Building a chain of trust from the device to the cloud Christian Kuhn, Senior Director, Business Development DNAC - 16 November 2017
|
|
- Georgiana Gallagher
- 6 years ago
- Views:
Transcription
1 Building a chain of trust from the device to the cloud Christian Kuhn, Senior Director, Business Development DNAC - 16 November 2017
2 Trust is vital and it s what we provide enabling our clients to deliver a vast range of trusted digital services for billions of individuals and things. 2
3 5G comes with new security challenges BUILD FROM SECURITY SOLUTIONS FROM 3G/4G NEW SEGMENT-SPECIFIC SECURITY NEEDS NETWORK OPERATIONS CRITICAL COMMUNICATIONS AND V2X Begin with principles of authentication, integrity, confidentiality and privacy from 3G/4G Adapt for NFV and Multi-Access Edge Computing Security Architecture should be adapted to the needs of each slice IoT ENHANCED MOBILE BROADBAND MASSIVE IoT 3
4 Gemalto s role in Network Security & Software Licensing OUR SOLUTIONS User authentication and trusted identities Data encryption and key management Cloud and virtualization security Gemalto secures the device and enhances security of the virtualized network whilst guaranteeing licensing management Software Monetization 4
5 Network Security Should Rely on Certified Elements such as Hardware Security Modules SERIALIZED TAMPER EVIDENT STICKERS CERTIFICATIONS TAMPER RESISTANT SCREWS INTRUSION DETECTION SWITCHES ON LID INTERNAL BAFFLES TO PREVENT PROBING TAMPER RESISTANT I/O MOUNTS DYNAMIC CRYPTO RESOURCE CRYPTO HYPERVISOR TAMPER RESISTANT FAN MOUNTS HARDWARE SECURITY MODULE 5
6 Key Issues in 5G Virtualization Security OSS / BSS 1 Network slice isolation SERVICE, VNF & INFRASTRUCTURE DESCRIPTION ORCHESTRATOR Virtualization security VNF integrity verification during on boarding of VNF VNF EMS 1 EMS 2 EMS 3 VNF 1 VNF 2 VNF VNF MANAGERS Low Latency Interconnect with Multi-Access Edge Secured/measured boot & security enclaves for sensitive VNFs 5 NFV1 VIRTUALISATION LAYER VIRTUAL COMPUTE HARDWARE RESOURCES COMPUTING HARDWARE VIRTUAL STORAGE STORAGE HARDWARE 1 VIRTUAL NETWORK NETWORK HARDWARE 9 4 VIRTUALISED INFRASTRUCTURE MANAGER NFV M&O Physical and logical protection of Security Assets on motherboard Discovery mechanism of Security Hardware & characteristics (Openstack EPA) Run-time VNF Integrity verification Migration of VNF using security features 6
7 Mobile security chain: key architectural elements 1 Network slice isolation SERVICE PROVIDER MOBILE EDGE SERVICE PROVIDER SERVICE PROVIDER MOBILE CORE l VNF1, VNF2 5G MOBILE EDGE MOBILE EDGE VNFa, VNFb Slice 1 Slice 2 Network providing seamless IP connectivity suited to my reliability, availability, mobility and security needs Conforms to SLA Applications are running and data analysis take place at core and the edge 7
8 Strong Trust Establishment between Virtual Functions 2 3 Virtualization security, VNF integrity verification during on boarding of VNF MULTI-ACCESS EDGES NFV MANAGEMENT & ORCHESTRATOR (MANO) CORE HARDWARE SECURITY MODULE HARDWARE SECURITY MODULE Trigger Mutual Authentication between the MANO and resources Trigger Mutual Authentication between all virtualised elements on the same slice which interact Verify integrity of each function vs what was installed by the MANO vs image stored in VNF Manager 8
9 Strong Trust Establishment between Virtual Functions 2 3 Virtualization security, VNF integrity verification during on boarding of VNF MULTI-ACCESS EDGES NFV MANAGEMENT & ORCHESTRATOR (MANO) CORE HARDWARE SECURITY MODULE HARDWARE SECURITY MODULE 4 Implement integrity and confidentiality protection so that instructions and data cannot be compromised/modified 9
10 Is the connection from the Core to the Multi-Access Edge Secure? 4 Low Latency Interconnect with Multi-Access Edge 10
11 With 5G slicing isolate the communications between functions 4 Low Latency Interconnect with Multi-Access Edge MOBILE EDGES CORE Provide confidentiality and integrity protection for all data and virtual functions HSE HIGH SPEED ENCRYPTION HSE Provide confidentiality and integrity protection for all data and virtual functions 11
12 Protection of Applications & VNFs 5 Secured/measured boot & security enclaves for sensitive VNFs HYPERVISOR HARDWARE RESOURCES (CPU, STORAGE, NETWORK) NFV INFRASTRUCTURE A Hypervisor provides some basic level of isolation 12
13 Protection of Applications & VNFs 5 Secured/measured boot & security enclaves for sensitive VNFs HYPERVISOR HARDWARE RESOURCES (CPU, STORAGE, NETWORK) NFV INFRASTRUCTURE Malicious A code Hypervisor could be provides implemented some level to hack of isolation through the walls 13
14 Protection of Applications & VNFs 5 Secured/measured boot & security enclaves for sensitive VNFs HYPERVISOR HARDWARE RESOURCES (CPU, STORAGE, NETWORK) NFV INFRASTRUCTURE Secure Malicious enclaves A code Hypervisor ( Hardware could be provides Mediated implemented some Execution level to hack of Environment ) isolation through the walls in the CPU increase isolation between the VNFs but are limited in capacity 14
15 Protection of Applications & VNFs 5 Secured/measured boot & security enclaves for sensitive VNFs HYPERVISOR HARDWARE RESOURCES (CPU, STORAGE, NETWORK) Cloud HSM(s) NFV INFRASTRUCTURE 15 A Secure local or Malicious enclaves cloud-based A code ( HMEE ) Hypervisor HSM could tethered in be provides the implemented CPU to some the increase Enclave level to hack isolation of could isolation through increase between the walls the security VNFs level of the system for operations such as Key Generation or Mutual Auth. between functions
16 Protection of Applications & VNFs 5 Secured/measured boot & security enclaves for sensitive VNFs HYPERVISOR VNF Protect Agent HARDWARE RESOURCES (CPU, STORAGE, NETWORK) Cloud HSM HSM(s) NFV INFRASTRUCTURE 16 A Secure A HSM VNF Malicious tethered enclaves Protection A to code ( HMEE ) Hypervisor the Agent, could Enclave hosted in be provides the could implemented itself CPU increase some the level to Hardware the hack isolation of security isolation through Mediated between level the of walls Execution the system VNFs Environment for operations can be such tethered as Key to real Generation HSMs based or Mutual in the Auth. cloud between allowing functions for elasticity and scalability
17 Advantages of VNF Protect Agent 5 Secured/measured boot & security enclaves for sensitive VNFs Container based protection, seamless interworking for VNFs or apps being deployed in various clouds Cloud based key management system means it s scales easily VNFs can be transferred from machine A to B seamlessly without deletion, recreation Flexible control mechanism, no single ownership structure => Centralised management (vs isolated, distributed hardware mechanisms) 17
18 Software Licensing Management How to forge sustainable business relationships between multiple stakeholders in a complex 5G environment APPLICATION PROVIDERS On-premise and cloud B2B applications NETWORK VENDORS Virtual Network Function scalable licensing CLOUD PROVIDERS Cloud services and applications The importance of security, protection, licensing, usage and entitlement management solutions is critical in helping the industry monetize their software and driving disruptive business models 18
19 Usage Based Pricing COMPANY PROFILE Name: Industry: Country: Revenues: Ericsson Telecom Supplier Sweden $US 9.8 BN REQUIREMENTS 1. Pay- per- use pricing models. 2. Mass usage data collec>on. 3. Telco- grade high availability and ultra- high performance. 4. En>rely hosted and operated by Ericsson. SENTINEL DELIVERABLES THE GEMALTO SOLUTION 1. Sen>nel Cloud 2. Consul>ng services 3. Integra>on Support 4. Customiza>ons 5. In- house opera>on of Sen>nel Cloud Back- Office EMS Define En>tle Ac>vate Report Sen$nel SCC License Usage Aggregate Sen$nel Client SCS API RunFme Device App License
20 Device Security per 5G Segment FOR THE MAIN 5G SUB-SEGMENTS, WE NEED TO ANALYSE: Device Capabilities (consumption/processing/memory...) Connectivity Cost (device) Connectivity Cost (recurring subscription) Type of service provider data in transit FOR THE ABOVE, WE NEED TO DETERMINE THE FOLLOWING REQUIREMENTS: Data Protection / Confidentiality Privacy / Anonymity Denial of Service Protection Anti-Clone mechanism WE THEN APPLY SECURITY SOLUTIONS (END-TO-END) 20
21 Segmenting Security Needs of Major 5G Use-Cases Security Needs (MNO/SP) Sub. Authentication Anti-DoS Confidentiality Sub. Authentication Anti-DoS Authenticity ID/Privacy Sub. Authentication Confidentiality+ ID/Privacy+ Integrity+ Anti-DoS Authenticity Sub. Authentication Confidentiality++ ID/Privacy++ Integrity++ Device FW Integrity Anti-DoS Authenticity Sub. Authentication Confidentiality+++ ID/Privacy+++ Integrity+++ Device FW Integrity Anti-DoS Authenticity Credentials Protection Complimentary Core Security to reinforce SOFTWARE IN TRUSTED ENCLAVE / SECURE ELEMENT WALLED GARDEN / OUT-OF-BAND MGMT / TOKENISATION / A.R.M. / S.F.U Basic Sensors Broadband Modem Set-Top Box Auto Info-tainment Industrial Basic Smart Wearable Retail (PoS) Laptop Smartphone/tablet Auto Telematics Home Automation Industrial Critical Medical Wearable Metering/Critical Sensors Public Safety/1st Resp. Military Remote Surgery V2X S.F.U.: Security Firmware Upgrade A.R.M.: Active Risk Management 21
22 It s important to find the right balance PROTECT IDs device Secure Element Software in Trusted Enclave Active Risk Management Out of Band Tokenisation Security Firmware Upgrade MANAGE IDs AND GRANT ACCESS core END-TO-END MOBILE NETWORK + SERVICE PROVIDER SECURITY FRAMEWORK RISK 22
23 Weaker Security at Device: Reinforce Core If a device does not support a Secure Element (cost, data worthless ) PROTECT IDs device Software in Trusted Enclave Active Risk Management Tokenisation Security Firmware Upgrade MANAGE IDs AND GRANT ACCESS core END-TO-END MOBILE NETWORK + SERVICE PROVIDER SECURITY FRAMEWORK RISK 23
24 Stronger Device Security: Core adapted accordingly If the SP data in transit requires normal to best-in-class security PROTECT IDs device Secure Element Security Firmware Upgrade MANAGE IDs AND GRANT ACCESS core END-TO-END MOBILE NETWORK + SERVICE PROVIDER SECURITY FRAMEWORK RISK 24
25 To conclude Virtualization brings new challenges in securing your core and edge clouds. Adapt appropriate security per network slice blueprint. Establish trust between functions, encrypt all data at rest or in transit. Choose your end-to-end security architecture wisely based upon the value of the data being transmitted and don t only consider the device bill of materials. Gemalto is focused on security at the device, multiaccess edge and the core with an appropriate footprint per 5G segment meeting both MNO and Service Provider requirements. We re working with the entire industry to continue to secure next generation mobile communications. 25
26 Thank you Paul Bradley, Head of 5G Gemalto Mobile Services & IoT Christian Kuhn, Senior Director, Business Gemalto Enterprise & Cybersecurity 26
ARM processors driving automotive innovation
ARM processors driving automotive innovation Chris Turner Director of advanced technology marketing, CPU group ARM tech forums, Seoul and Taipei June/July 2016 The ultimate intelligent connected device
More informationOrange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November
Orange Smart Cities Smart Metering and Smart Grid : how can a telecom operator contribute? November 5 2012 Nathalie Leboucher Vice President Smart Cities Program Orange 1 the Orange Group in a nutshell
More informationEDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE PUBLIC
EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE 6 2018 PUBLIC PUBLIC 2 Key concerns with IoT.. PUBLIC 3 Why Edge Computing? CLOUD Too far away Expensive connectivity
More informationSecurity in Cloud Environments
Security in Cloud Environments Security Product Manager Joern Mewes (joern.mewes@nokia.com) 16-11-2016 1 Cloud transformation happens in phases and will take 5+ years Steps into the cloud Now 2016+ 2020+
More informationVodafone keynote. How smart networks are changing the corporate WAN. Peter Terry Brown Director of Connectivity & UC.
How smart networks are changing the corporate WAN Vodafone keynote Peter Terry Brown Director of Connectivity & UC 17 October 2017 About Vodafone Enterprise Connectivity & UC IoT Cloud & Security Our vision:
More information5G Revolution & Service security in Korea
5G Revolution & Service security in Korea 2018.03.19. Jae Hoon Nah 5G Standardization timeline Standards development & deployment Source: IHS 2 Usage scenario for 5G (ITU-R) 3 Potential opportunities of
More informationWIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS
WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS Carrier networks are undergoing their biggest transformation since the beginning of the Internet. The ability to get to market quickly and to respond to
More informationIoT It s All About Security
IoT It s All About Security Colin Walls colin_walls@mentor.com Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions. Linux is the registered trademark of Linus Torvalds
More informationDelivering High-mix, High-volume Secure Manufacturing in the Distribution Channel
Delivering High-mix, High-volume Secure Manufacturing in the Distribution Channel Steve Pancoast Vice President, Engineering Secure Thingz Inc Rajeev Gulati Vice President and CTO Data IO Corporation 1
More informationMulti-tenancy of network operators and edge cloud services using small cells
Multi-tenancy of network operators and edge cloud services using small cells Emmanouil Kafetzakis, Ph.D. ORION Innovations P.C. mkafetz@orioninnovations.gr Infocom World 2017, 25-10-2017 Athens, Greece
More informationPROVIDING NETWORK OPERATOR MULTI-TENANCY AND EDGE CLOUD SERVICES USING SMALL CELLS
PROVIDING NETWORK OPERATOR MULTI-TENANCY AND EDGE CLOUD SERVICES USING SMALL CELLS Ioannis Giannoulakis, Ph.D. National Centre for Scientific Research Demokritos giannoul@iit.demokritos.gr Emmanouil Kafetzakis,
More informationIntelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access
Now a part of Cisco We bought Viptela Intelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access Branch Hybrid WAN Transport IPsec Secure MPLS (IP-VPN) Private Cloud Virtual Private
More informationHow Smart Networks are changing the Corporate WAN
How Smart Networks are changing the Corporate WAN Mark Bennett Head of Global Fixed Connectivity Vodafone Group Enterprise September 12017 About Vodafone Enterprise Unified Comms Cloud & Hosting Internet
More informationand public cloud infrastructure, including Amazon Web Services (AWS) and AWS GovCloud, Microsoft Azure and Azure Government Cloud.
DATA SHEET vthunder SOFTWARE FOR VIRTUAL & CLOUD INFRASTRUCTURE A10 vthunder software appliances enable organizations to SUPPORTED SOLUTIONS gain flexible, easy-to-deploy and high-performance secure application
More informationAzure Active Directory B2C. Daniel Dickinson Enterprise Mobility Specialist
Azure Active Directory B2C Daniel Dickinson Enterprise Mobility Specialist Are you ready? Is your identity system ready and secure? A consumer identity and access management system needs to be: Consumer-centric
More informationNetwork 2020 Vision. Nikos G. Panagiotidis Business Development Manager Intel Hellas S.A.
Network 2020 Vision from Telco to QOE Service Provider Nikos G. Panagiotidis Business Development Manager Intel Hellas S.A. Need Positive Technology Spiral End To End IT Mobile Devices OSS/BSS User Experience
More informationConnecting Securely to the Cloud
Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico
More informationProvisioning secure Identity for Microcontroller based IoT Devices
Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May
More informationTRESCCA Trustworthy Embedded Systems for Secure Cloud Computing
TRESCCA Trustworthy Embedded Systems for Secure Cloud Computing IoT Week 2014, 2014 06 17 Ignacio García Wellness Telecom Outline Welcome Motivation Objectives TRESCCA client platform SW framework for
More informationNetwork Virtualisation Vision and Strategy_ (based on lesson learned) Telefónica Global CTO
Network Virtualisation Vision and Strategy_ (based on lesson learned) Telefónica I+D @ Global CTO 18.03.2014 Business development requires a continuous evolution of our network but it still seems unable
More informationCloud strategy and deployment Experience. Carmen Agúndez Market Area Europe and Latin America Cloud Lead
Cloud strategy and deployment Experience Carmen Agúndez Market Area Europe and Latin America Cloud Lead network evolution to 5G Integrated nodes Virtualized deployment Cloud deployment 5G Core Enterprise
More informationThe Open Application Platform for Secure Elements.
The Open Application Platform for Secure Elements. Java Card enables secure elements, such as smart cards and other tamper-resistant security chips, to host applications, called applets, which employ Java
More informationMWC 2015 End to End NFV Architecture demo_
MWC 2015 End to End NFV Architecture demo_ March 2015 demonstration @ Intel booth Executive summary The goal is to demonstrate how an advanced multi-vendor implementation of the ETSI ISG NFV architecture
More informationEnabling Smart Energy as a Service via 5G Mobile Network advances. The Energy as a Service: when the Smart Energy uses the 5G technology
Enabling Smart Energy as a Service via 5G Mobile Network advances The Energy as a Service: when the Smart Energy uses the 5G technology Ljubljana, 5G PPP Phase 3 Stakeholders Info day October 17 2017 Fiorentino
More informationEnhanced Privacy ID (EPID), 156
Index A Accountability, 148 ActiveDirectory, 153 Amazon AWS EC2, 168 Anonymity, 148 Asset tagging, 96 Attestation definition, 65 dynamic remote attestation techniques, 66 IMA, 67 Intel Trust Attestation
More informationA Developer's Guide to Security on Cortex-M based MCUs
A Developer's Guide to Security on Cortex-M based MCUs 2018 Arm Limited Nazir S Arm Tech Symposia India Agenda Why do we need security? Types of attacks and security assessments Introduction to TrustZone
More informationBeyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development
Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat
More informationLooking ahead with IBM i. 10+ year roadmap
Looking ahead with IBM i 10+ year roadmap 1 Enterprises Trust IBM Power 80 of Fortune 100 have IBM Power Systems The top 10 banking firms have IBM Power Systems 9 of top 10 insurance companies have IBM
More informationRevolutionising mobile networks with SDN and NFV
Revolutionising mobile networks with SDN and NFV Cambridge Wireless Virtual Networks SIG 8 th May 2014 Philip Bridge, Senior Network Architect at EE May 2014 Networks are getting messy Vertically integrated
More informationUsing the tpm with iot
Using the tpm with iot David Grawrock Security Architect, Senior Principle Engineer Agenda History Lesson What Does IoT Need How Does The Fulfill Needs Usage IoT Security 2 History Worked on the from 1999
More informationSmartNICs: Giving Rise To Smarter Offload at The Edge and In The Data Center
SmartNICs: Giving Rise To Smarter Offload at The Edge and In The Data Center Jeff Defilippi Senior Product Manager Arm #Arm Tech Symposia The Cloud to Edge Infrastructure Foundation for a World of 1T Intelligent
More informationVerizon Software Defined Perimeter (SDP).
Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.
More informationTRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS
TRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS MATTHEW SHORT SR PRODUCT LINE MANAGER DIGITAL NETWORKING MATTHEW.SHORT@NXP.COM A NEW POSITION OF STRENGTH #1 Communications Processors #1 RF Power Transistors
More informationNFV Infrastructure for Media Data Center Applications
NFV Infrastructure for Media Data Center Applications Today s Presenters Roger Sherwood Global Strategy & Business Development, Cisco Systems Damion Desai Account Manager for Datacenter, SDN, NFV and Mobility,
More information#RSAC #RSAC Thing Thing Thing Thing Thing Thing Edge Edge Gateway Gateway Cut costs Create value Find information in data then act Maintain Things Enrol Authorized Users & Things Authentication
More informationDIY Hosting for Online Privacy. Shoumik Palkar and Matei Zaharia Stanford University
DIY Hosting for Online Privacy Shoumik Palkar and Matei Zaharia Stanford University Before: A Federated Internet The Internet and its protocols were designed to be federated Organizations would host own
More information5G SIM: Maximising MNO Investment in 5G Networks
5G SIM: Maximising MNO Investment in 5G Networks MNO migration to 5G has begun 67 Mobile Network Operators (MNOs) in 39 countries have announced 5G availability between 2018 and 2022 Source: GSA 1.36 billion
More informationDIY Hosting for Online Privacy
DIY Hosting for Online Privacy Shoumik Palkar and Matei Zaharia Stanford University Appeared at HotNets 2017 Before: A Federated Internet The Internet and its protocols were designed to be federated Organizations
More informationEnabling Agility through Modularity and Microservices TM Forum Middle East Jan 2018
Enabling Agility through Modularity and Microservices TM Forum Middle East Jan 2018 Joann O Brien VP APIs & Ecosystems, TM Forum 2017 TM Forum 1 5G open ecosystems represent a $582bn opportunity as other
More informationWhere is the Network Edge? MEC Deployment Options, Business Case & SDN Considerations
Where is the Network Edge? MEC Deployment Options, Business Case & SDN Considerations Ian Goetz, Chief Architect, Vodafone Global Account, Juniper Networks August, 2016 Market Trends & The Network Environment
More informationHow DPI enables effective deployment of CloudNFV. David Le Goff / Director, Strategic & Product Marketing March 2014
How DPI enables effective deployment of CloudNFV David Le Goff / Director, Strategic & Product Marketing March 2014 Key messages of this presentation 1. DPI (Deep Packet Inspection) is critical for effective
More informationTransforming IT: From Silos To Services
Transforming IT: From Silos To Services Chuck Hollis Global Marketing CTO EMC Corporation http://chucksblog.emc.com @chuckhollis IT is being transformed. Our world is changing fast New Technologies New
More informationTRANSFORM YOUR NETWORK
TRANSFORM YOUR NETWORK SIMPLIFY MODERNIZATION WITH AN INNOVATIVE ECOSYSTEM OF CERTIFIED SOLUTIONS AND PARTNERS TELECOMMUNICATIONS ECOSYSTEM E-BOOK TABLE OF CONTENTS Adapt to growing network demand...3
More informationDelivering on Cloud Transformation Infinite Solutions update. Presenter: Adam Davies, January 20 th, 2016
Delivering on Cloud Transformation Infinite Solutions update Presenter: Adam Davies, January 20 th, 2016 Agenda Market Landscape, Opportunities and Challenges Update on Cisco Infinite Solutions Related
More informationITU Workshop on Telecommunication Service Quality. Service assurance for Virtualized Networks and End-to-End Xhaul and C-RAN
ITU Workshop on Telecommunication Service Quality Service assurance for Virtualized Networks and End-to-End Xhaul and C-RAN Evgeny Romanov, Solution Engineer, InfoVista www.infovista.com VistaInsight,
More informationCOMPTIA CLO-001 EXAM QUESTIONS & ANSWERS
COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Number: CLO-001 Passing Score: 800 Time Limit: 120 min File Version: 39.7 http://www.gratisexam.com/ COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Exam Name: CompTIA
More informationCreating new data freedom with the Shared Data Layer
Creating new data freedom with the Shared Data Layer Helping operators to realize the full business potential of their core network data White Paper Contents 1. Executive Summary: Simplified core architecture
More informationSecuring IoT with the ARM mbed ecosystem
Securing IoT with the ARM mbed ecosystem Xiao Sun / Senior Applications Engineer / ARM ARM mbed Connect / Shenzhen, China December 5, 2016 Lots of interest in IoT security Researchers are looking into
More informationModelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer
Modelos de Negócio na Era das Clouds André Rodrigues, Cloud Systems Engineer Agenda Software and Cloud Changed the World Cisco s Cloud Vision&Strategy 5 Phase Cloud Plan Before Now From idea to production:
More informationInnovating to Increase Revenue
WHITE PAPER Innovating to Increase Revenue Uniquely Driving Differentiation & Competitive Advantage INTRODUCTION The business drivers for mobile operators looking to transform their networks are: 1) Declining
More informationCHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING
www.hcltech.com CHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING Why Next-Gen Networks? The rapid and large scale adoption of new age disruptive digital technologies has resulted in astronomical growth
More informationStandards for V2X Communication and Implications for OEMs and ITS
Standards for V2X Communication and Implications for OEMs and ITS FISITA Jürgen Daunis London Nov. 12, 2015 PACE OF CHANGE >50 billion connected devices Connections (billion) 25 years 5 billion connected
More informationWho s Protecting Your Keys? August 2018
Who s Protecting Your Keys? August 2018 Protecting the most vital data from the core to the cloud to the field Trusted, U.S. based source for cyber security solutions We develop, manufacture, sell and
More informationThe Evolution of Network Slicing
The Evolution of Network Slicing With the support of Intel Dimitris Mavrakis Research Director 1. NETWORK SLICING MARKET DEVELOPMENT The current telco market is facing a major evolutionary step, where
More informationIBM Cloud for VMware Solutions
Introduction 2 IBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager VMware on IBM Cloud Mehran Hadipour Director Business Development - Zerto Internal Use Only Do not distribute 3
More informationAccelerate Your Cloud Journey
Dubai, UAE 20th March 2013 Accelerate Your Cloud Journey James Spearman Dimension Data - Solutions Architect Cloud 2012 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect 1 Dimension
More informationMatti Latva-aho Academy Professor Director for Finnish Wireless Flagship 6Genesis University of Oulu, Centre for Wireless Communications (CWC)
Matti Latva-aho Academy Professor Director for Finnish Wireless Flagship 6Genesis University of Oulu, Centre for Wireless Communications (CWC) FINLAND www.oulu.fi/ www.6genesis.org Challenge #1: Verticals
More informationNetwork Vision: Preparing Telefónica for the next generation of services. Enrique Blanco Systems and Network Global Director
Network Vision: Preparing Telefónica for the next generation of services Enrique Blanco Systems and Network Global Director 19.09.2017 Mobile Access Vision Increasing 4G coverage, features and network
More informationA Holistic View of Telco Clouds
A Holistic View of Telco Clouds Cloud Computing in the Telecom environment, bridging the gap Miyazaki, 4 March 2012 (A workshop in conjunction with World Telecom Congress 2012) Authors: Lóránt Németh,
More informationGöran Näslund M2M Business Development Manager Smart Metering Vodafone Global Enterprise Sweden
Göran Näslund M2M Business Development Manager Smart Metering Vodafone Global Enterprise Sweden M2M An enabler of Smart Grid 2 OUR CREDENTIALS We have over 200 people dedicated to M2M in our organisation
More informationSystems Engineering for Software-Defined Network Virtualisation. John Risson, Solutions Engineering Manager IP and Transport Engineering, Telstra
Systems Engineering for Software-Defined Network Virtualisation John Risson, Solutions Engineering Manager IP and Transport Engineering, Telstra Agenda Motivation Case Studies Opportunities and Challenges
More informationIOT, ENTERPRISES AND 5G
IOT, ENTERPRISES AND 5G ELEVATING POLICY TO THE NEXT STAGE Policy Control Conference, Berlin, April 4-5 2017 NEW CLASSES OF USE CASES drive needs for evolved policy Massive MTC Critical MTC SMART BUILDING
More informationDeliver Data Protection Services that Boost Revenues and Margins
FAMILY BROCHURE Gemalto s SafeNet Identity and Data Protection Solutions for Service Providers Deliver Data Protection Services that Boost Revenues and Margins Today, your customers and prospects are facing
More informationNokia AirGile cloud-native core: shaping networks to every demand
Nokia AirGile cloud-native core: shaping networks to every demand The future of core networks? Today s networks focus on delivering voice and broadband services to people. Yet the rise of the Internet
More informationDeployment Case Study of SDN and NFV Transformation. Marcela Blanco-Luna Solutions Architect Advanced Services
Deployment Case Study of SDN and NFV Transformation Marcela Blanco-Luna Solutions Architect Advanced Services Future Network Platform Service Creation Service Design Service Assurance Cloud Optimization
More information5G Network Slicing and Convergence. Maria Cuevas, Head of core network and services research BT plc
5G Network Slicing and Convergence Maria Cuevas, Head of core network and services research BT plc Contents 1 2 5G drivers Network slicing a b c d e Key drivers Key requirements / technical challenges
More informationMaking 5G Real. Ericsson Internal Guilherme Alves Ericsson
Making 5G Real Guilherme Alves Ericsson 2018-05-17 Agenda The ecosystem Technologies at the heart of 5G Consumer interest levels Low Average High Consumers: Give us more with 5G! Higher performance is
More informationOverview of the Juniper Networks Mobile Cloud Architecture
Overview of the Juniper Networks Mobile Cloud Architecture Laying the Foundation for a Next-Generation Secure Distributed Telco Cloud White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale,
More informationBackup and Recovery. Backup and Recovery from Redstor. Making downtime a thing of the past Making downtime a thing of the past
Backup and Recovery Backup and Recovery Backup from Redstor and Recovery from Redstor Making downtime a thing of the past Making downtime a thing of the past Reject risk Preventing data loss is a challenge
More informationVirtualizing Managed Business Services for SoHo/SME Leveraging SDN/NFV and vcpe
Virtualizing Managed Business Services for SoHo/SME Leveraging SDN/NFV and vcpe A Technical Paper prepared for SCTE/ISBE by Ajay Manuga VP Engineering Benu Networks amanuja@benunets.com 2017 SCTE-ISBE
More informationThe Device Has Left the Building
The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use
More informationTITANIUM CLOUD VIRTUALIZATION PLATFORM
TITANIUM CLOUD VIRTUALIZATION PLATFORM Glenn Seiler Software Defined Infrastructure BU 30 Minutes 12 Content Slides 2017 WIND RIVER. ALL RIGHTS RESERVED. Wind River Titanium Cloud Titanium Cloud is a cloud
More informationGoogle on BeyondCorp: Empowering employees with security for the cloud era
SESSION ID: EXP-F02 Google on BeyondCorp: Empowering employees with security for the cloud era Jennifer Lin Director, Product Management, Security & Privacy Google Cloud What is BeyondCorp? Enterprise
More informationWIND RIVER NETWORKING SOLUTIONS
WIND RIVER NETWORKING SOLUTIONS TRANSFORMING THE NETWORK Businesses of all kinds are benefitting from the transformation of the networks they rely on, from LANs to WANs. Those network transformations are
More informationOPTIMIZE. MONETIZE. SECURE. Agile, scalable network solutions for service providers.
OPTIMIZE. MONETIZE. SECURE. Agile, scalable network solutions for service providers. INTRODUCTION F5 has innovated to help operators by embracing virtualization for the key elements of its portfolio, and
More informationSimplified service creation and delivery. Branch. SOHO Data Center. Control Center / NOC Packet Muse Service & Network Applications
ElastiNET FOR SERVICE PROVIDERS DEAL CONFIDENTLY WITH A CHANGING WORLD In today s world change is the only constant. Enabling technologies are changing, as is competition and customer expectations. Service
More informationBusting the top 5 myths of cloud-based authentication
Busting the top 5 myths of cloud-based authentication Insert Your Name Jason Hart CISSP CISM Vice President, Cloud Solutions SafeNet, Inc. Insert Your Title Insert Date Overview Cloud benefits Agility
More informationManaging & Accelerating Innovation with Open Source at the Edge
Managing & Accelerating Innovation with Open Source at the Edge Bill Hunt, CTO - Dianomic Welcome! The IIoT Opportunity Resolve Complexity & Fragmentation with FogLAMP Use case: Defense Contractor Aircraft
More informationELASTIC SERVICES PLATFORM
ELASTIC SERVICES PLATFORM SIMPLIFYING SERVICE DELIVERY The telecom industry is at the dawn of a bright new era - one in which new services and technologies, such as 5G, IoT, and smart cities, hold promise
More informationCT and IT architecture reconstruction based on software_. Global CTO
CT and IT architecture reconstruction based on software_ Global CTO 09.09.2015 We are evolving towards a Hyper Connected and Intelligent Digital World* The explosion of digital services makes connectivity
More informationAn insight into the IDP Group from Gemalto. Thorsten Krüger Sales Director DACH & CEE
An insight into the IDP Group from Gemalto Thorsten Krüger Sales Director DACH & CEE The year 2014 was a great year! 2 The Reality: Data Breaches 2014 1,023,108,267 RECORDS EXPOSED as the result of 1,541
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationPatching and Updating your VM SUSE Manager. Donald Vosburg, Sales Engineer, SUSE
Patching and Updating your VM SUSE Manager Donald Vosburg, Sales Engineer, SUSE dvosburg@suse.com Why should I care? I just clone my base VM image, and after that it is not my problem... Understand the
More informationThe Road to a Secure, Compliant Cloud
The Road to a Secure, Compliant Cloud The Road to a Secure, Compliant Cloud Build a trusted infrastructure with a solution stack from Intel, IBM Cloud SoftLayer,* VMware,* and HyTrust Technology innovation
More informationYour Digital Network. Your Future Unlocking the True benefit of Software defined Networking. Amol September 2016
Your Digital Network. Your Future Unlocking the True benefit of Software defined Networking Amol Phadke @Amol_AUP September 2016 Connected World Then Now Sensors Devices Networks APIs Apps Data 28.1B 25B
More informationARM instruction sets and CPUs for wide-ranging applications
ARM instruction sets and CPUs for wide-ranging applications Chris Turner Director, CPU technology marketing ARM Tech Forum Taipei July 4 th 2017 ARM computing is everywhere #1 shipping GPU in the world
More informationCybersecurity for Service Providers
Cybersecurity for Service Providers Alexandro Fernandez, CISSP, CISA, CISM, CEH, ECSA, ISO 27001LA, ISO 27001 LI, ITILv3, COBIT5 Security Advanced Services February 2018 There are two types of companies:
More informationChristopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud
Christopher Covert Principal Product Manager Enterprise Solutions Group Copyright 2016 Symantec Endpoint Protection Cloud THE PROMISE OF CLOUD COMPUTING We re all moving from challenges like these Large
More informationDisaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture. White Paper
Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
More informationMANAGING THE COMPLEXITY.
AS A SERVICE MANAGING THE COMPLEXITY. HOW WILL YOU SIMPLIFY ESN MIGRATION? Control room IT solutions play a vital role in incident management. Technologies such as Integrated Communications Control Systems
More informationInternet of Things: Driving the Transformation
Internet of Things: Driving the Transformation Annabel Nickles, PhD, MBA Director, Emerging Platform Solutions Integrated Computing Research Intel Labs 1 What Are People Saying about IOT? Vol. 12345 Nr.001
More informationService Delivery Platform
Solution Brief Service Delivery Platform Enabling the transition to high-value and more differentiated network services with new consumption models for deploying VNFs. Keeping Up With Cloud Expectations
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the
More informationUNIFY SUBSCRIBER ACCESS MANAGEMENT AND EXPLOIT THE BUSINESS BENEFITS OF NOKIA REGISTERS ON VMWARE vcloud NFV
SOLUTION OVERVIEW UNIFY SUBSCRIBER ACCESS MANAGEMENT AND EXPLOIT THE BUSINESS BENEFITS OF NOKIA REGISTERS ON VMWARE vcloud NFV Subscriber data management (SDM) plays a significant role in network evolution
More informationWhose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control SESSION ID: CDS-T11 Sheung-Chi NG Senior Security Consulting Manager, APAC SafeNet, Inc. Cloud and Virtualization Are Change the
More informationDrive digital transformation with an enterprise-grade Managed Private Cloud
Singtel Business Product Factsheet Brochure Managed Private Defense Cloud Services Drive digital transformation with an enterprise-grade Managed Private Cloud Singtel Managed Private Cloud enables enterprises
More informationCurrent Challenges on SDN Research
Software Defined Networks ISCTE, April 04 2018 Current Challenges on SDN Research Rui L. Aguiar ruilaa@ua.pt Universidade de Aveiro Instituto de Telecomunicações 2005, it - instituto de telecomunicações.
More informationQoS/QoE in future IoT/5G Networks: A Telco transformation infrastructure perspective.
TIM BRASIL Rio de Janeiro, 29 de Novembro de 2017 QoS/QoE in future IoT/5G Networks: A Telco transformation infrastructure perspective. AGENDA THE CONTEXT: UNDERSTANDING THE SCENARIOS TECHNOLOGIES, ARCHITECTURES
More informationJoel Obstfeld Director of Engineering SP CTO team November Cisco and/or its affiliates. All rights reserved. 1
Joel Obstfeld Director of Engineering SP CTO team November 2012 2012 Cisco and/or its affiliates. All rights reserved. 1 Controller architecture that efficiently computes & fits applica9on instances onto
More informationSecurity Architecture Models for the Cloud
White Paper Security Architecture Models for the Cloud Introduction While Hardware Security Module (HSM) customers traditionally have their own infrastructures and data centers and run HSMs on premises,
More information