secunet Security Networks AG SINA an Overview Sofia,

Size: px
Start display at page:

Download "secunet Security Networks AG SINA an Overview Sofia,"

Transcription

1 secunet Security Networks AG SINA an Overview Sofia,

2 Agenda 1 Some facts about secunet 2 SINA Portfolio 3 SINA References 4 Voice Solutions secunet Security Networks AG

3 Some facts about secunet Germany s leading specialist in the area of highly complex IT security solutions Security partnership with the Federal Government of Germany Major shareholder: Giesecke & Devrient Turnover in 2009: 56 million EUR Hamburg Essen Siegen Frankfurt Berlin Dresden Joint development of SINA by BSI (Federal Office for Information Security) and secunet Intellectual Property Rights for SINA: BSI Munich secunet Security Networks AG

4 Agenda 1 Some facts about secunet 2 SINA Portfolio 3 SINA References 4 Voice Solutions secunet Security Networks AG

5 Secure Inter-Network Architecture IT Security Platform IPsec-based VPN solutions Low administration costs due to use of easy-to-handle smartcards and online management Multi-Level-Security allows access to differently classified data Participation of mobile users in SINA secured networks secunet Security Networks AG

6 SINA Product Line Secure Inter-Network Architecture Clients Link Encryptors Gateways Mgmt. / Voice SINA Thin Client SINA L2 SINA Box (crypto gateway) SINA Management SINA Virtual Workstation SINA One Way Gateway 2 (data diode) Voice Since 2002 ~ SINA components secunet Security Networks AG

7 SINA Product Line Secure Inter-Network Architecture Clients Link Encryptors Gateways Mgmt. / (Voice) secunet Security Networks AG

8 SINA Application Scenarios Network 2 Network Secure Satellite Connect Secure Video Conferencing ThinClient 2 Terminal Server Hot Stand-by Secure Voice-Over-IP Mobile User 2 Office LAN secunet Security Networks AG

9 SINA Management PKI-based Identity Management for all SINA components Smartcards providing secure configuration for all SINA components All SINA components receive their configuration information - Initially: from SINA smartcards - Real-time: from the SINA Management Station over SINA secured channels Different SINA management models possible - Centralized all-in-one - Distributed secunet Security Networks AG

10 Gateways SINA Box Runs with SINA OS (SINA Linux) Boots from CD-ROM/Flash-ROM No information stored on Box itself All crypto keys, configuration data and SA on smartcard Throughput rates up to 1GB/Hot-Stand-by available For use up to SECRET UE secunet Security Networks AG

11 Gateways SINA L2 Throughput rate up to 10GBit/s Secures Fast or GB Ethernet structures Transparent Layer 2 transmission for VLAN, MPLS Seamless integration into the line between provider and LAN 100 MBit, 1GB, 10 GB variants available P2P and MP2MP secunet Security Networks AG

12 SINA Clients: Virtual Workstation Mobile solution for processing, transfer and storage of classified data Virtualisation technology: Allows parallel sessions on virtual, encapsulated PCs Offline security: CFS enables session-specific local storage of data Physical interface policy can be configured Bundle Solution: HW/SW Up to RESTREINT UE secunet Security Networks AG

13 SINA Clients: Thin Client No hard-drive, no sensitive data: Ideal for Home-office Graphic display of Terminal Server Protocols only Up to six parallel sessions with differently classified data possible Secure authentication Supports all standard TS protocols Up to SECRET UE secunet Security Networks AG

14 Agenda 1 Some facts about secunet 2 SINA Portfolio 3 SINA References 4 Voice Solutions secunet Security Networks AG

15 Some SINA References Military Communication Systems EU projects: Council, Commission, Agencies German Border Police, 400+ locations, fully meshed European Battlegroups German Ministry of Foreign Affair; Worldwide Embassy network, 200+ locations, centrally managed German Armed Forces and Ministry of Defense; 14,000+ components secunet Security Networks AG

16 SINA Worldwide Intranet for German Embassies 230 embassies, central location Berlin Information transfer via internet or satellite communications Online management of crypto components Mobile users can safely connect to network No data left in case of emergency Tokyo Kiev Berlin Vienna secunet Security Networks AG

17 SINA German Federal Police >400 locations Fully-meshed network Hamburg Berlin Munich Anywhere secunet Security Networks AG

18 SINA Usecase Defense Provide support for redundant network connections Allow access to data with different levels of classification Support mobile devices Mission VSAT VSAT Battlefield Information System SINA Mission Confidential VSAT National Restricted SINA Mail MOD SINA Intra net SINA Log SINA secunet Security Networks AG

19 Agenda 1 Some facts about secunet 2 SINA Portfolio 3 SINA References 4 Voice Solutions secunet Security Networks AG

20 Voice Solutions (I) Rohde & Schwarz TopSec Mobile: External voice encryption device with integrated mic/speaker Connects via Bluetooth interface to majority of mobile phones Hardware encryption: Elliptical curves + AES 256 bit Plug & Play secunet Security Networks AG

21 Voice Solutions (II) Secusmart: Secuvoice No external device needed; insertion of smartcard into micro SD-slot of mobile phone Limited to use with Nokia mobile phones Hardware encryption: Elliptical curves + AES 128 bit Plug & Play secunet Security Networks AG

22 Thank you very much for your attention! secunet Security Networks AG

Intelligent Solutions for the most Rigorous IT Security Requirements

Intelligent Solutions for the most Rigorous IT Security Requirements Intelligent Solutions for the most Rigorous IT Security Requirements 1 2 1 2 3 Information Security from the Architects of Modern Encryption Systems SINA (Secure Inter-Network Architecture) enables the

More information

Intelligent Solutions for the Highest IT Security Requirements

Intelligent Solutions for the Highest IT Security Requirements Intelligent Solutions for the Highest IT Security Requirements 3 Information security from the architects of modern cryptographic systems SINA (Secure Inter-Network Architecture) enables the protected

More information

FMN / MLS Lessons learned. Praha November 12th, 2013 Holger W. Kalnischkies

FMN / MLS Lessons learned. Praha November 12th, 2013 Holger W. Kalnischkies FMN / MLS Lessons learned Praha November 12th, 2013 Holger W. Kalnischkies MLS a definition Protecting sensitve or confidental data is paramount to most organizations Having information of different security

More information

Company profile secunet Security Networks AG

Company profile secunet Security Networks AG Company profile secunet Security Networks AG Profile in brief secunet is one of the leading German providers of high-quality IT security. Over 350 experts work in the areas of cryptography, e-government,

More information

Training courses 2017 / 2018

Training courses 2017 / 2018 Training courses 2017 / 2018 2 S33.201 SINA Basics Basic knowledge of IP and routing Basic knowledge of networks and VPN Basic knowledge of cryptography Administrators who use or will soon use an All-in-One

More information

Conformity and Interoperability Key Prerequisites for Security of eid documents. Holger Funke, 27 th April 2017, ID4Africa Windhoek

Conformity and Interoperability Key Prerequisites for Security of eid documents. Holger Funke, 27 th April 2017, ID4Africa Windhoek Conformity and Interoperability Key Prerequisites for Security of eid documents Holger Funke, 27 th April 2017, ID4Africa Windhoek Agenda 1. About secunet Security Networks AG 2. Timeline of interoperability

More information

R&S SITLine ETH Ethernet Encryptor Secure data transmission via landline, radio relay and satellite links up to 40 Gbit/s

R&S SITLine ETH Ethernet Encryptor Secure data transmission via landline, radio relay and satellite links up to 40 Gbit/s SITLine-ETH_bro_en_5214-0724-12_v1100.indd 1 Product Brochure 11.00 You act. We protect. Encryption and IT security by Rohde & Schwarz SIT. Secure Communications R&S SITLine ETH Ethernet Encryptor Secure

More information

Council of the European Union Brussels, 23 July 2015 (OR. en)

Council of the European Union Brussels, 23 July 2015 (OR. en) Council of the European Union Brussels, 23 July 2015 (OR. en) 6629/3/15 REV 3 INFORMATION NOTE From: To: Subject: General Secretariat of the Council Delegations CSCI 10 CSC 48 CIS 8 List of approved cryptographic

More information

Market Trends and Veridos solutions for epassports & ID Documents

Market Trends and Veridos solutions for epassports & ID Documents Market Trends and Veridos solutions for epassports & ID Documents Ludger Holtmann, Senior Product & Portfolio Manager Michael Ruhland-Bauer, Head of Product Mangement Documents Agenda Introducing Veridos

More information

TopSec Mobile Tap-proof phone calls

TopSec Mobile Tap-proof phone calls TopSec Mobile Tap-proof phone calls iphone Android smartphone PC Fixed network Satellite Secure Communications Product Brochure 03.00 TopSec Mobile At a glance The TopSec Mobile is a mobile encryption

More information

TopSec Mobile Secure voice encryption for smartphones and laptops

TopSec Mobile Secure voice encryption for smartphones and laptops Secure Communications Product Brochure 02.00 TopSec Mobile Secure voice encryption for smartphones and laptops TopSec Mobile At a glance The TopSec Mobile is a mobile encryption device for secure worldwide

More information

Council of the European Union Brussels, 20 March 2017 (OR. en)

Council of the European Union Brussels, 20 March 2017 (OR. en) Council of the European Union Brussels, 20 March 2017 (OR. en) 6433/1/17 REV 1 INFORMATION NOTE From: To: Subject: General Secretariat of the Council Delegations CSCI 4 CSC 50 CIS 2 List of approved cryptographic

More information

Secure Connectivity for Multi-Site Organisations

Secure Connectivity for Multi-Site Organisations Secure Connectivity for Multi-Site Organisations Solution for Critical Connections Flexible Solution for Diverse Environments Insta is a (Virtual Private Networking) solution enabling secure connectivity

More information

IP VPn COMMITTED TO QUALITY

IP VPn COMMITTED TO QUALITY IP VPn COMMITTED TO QUALITY Intraselect THE RIGHT SERVICE FOR ALL AND ANY REQUIREMENTS CONNECTIVITY TAILORED TO YOUR BUSINESS Businesses face an array of connectivity challenges. They need high bandwidth

More information

Your Secrets are Safe with Tiger

Your Secrets are Safe with Tiger Your Secrets are Safe with Tiger The more important the message, the greater the outside interest In today s fast moving and everchanging world, secure communications are key to the accomplishment of a

More information

VPN Overview. VPN Types

VPN Overview. VPN Types VPN Types A virtual private network (VPN) connection establishes a secure tunnel between endpoints over a public network such as the Internet. This chapter applies to Site-to-site VPNs on Firepower Threat

More information

European regime for interconnection

European regime for interconnection European regime for interconnection 8th September 2016 at D7, Tokyo International Forum 1 About us Becker Büttner Held has been operating since 1991. At BBH, lawyers, auditors and tax advisors work hand

More information

A New Satellite Paradigm

A New Satellite Paradigm A New Satellite Paradigm Ronald van der Breggen Chief Commercial Officer LeoSat June, 2017 Telecommunication Challenges Global Fiber Not Ubiquitous Traditional SatCom Architecture Is Inefficient Polar

More information

Cisco 5921 Embedded Services Router

Cisco 5921 Embedded Services Router Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms

More information

THE ULTIMATE SOLUTION TO SECURE MOBILE COMMUNICATIONS AND DEVICES

THE ULTIMATE SOLUTION TO SECURE MOBILE COMMUNICATIONS AND DEVICES THE ULTIMATE SOLUTION TO SECURE MOBILE COMMUNICATIONS AND DEVICES Mobility and cybersecurity concerns Why is it important? + 38% worldwide annual growth in enterprise cyber-attacks in 2015. Source : PwC

More information

Global Xpress. 10 things you need to know about GX. GLOBAL GOVERNMENT > Solution > GX 10 things

Global Xpress. 10 things you need to know about GX. GLOBAL GOVERNMENT > Solution > GX 10 things Global Xpress 10 things you need to know about GX GLOBAL GOVERNMENT > Solution > GX 10 things What does GX mean for Governments? The Global Xpress service complements Inmarsat s existing L-Band network

More information

NEXIUM THEATRE. Tactical networks for defence and security forces

NEXIUM THEATRE. Tactical networks for defence and security forces w w w. t h a l e s g r o u p. c o m NEXIUM THEATRE Tactical networks for defence and security forces DEFENCE SECURITY B ased on its long experience and worldwide leadership in military communications and

More information

Cisco 5921 Embedded Services Router

Cisco 5921 Embedded Services Router Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router. It is designed to operate on small, low-power, Linux-based platforms to extend

More information

TopSec Product Family Voice encryption at the highest security level

TopSec Product Family Voice encryption at the highest security level Secure Communications Product Brochure 01.01 TopSec Product Family Voice encryption at the highest security level TopSec Product Family At a glance The TopSec product family provides end-to-end voice encryption

More information

Requirements for an IAPP

Requirements for an IAPP Requirements for an IAPP Slide 1 Agenda Boeing Wireless LAN Environment Scenarios Campus Network (Multiple wireless LANs) Building Network (Wireless LAN/floor) Elements of an IAP Protocol Handoff Cross

More information

Homeland Security Information Sharing Architecture

Homeland Security Information Sharing Architecture Homeland Security Information Sharing Architecture National Defense Industrial Association Interoperability and Systems Integration Conference 2 April 2003 William F. Dawson Deputy Intelligence Community

More information

idirect Satellite Routers

idirect Satellite Routers idirect Satellite Routers Advancing a Connected World 0213 The idirect Intelligent Platform integrates advanced technology into idirect s product portfolio and management software to address the growing

More information

National Cyber Security Strategy 2016

National Cyber Security Strategy 2016 National Cyber Security Strategy 2016 26th of April 2017, Athens Samuel Rothenpieler, International Relations Advisor, Federal Office for Information Security (BSI) Mission Statement of the German Federal

More information

VeloCloud Cloud-Delivered WAN Fast. Simple. Secure. KUHN CONSULTING GmbH

VeloCloud Cloud-Delivered WAN Fast. Simple. Secure. KUHN CONSULTING GmbH VeloCloud Cloud-Delivered WAN Fast. Simple. Secure. 1 Agenda 1. Overview and company presentation 2. Solution presentation 3. Main benefits to show to customers 4. Deployment models 2 VeloCloud Company

More information

New Security Features in DLMS/COSEM

New Security Features in DLMS/COSEM New Security Features in DLMS/COSEM A comparison to the Smart Meter Gateway Workshop on Power Line Communications 2015 (HRW), Robin Massink (DNV GL), Gerd Bumiller (HRW) 21.09.2015 21.09.2015 1 Initiated

More information

idirect Satellite Routers

idirect Satellite Routers idirect Satellite Routers Advancing a Connected World 0316 idirect s product portfolio combines innovative technology and solutions to support all your networking requirements for bandwidth, location,

More information

Cooperative ITS Corridor Joint Deployment

Cooperative ITS Corridor Joint Deployment Cooperative ITS Corridor Joint Deployment Secure V2X Communication Glasgow, June 8th 2016 Markus Ullmann Federal Office for Information Security (BSI) Outline Cooperative Intelligent Transport System (C-ITS)

More information

TESTA-ng. TESTA 20 years of history October TESTA-ng Brief Presentation. October 2017

TESTA-ng. TESTA 20 years of history October TESTA-ng Brief Presentation. October 2017 TESTA-ng TESTA 20 years of history TESTA-ng Brief Presentation 1 Agenda Introduction on TESTA Objectives Mission A brief history Who is connected today? Multiple communities of interests Applications using

More information

AVAYA FABRIC CONNECT SOLUTION WITH SENETAS ETHERNET ENCRYPTORS

AVAYA FABRIC CONNECT SOLUTION WITH SENETAS ETHERNET ENCRYPTORS AVAYA FABRIC CONNECT SOLUTION WITH SENETAS ETHERNET ENCRYPTORS This document describes government certified Ethernet encryption solutions for networks incorporating Avaya s IEEE 802.1aq (SPB) Fabric Connect

More information

VPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist

VPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist VPN World MENOG 16 Istanbul-Turkey By Ziad Zubidah Network Security Specialist What is this Van used for?! Armed Van It used in secure transporting for valuable goods from one place to another. It is bullet

More information

Feature Notes LCOS

Feature Notes LCOS Feature Notes LCOS 10.0 www.lancom-systems.com LCOS 10.0 A new milestone LCOS 10.0 The new version of LCOS packs a multitude of highlights! Your LANCOM devices now support Software-defined Networking (SDN)

More information

A Plexos International Network Operating Technology May 2006

A Plexos International Network Operating Technology May 2006 A Plexos International Network Operating Technology May 2006 BY 4664 Jamestown Ave, Suite 325 Baton Rouge, LA 70808 225.218.8002 1.0 Introduction. is a software environment comprised of proven technologies

More information

Cloud Security Best Practices

Cloud Security Best Practices Cloud Security Best Practices Cohesive Networks - your applications secured Our family of security and connectivity solutions, VNS3, protects cloud-based applications from exploitation by hackers, criminal

More information

Mind Over Matter: The Pragmatic, Strong, and Smart Approach to Security

Mind Over Matter: The Pragmatic, Strong, and Smart Approach to Security Mind Over Matter: The Pragmatic, Strong, and Smart Approach to Security SESSION ID: SPO1-T09 Ammar Alkassar CEO Sirrix AG security technologies Saarbrücken, Germany Dr. Kim Nguyen Managing Director D-Trust

More information

Parallelizing IPsec: switching SMP to On is not even half the way

Parallelizing IPsec: switching SMP to On is not even half the way Parallelizing IPsec: switching SMP to On is not even half the way Steffen Klassert secunet Security Networks AG Dresden June 11 2010 Table of contents Some basics about IPsec About the IPsec performance

More information

Supporting critical IP applications across the enterprise from VoIP and VPN, to streaming media

Supporting critical IP applications across the enterprise from VoIP and VPN, to streaming media The idirect Intelligent Platform integrates advanced technology into idirect s product portfolio and management software to address the growing complexity of deploying and managing global IP networks.

More information

Security for Wireless Handhelds

Security for Wireless Handhelds wireless security solutions security applications developer toolkits professional services Security for Wireless Handhelds integrating strong, transparent security without increasing costs or time-to-market

More information

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES CASE STUDY Application of High-Assurance Network Encryption Sector : Use Case: Solution: CCTV security HD video Layer 2 network architecture A Major

More information

SECURITY ARCHITECTURES CARSTEN WEINHOLD

SECURITY ARCHITECTURES CARSTEN WEINHOLD Department of Computer Science Institute of System Architecture, Operating Systems Group SECURITY ARCHITECTURES CARSTEN WEINHOLD MOTIVATION Common observations: Complex software has security bugs Users

More information

Inmarsat Global Xpress. Global, Mobile, Trusted.

Inmarsat Global Xpress. Global, Mobile, Trusted. Inmarsat Global Xpress Global, Mobile, Trusted. The New Standard in Mobile Satellite Communications Global Xpress Changes Everything: Worldwide wideband coverage Seamless mobile roaming Interoperable with

More information

Wireless LAN Example Scenario

Wireless LAN Example Scenario CHAPTER 5 The wireless LAN relies on high-speed wireless hot spots. Unlike public hot spots which have begun to appear in airports, hotel lobbies, and coffee shops, allowing anyone with a wireless-enabled

More information

Electron Progress EAD

Electron Progress EAD Electron Progress EAD Systems for early warning of the population with end - acoustic devices Sofia 2011 1 Who we are A Bulgarian company established in 1976 as Institute for Defense Electronics, which

More information

Markus Bartsch. German Smart Metering and European Privacy Needs

Markus Bartsch. German Smart Metering and European Privacy Needs Markus Bartsch German Smart Metering and European Privacy Needs Smart Grid (and Metering) Customer Satisfaction 3 Years 3 10 Years Identity Management Asset Management Feeder Automation Smart Meters Privacy

More information

HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date

HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN Issue 1.1 Date 2014-03-14 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or

More information

National Policy Governing the Use of High Assurance Internet Protocol Encryptor (HAIPE) Products

National Policy Governing the Use of High Assurance Internet Protocol Encryptor (HAIPE) Products Committee on National Security Systems CNSS Policy No. 19 February 2007 National Policy Governing the Use of High Assurance Internet Protocol Encryptor (HAIPE) Products This document prescribes minimum

More information

Hughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: FIPS Non-Proprietary Security Policy

Hughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: FIPS Non-Proprietary Security Policy Hughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: 3.1.0.4 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 0.5 Prepared for: Prepared by: Hughes Network

More information

Exam: Title : Routing & Switching Exam (RSS) Ver :

Exam: Title : Routing & Switching Exam (RSS) Ver : Exam: 646-521 Title : Routing & Switching Exam (RSS) Ver : 01.02.04 Missing answer will be provided shortly. QUESTION 1 What does the Catalyst 6500 Network Analysis Module (NAM) do? (Choose two) A. Gives

More information

DIMETRA X CORE DATA SHEET DIMETRA X CORE

DIMETRA X CORE DATA SHEET DIMETRA X CORE DIMETRA X CORE FOR GOVERNMENT ORGANISATIONS, PUBLIC SAFETY AGENCIES AND LARGE ENTERPRISES, MOBILE BROADBAND IS ON THE WAY. AND WHILE YOU DON T KNOW WHEN THAT CHANGE IS COMING YOU CAN BE READY FOR IT WITH

More information

PRODUCT OVERVIEW. SecurePIM. Components

PRODUCT OVERVIEW. SecurePIM. Components SecurePIM SecurePIM provides secure communication and access to corporate data from ios and Android smartphones or tablets. It enables employees to work remotely, access business-critical data and connect

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

The new maximum security smartphone No Camera - No GPS - No Recorder

The new maximum security smartphone No Camera - No GPS - No Recorder The new maximum security smartphone No Camera - No GPS - No Recorder The new maximum security smartphone DASS H-ONE Smartphone is your smart choice to be protected and connected the whole time. What is

More information

Giesecke+Devrient. Company Presentation

Giesecke+Devrient. Company Presentation Giesecke+Devrient Company Presentation Our vision G+D makes the lives of billions of people more secure We want to be the global leading provider of security technologies, both in the digital and physical

More information

Open Mobile API The enabler of Mobile ID solutions. Alexander Summerer, Giesecke & Devrient 30th Oct. 2014

Open Mobile API The enabler of Mobile ID solutions. Alexander Summerer, Giesecke & Devrient 30th Oct. 2014 The enabler of solutions Alexander Summerer, Giesecke & Devrient 30th Oct. 2014 SIMalliance Allows usage of Secure Elements in Mobile Devices Designed for Open Handset OS platforms Common API for Apps

More information

Inmarsat Global Xpress Global, Mobile, Trusted. U.S. Government > Services > Global Xpress

Inmarsat Global Xpress Global, Mobile, Trusted. U.S. Government > Services > Global Xpress Inmarsat Global Xpress Global, Mobile, Trusted. U.S. Government > Services > Global Xpress The New Standard in Mobile Satellite Communications As a long-trusted partner of the U.S. government sector, we

More information

Secure Extension of L3 VPN s over IP-Based Wide Area Networks

Secure Extension of L3 VPN s over IP-Based Wide Area Networks White Paper Secure Extension of L3 VPN s over IP-Based Wide Area Networks Abstract Authors This paper examines how recent network-based virtualization Mark Mitch Mitchiner technology innovation can be

More information

ASEAN e-authentication Workshop Balwinder Sahota

ASEAN e-authentication Workshop Balwinder Sahota ASEAN e-authentication Workshop Balwinder Sahota Agenda ASEAN Single Window (ASW) What is ATIGA Form D The information flow of ATIGA Form D and related documents Security Requirements Challenges in Implementation

More information

EXAM - N CompTIA Network+ Certification Exam. Buy Full Product.

EXAM - N CompTIA Network+ Certification Exam. Buy Full Product. CompTIA EXAM - N10-006 CompTIA Network+ Certification Exam Buy Full Product http://www.examskey.com/n10-006.html Examskey CompTIA N10-006 exam demo product is here for you to test the quality of the product.

More information

High Resistance Firewall genugate

High Resistance Firewall genugate High Resistance Firewall genugate Robust Security for Networks At the heart of the genugate solution is the application level gateway. This advanced security system checks all data stream content. The

More information

Cisco Connected Government

Cisco Connected Government Cisco Connected Government Business Overview Engr. Marnie Tolosa Business Development Manager Cisco Systems, Inc. 1 Agenda Overview of Cisco Connected Government How Do I Get There? Why Cisco? Discussion

More information

CSC 6575: Internet Security Fall 2017

CSC 6575: Internet Security Fall 2017 CSC 6575: Internet Security Fall 2017 Network Security Devices IP Security Mohammad Ashiqur Rahman Department of Computer Science College of Engineering Tennessee Tech University 2 IPSec Agenda Architecture

More information

Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI

Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI Topology Addressing Table R1 R2 R3 Device Interface IP Address Subnet Mask Default Gateway Switch Port G0/0 192.168.1.1 255.255.255.0

More information

CSCE 715: Network Systems Security

CSCE 715: Network Systems Security CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina Security in Network Layer Implementing security in application layer provides flexibility in security

More information

Metro Ethernet for Government Enhanced Connectivity Drives the Business Transformation of Government

Metro Ethernet for Government Enhanced Connectivity Drives the Business Transformation of Government Metro Ethernet for Government Enhanced Connectivity Drives the Business Transformation of Government Why You Should Choose Cox Metro Ethernet To meet the critical demands of better supporting local emergency

More information

This version of the des Secure Enterprise MAC Client can be used on Mac OS X 10.7 Lion platform.

This version of the des Secure Enterprise MAC Client can be used on Mac OS X 10.7 Lion platform. NCP Secure Enterprise MAC Client Service Release 2.02 Build 11 Date: August 2011 1. New Feature Compatibility to Mac OS X 10.7 Lion This version of the des Secure Enterprise MAC Client can be used on Mac

More information

End User Device Strategy: Interoperability Standards

End User Device Strategy: Interoperability Standards End User Device Strategy: Interoperability Standards This document defines the target architecture for cross government interoperability standards and interfaces between a government End User Device and

More information

Safe City Transmission Solution

Safe City Transmission Solution Safe City Transmission Solution Trends and Challenges To deal with increasingly complicated security situations, governments continue to increase investment in public security to build an intelligent security

More information

TeleCooperate NeTwork Systeme & Service GmbH

TeleCooperate NeTwork Systeme & Service GmbH YOUR COMPETENT PARTNER FOR TELECOMMUNICATION AND INTERNETSERVICES TeleCooperate NeTwork Systeme & Service GmbH TeCNeT GmbH Rudower Chaussee 29 D-12489 Berlin Phone: +49 (0) 30 / 67198216 Fax: +49 (0) 30

More information

Data Sheet. NCP Exclusive Remote Access Mac Client. Next Generation Network Access Technology

Data Sheet. NCP Exclusive Remote Access Mac Client. Next Generation Network Access Technology Centrally managed VPN Client Suite for macos/os X For Juniper SRX Series Central Management macos 10.13, 10.12, OS X 10.11, OS X 10.10 Dynamic Personal Firewall VPN Path Finder Technology (Fallback IPsec/HTTPS)

More information

Buy, build or rent? How to use Interoute as a business enabler. Nelson Tavares da Silva Director Channel & Alliances

Buy, build or rent? How to use Interoute as a business enabler. Nelson Tavares da Silva Director Channel & Alliances Buy, build or rent? How to use Interoute as a business enabler. Nelson Tavares da Silva Director Channel & Alliances 1 Goal and agenda About Interoute What are the partner challenges today Unified ICT

More information

AfriConnect Satellite Technology Overview

AfriConnect Satellite Technology Overview AfriConnect Satellite Technology Overview Topics Why VSAT? Defining The Network Requirements Coverage Traffic & Connectivity Features Public & Private Networks Understanding The Technology VSAT Terminal

More information

INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE

INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE MAY 2017 A NEXOR WHITE PAPER NEXOR 2017 ALL RIGHTS RESERVED CONTENTS 3 4 5 6 7 8 11 12 13 14 15 INTRODUCTION IEG SCENARIOS REFERENCE ARCHITECTURE ARCHITECTURE

More information

QUALITY OF SERVICE AND THE EFFECTS OF DATA ENCRYPTION ON VSAT NETWORKS (GOVERNMENT NETWORKS)

QUALITY OF SERVICE AND THE EFFECTS OF DATA ENCRYPTION ON VSAT NETWORKS (GOVERNMENT NETWORKS) QUALITY OF SERVICE AND THE EFFECTS OF DATA ENCRYPTION ON VSAT NETWORKS (GOVERNMENT NETWORKS) Bruno VO VAN, Updated: June 2006 Page 1 de 6 SUMMARY 1 PREAMBLE....3 2 TECHNICAL CRITERIA...3 2.1 QUALITY TO

More information

Cyber security mechanisms for connected vehicles

Cyber security mechanisms for connected vehicles Infineon Security Partner Network Partner Use Case Cyber security mechanisms for connected vehicles Protecting automotive vehicle networks and business models from cyber security attacks Products AURIX

More information

Why KVM over IP? Leading the World in KVM Innovations

Why KVM over IP? Leading the World in KVM Innovations Why KVM over IP? In addition to the unlimited distances offered by a networked solution, utilizing over IP technology for video, audio, and control data distribution and extension offers boundless flexibility

More information

Quarterly presentation Q Aug 2017

Quarterly presentation Q Aug 2017 Quarterly presentation Q2 2017 30 Aug 2017 Hiddn leading on technology since 1998 More than NOK 200m invested in R&D since 1998 Since 1998, more than NOK 200m has been invested in developing Hiddn's intellectual

More information

Privacy and Security in Smart Grids

Privacy and Security in Smart Grids Faculty of Computer Science, Institute of Systems Architecture, Chair for Privacy and Data Security Privacy and Security in Smart Grids The German Approach Sebastian Clauß, Stefan Köpsell Dresden, 19.10.2012

More information

Data Sheet. NCP Secure Enterprise macos Client. Next Generation Network Access Technology

Data Sheet. NCP Secure Enterprise macos Client. Next Generation Network Access Technology Universal, centrally managed VPN Client Suite for macos/os X Central Management and Network Access Control Compatible with VPN Gateways (IPsec Standard) Integrated, dynamic Personal Firewall VPN Path Finder

More information

Cloud Mobility: Meraki Wireless & EMM

Cloud Mobility: Meraki Wireless & EMM BRKEWN-2002 Cloud Mobility: Meraki Wireless & EMM Emily Sporl Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile

More information

GRE and DM VPNs. Understanding the GRE Modes Page CHAPTER

GRE and DM VPNs. Understanding the GRE Modes Page CHAPTER CHAPTER 23 You can configure Generic Routing Encapsulation (GRE) and Dynamic Multipoint (DM) VPNs that include GRE mode configurations. You can configure IPsec GRE VPNs for hub-and-spoke, point-to-point,

More information

Datacryptor AP Layer 3 IP Encryptor

Datacryptor AP Layer 3 IP Encryptor > Datacryptor AP Layer 3 IP Encryptor www.thalesesec.com SECURITY Technical Specifications Cryptography Protocols Key Management Physical Interfaces Device Management Security Features Certifications Regulatory

More information

SITE-TO-SITE LAYER 2 VPN WITH PPP BCP

SITE-TO-SITE LAYER 2 VPN WITH PPP BCP SITE-TO-SITE LAYER 2 VPN WITH PPP BCP Lay Minh (Makito) CCIE # 47682, MikroTik Certified Trainer, MikroTik Consultant May 5 th, 2017 MikroTik User Meeting, Yangon, Myanmar ABOUT ME Lay Minh (Makito) MikroTik

More information

WELCOME TO THE NEW HYPER-INTEGRATED NETWORK MANAGEMENT

WELCOME TO THE NEW HYPER-INTEGRATED NETWORK MANAGEMENT Cloud Networking & Management SECURE. NETWORKS. WELCOME TO THE NEW HYPER-INTEGRATED NETWORK MANAGEMENT Welcome to the! The is the world s first hyper-integrated management system that intelligently organizes,

More information

The SafeNet Security System Version 3 Overview

The SafeNet Security System Version 3 Overview The SafeNet Security System Version 3 Overview Version 3 Overview Abstract This document provides a description of Information Resource Engineering s SafeNet version 3 products. SafeNet version 3 products

More information

Data Sheet FUJITSU Server PRIMERGY CX2550 M1 Dual Socket Server Node

Data Sheet FUJITSU Server PRIMERGY CX2550 M1 Dual Socket Server Node Data Sheet FUJITSU Server PRIMERGY CX2550 M1 Dual Socket Server Node Data Sheet FUJITSU Server PRIMERGY CX2550 M1 Dual Socket Server Node Standard server node for PRIMERGY CX400 M1 multi-node server system

More information

A New Satellite Paradigm. Ronald van der Breggen Chief Commercial Officer LeoSat

A New Satellite Paradigm. Ronald van der Breggen Chief Commercial Officer LeoSat A New Satellite Paradigm Ronald van der Breggen Chief Commercial Officer LeoSat May, 2017 Telecommunication Challenges Global Fiber Not Ubiquitous Traditional SatCom Architecture Is Inefficient Polar Coverage

More information

LANCOM VPN (CC)

LANCOM VPN (CC) Central-site gateway for highly secure connectivity of up to 1,000 sites 1 Certified IT security "Made in Germany" CC EAL 4+ compliant 1 Ideal for highly secure site connectivity and the protection of

More information

The premier global provider of secure, innovative satellite communication application solutions for Land, Sea and Air.

The premier global provider of secure, innovative satellite communication application solutions for Land, Sea and Air. The premier global provider of secure, innovative satellite communication application solutions for Land, Sea and Air. TrustComm reliably delivers the most innovative, secure and aggressively priced satellite

More information

USAF ESC Space COMSEC Branch

USAF ESC Space COMSEC Branch GSAW 2011 USAF ESC Space COMSEC Branch Capt Walter Kilar Andrew Ho USAF AFRL Space Electronics Branch Capt James Crane II Innoflight, Inc Jeffrey Janicik The Aerospace Corporation Rhonda Murillo Paul Streander

More information

AUSTRALIAN DESIGNED & MANUFACTURED SMALL-ARMS SYSTEMS SOLUTIONS FOR MILITARY, LAW ENFORCEMENT & GOVERNMENT

AUSTRALIAN DESIGNED & MANUFACTURED SMALL-ARMS SYSTEMS SOLUTIONS FOR MILITARY, LAW ENFORCEMENT & GOVERNMENT AUSTRALIAN DESIGNED & MANUFACTURED SMALL-ARMS SYSTEMS SOLUTIONS FOR MILITARY, LAW ENFORCEMENT & GOVERNMENT AUSTRALIAN MADE, INTERNATIONAL REACH: FORCE ORDNANCE DESIGNS, MANUFACTURES AND INTEGRATES HIGH-PRECISION,

More information

Release Notes. NCP Secure Enterprise Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.

Release Notes. NCP Secure Enterprise Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. NCP Secure Enterprise Mac Client Service Release 2.05 Build 14711 Date: December 2013 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this

More information

Dominion KX II. Dominion KX II - Features and Benefits. Hardware Features Next-Generation Hardware Architecture

Dominion KX II. Dominion KX II - Features and Benefits. Hardware Features Next-Generation Hardware Architecture Dominion KX II - and Dominion KX II Hardware Next-Generation Hardware Architecture Plug and Play Appliance Quick and Easy Setup High Performance, Next- Generation Video Hardware with HD Video Resolution

More information

German Research Strategy in the Area of Civil Security Research

German Research Strategy in the Area of Civil Security Research 8th Interdisciplinary Workshop on Global Security WISG 2014 German Research Strategy in the Area of Civil Security Research Eckhart Curtius Federal Ministry of Education and Research Division Security

More information

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE Cryptographic Appliances with Integrated Level 3+ Hardware Security Module The BlackVault hardware security platform keeps cryptographic material

More information

Access Models to DFN s Network Infrastructure in a changing environment. TF-MSP Workshop on AUPs & CPs 11./12. January 2016, Berlin Christian Grimm

Access Models to DFN s Network Infrastructure in a changing environment. TF-MSP Workshop on AUPs & CPs 11./12. January 2016, Berlin Christian Grimm Access Models to DFN s Network Infrastructure in a changing environment TF-MSP Workshop on AUPs & CPs 11./12. January 2016, Berlin Christian Grimm Wording DFN Deutsches Forschungsnetz the communication

More information

Android Team Awareness Kit (ATAK) and ArcGIS

Android Team Awareness Kit (ATAK) and ArcGIS Android Team Awareness Kit (ATAK) and ArcGIS Darron Pustam Product Manager, Esri Craig Cleveland Product Engineer, Esri Verne LaClair Product Manager, PAR Agenda Connecting Intel and Operations in Real

More information