.255.255.0
More informationCSCE 715: Network Systems Security
CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina Security in Network Layer Implementing security in application layer provides flexibility in security
More informationMetro Ethernet for Government Enhanced Connectivity Drives the Business Transformation of Government
Metro Ethernet for Government Enhanced Connectivity Drives the Business Transformation of Government Why You Should Choose Cox Metro Ethernet To meet the critical demands of better supporting local emergency
More informationThis version of the des Secure Enterprise MAC Client can be used on Mac OS X 10.7 Lion platform.
NCP Secure Enterprise MAC Client Service Release 2.02 Build 11 Date: August 2011 1. New Feature Compatibility to Mac OS X 10.7 Lion This version of the des Secure Enterprise MAC Client can be used on Mac
More informationEnd User Device Strategy: Interoperability Standards
End User Device Strategy: Interoperability Standards This document defines the target architecture for cross government interoperability standards and interfaces between a government End User Device and
More informationSafe City Transmission Solution
Safe City Transmission Solution Trends and Challenges To deal with increasingly complicated security situations, governments continue to increase investment in public security to build an intelligent security
More informationTeleCooperate NeTwork Systeme & Service GmbH
YOUR COMPETENT PARTNER FOR TELECOMMUNICATION AND INTERNETSERVICES TeleCooperate NeTwork Systeme & Service GmbH TeCNeT GmbH Rudower Chaussee 29 D-12489 Berlin Phone: +49 (0) 30 / 67198216 Fax: +49 (0) 30
More informationData Sheet. NCP Exclusive Remote Access Mac Client. Next Generation Network Access Technology
Centrally managed VPN Client Suite for macos/os X For Juniper SRX Series Central Management macos 10.13, 10.12, OS X 10.11, OS X 10.10 Dynamic Personal Firewall VPN Path Finder Technology (Fallback IPsec/HTTPS)
More informationBuy, build or rent? How to use Interoute as a business enabler. Nelson Tavares da Silva Director Channel & Alliances
Buy, build or rent? How to use Interoute as a business enabler. Nelson Tavares da Silva Director Channel & Alliances 1 Goal and agenda About Interoute What are the partner challenges today Unified ICT
More informationAfriConnect Satellite Technology Overview
AfriConnect Satellite Technology Overview Topics Why VSAT? Defining The Network Requirements Coverage Traffic & Connectivity Features Public & Private Networks Understanding The Technology VSAT Terminal
More informationINFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE
INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE MAY 2017 A NEXOR WHITE PAPER NEXOR 2017 ALL RIGHTS RESERVED CONTENTS 3 4 5 6 7 8 11 12 13 14 15 INTRODUCTION IEG SCENARIOS REFERENCE ARCHITECTURE ARCHITECTURE
More informationQUALITY OF SERVICE AND THE EFFECTS OF DATA ENCRYPTION ON VSAT NETWORKS (GOVERNMENT NETWORKS)
QUALITY OF SERVICE AND THE EFFECTS OF DATA ENCRYPTION ON VSAT NETWORKS (GOVERNMENT NETWORKS) Bruno VO VAN, Updated: June 2006 Page 1 de 6 SUMMARY 1 PREAMBLE....3 2 TECHNICAL CRITERIA...3 2.1 QUALITY TO
More informationCyber security mechanisms for connected vehicles
Infineon Security Partner Network Partner Use Case Cyber security mechanisms for connected vehicles Protecting automotive vehicle networks and business models from cyber security attacks Products AURIX
More informationWhy KVM over IP? Leading the World in KVM Innovations
Why KVM over IP? In addition to the unlimited distances offered by a networked solution, utilizing over IP technology for video, audio, and control data distribution and extension offers boundless flexibility
More informationQuarterly presentation Q Aug 2017
Quarterly presentation Q2 2017 30 Aug 2017 Hiddn leading on technology since 1998 More than NOK 200m invested in R&D since 1998 Since 1998, more than NOK 200m has been invested in developing Hiddn's intellectual
More informationPrivacy and Security in Smart Grids
Faculty of Computer Science, Institute of Systems Architecture, Chair for Privacy and Data Security Privacy and Security in Smart Grids The German Approach Sebastian Clauß, Stefan Köpsell Dresden, 19.10.2012
More informationData Sheet. NCP Secure Enterprise macos Client. Next Generation Network Access Technology
Universal, centrally managed VPN Client Suite for macos/os X Central Management and Network Access Control Compatible with VPN Gateways (IPsec Standard) Integrated, dynamic Personal Firewall VPN Path Finder
More informationCloud Mobility: Meraki Wireless & EMM
BRKEWN-2002 Cloud Mobility: Meraki Wireless & EMM Emily Sporl Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile
More informationGRE and DM VPNs. Understanding the GRE Modes Page CHAPTER
CHAPTER 23 You can configure Generic Routing Encapsulation (GRE) and Dynamic Multipoint (DM) VPNs that include GRE mode configurations. You can configure IPsec GRE VPNs for hub-and-spoke, point-to-point,
More informationDatacryptor AP Layer 3 IP Encryptor
> Datacryptor AP Layer 3 IP Encryptor www.thalesesec.com SECURITY Technical Specifications Cryptography Protocols Key Management Physical Interfaces Device Management Security Features Certifications Regulatory
More informationSITE-TO-SITE LAYER 2 VPN WITH PPP BCP
SITE-TO-SITE LAYER 2 VPN WITH PPP BCP Lay Minh (Makito) CCIE # 47682, MikroTik Certified Trainer, MikroTik Consultant May 5 th, 2017 MikroTik User Meeting, Yangon, Myanmar ABOUT ME Lay Minh (Makito) MikroTik
More informationWELCOME TO THE NEW HYPER-INTEGRATED NETWORK MANAGEMENT
Cloud Networking & Management SECURE. NETWORKS. WELCOME TO THE NEW HYPER-INTEGRATED NETWORK MANAGEMENT Welcome to the! The is the world s first hyper-integrated management system that intelligently organizes,
More informationThe SafeNet Security System Version 3 Overview
The SafeNet Security System Version 3 Overview Version 3 Overview Abstract This document provides a description of Information Resource Engineering s SafeNet version 3 products. SafeNet version 3 products
More informationData Sheet FUJITSU Server PRIMERGY CX2550 M1 Dual Socket Server Node
Data Sheet FUJITSU Server PRIMERGY CX2550 M1 Dual Socket Server Node Data Sheet FUJITSU Server PRIMERGY CX2550 M1 Dual Socket Server Node Standard server node for PRIMERGY CX400 M1 multi-node server system
More informationA New Satellite Paradigm. Ronald van der Breggen Chief Commercial Officer LeoSat
A New Satellite Paradigm Ronald van der Breggen Chief Commercial Officer LeoSat May, 2017 Telecommunication Challenges Global Fiber Not Ubiquitous Traditional SatCom Architecture Is Inefficient Polar Coverage
More informationLANCOM VPN (CC)
Central-site gateway for highly secure connectivity of up to 1,000 sites 1 Certified IT security "Made in Germany" CC EAL 4+ compliant 1 Ideal for highly secure site connectivity and the protection of
More informationThe premier global provider of secure, innovative satellite communication application solutions for Land, Sea and Air.
The premier global provider of secure, innovative satellite communication application solutions for Land, Sea and Air. TrustComm reliably delivers the most innovative, secure and aggressively priced satellite
More informationUSAF ESC Space COMSEC Branch
GSAW 2011 USAF ESC Space COMSEC Branch Capt Walter Kilar Andrew Ho USAF AFRL Space Electronics Branch Capt James Crane II Innoflight, Inc Jeffrey Janicik The Aerospace Corporation Rhonda Murillo Paul Streander
More informationAUSTRALIAN DESIGNED & MANUFACTURED SMALL-ARMS SYSTEMS SOLUTIONS FOR MILITARY, LAW ENFORCEMENT & GOVERNMENT
AUSTRALIAN DESIGNED & MANUFACTURED SMALL-ARMS SYSTEMS SOLUTIONS FOR MILITARY, LAW ENFORCEMENT & GOVERNMENT AUSTRALIAN MADE, INTERNATIONAL REACH: FORCE ORDNANCE DESIGNS, MANUFACTURES AND INTEGRATES HIGH-PRECISION,
More informationRelease Notes. NCP Secure Enterprise Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.
NCP Secure Enterprise Mac Client Service Release 2.05 Build 14711 Date: December 2013 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this
More informationDominion KX II. Dominion KX II - Features and Benefits. Hardware Features Next-Generation Hardware Architecture
Dominion KX II - and Dominion KX II Hardware Next-Generation Hardware Architecture Plug and Play Appliance Quick and Easy Setup High Performance, Next- Generation Video Hardware with HD Video Resolution
More informationGerman Research Strategy in the Area of Civil Security Research
8th Interdisciplinary Workshop on Global Security WISG 2014 German Research Strategy in the Area of Civil Security Research Eckhart Curtius Federal Ministry of Education and Research Division Security
More informationBlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module
BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE Cryptographic Appliances with Integrated Level 3+ Hardware Security Module The BlackVault hardware security platform keeps cryptographic material
More informationAccess Models to DFN s Network Infrastructure in a changing environment. TF-MSP Workshop on AUPs & CPs 11./12. January 2016, Berlin Christian Grimm
Access Models to DFN s Network Infrastructure in a changing environment TF-MSP Workshop on AUPs & CPs 11./12. January 2016, Berlin Christian Grimm Wording DFN Deutsches Forschungsnetz the communication
More informationAndroid Team Awareness Kit (ATAK) and ArcGIS
Android Team Awareness Kit (ATAK) and ArcGIS Darron Pustam Product Manager, Esri Craig Cleveland Product Engineer, Esri Verne LaClair Product Manager, PAR Agenda Connecting Intel and Operations in Real
More information