Building a chain of trust from the device to the cloud Christian Kuhn, Senior Director, Business Development DNAC - 16 November 2017

Size: px
Start display at page:

Download "Building a chain of trust from the device to the cloud Christian Kuhn, Senior Director, Business Development DNAC - 16 November 2017"

Transcription

1 Building a chain of trust from the device to the cloud Christian Kuhn, Senior Director, Business Development DNAC - 16 November 2017

2 Trust is vital and it s what we provide enabling our clients to deliver a vast range of trusted digital services for billions of individuals and things. 2

3 5G comes with new security challenges BUILD FROM SECURITY SOLUTIONS FROM 3G/4G NEW SEGMENT-SPECIFIC SECURITY NEEDS NETWORK OPERATIONS CRITICAL COMMUNICATIONS AND V2X Begin with principles of authentication, integrity, confidentiality and privacy from 3G/4G Adapt for NFV and Multi-Access Edge Computing Security Architecture should be adapted to the needs of each slice IoT ENHANCED MOBILE BROADBAND MASSIVE IoT 3

4 Gemalto s role in Network Security & Software Licensing OUR SOLUTIONS User authentication and trusted identities Data encryption and key management Cloud and virtualization security Gemalto secures the device and enhances security of the virtualized network whilst guaranteeing licensing management Software Monetization 4

5 Network Security Should Rely on Certified Elements such as Hardware Security Modules SERIALIZED TAMPER EVIDENT STICKERS CERTIFICATIONS TAMPER RESISTANT SCREWS INTRUSION DETECTION SWITCHES ON LID INTERNAL BAFFLES TO PREVENT PROBING TAMPER RESISTANT I/O MOUNTS DYNAMIC CRYPTO RESOURCE CRYPTO HYPERVISOR TAMPER RESISTANT FAN MOUNTS HARDWARE SECURITY MODULE 5

6 Key Issues in 5G Virtualization Security OSS / BSS 1 Network slice isolation SERVICE, VNF & INFRASTRUCTURE DESCRIPTION ORCHESTRATOR Virtualization security VNF integrity verification during on boarding of VNF VNF EMS 1 EMS 2 EMS 3 VNF 1 VNF 2 VNF VNF MANAGERS Low Latency Interconnect with Multi-Access Edge Secured/measured boot & security enclaves for sensitive VNFs 5 NFV1 VIRTUALISATION LAYER VIRTUAL COMPUTE HARDWARE RESOURCES COMPUTING HARDWARE VIRTUAL STORAGE STORAGE HARDWARE 1 VIRTUAL NETWORK NETWORK HARDWARE 9 4 VIRTUALISED INFRASTRUCTURE MANAGER NFV M&O Physical and logical protection of Security Assets on motherboard Discovery mechanism of Security Hardware & characteristics (Openstack EPA) Run-time VNF Integrity verification Migration of VNF using security features 6

7 Mobile security chain: key architectural elements 1 Network slice isolation SERVICE PROVIDER MOBILE EDGE SERVICE PROVIDER SERVICE PROVIDER MOBILE CORE l VNF1, VNF2 5G MOBILE EDGE MOBILE EDGE VNFa, VNFb Slice 1 Slice 2 Network providing seamless IP connectivity suited to my reliability, availability, mobility and security needs Conforms to SLA Applications are running and data analysis take place at core and the edge 7

8 Strong Trust Establishment between Virtual Functions 2 3 Virtualization security, VNF integrity verification during on boarding of VNF MULTI-ACCESS EDGES NFV MANAGEMENT & ORCHESTRATOR (MANO) CORE HARDWARE SECURITY MODULE HARDWARE SECURITY MODULE Trigger Mutual Authentication between the MANO and resources Trigger Mutual Authentication between all virtualised elements on the same slice which interact Verify integrity of each function vs what was installed by the MANO vs image stored in VNF Manager 8

9 Strong Trust Establishment between Virtual Functions 2 3 Virtualization security, VNF integrity verification during on boarding of VNF MULTI-ACCESS EDGES NFV MANAGEMENT & ORCHESTRATOR (MANO) CORE HARDWARE SECURITY MODULE HARDWARE SECURITY MODULE 4 Implement integrity and confidentiality protection so that instructions and data cannot be compromised/modified 9

10 Is the connection from the Core to the Multi-Access Edge Secure? 4 Low Latency Interconnect with Multi-Access Edge 10

11 With 5G slicing isolate the communications between functions 4 Low Latency Interconnect with Multi-Access Edge MOBILE EDGES CORE Provide confidentiality and integrity protection for all data and virtual functions HSE HIGH SPEED ENCRYPTION HSE Provide confidentiality and integrity protection for all data and virtual functions 11

12 Protection of Applications & VNFs 5 Secured/measured boot & security enclaves for sensitive VNFs HYPERVISOR HARDWARE RESOURCES (CPU, STORAGE, NETWORK) NFV INFRASTRUCTURE A Hypervisor provides some basic level of isolation 12

13 Protection of Applications & VNFs 5 Secured/measured boot & security enclaves for sensitive VNFs HYPERVISOR HARDWARE RESOURCES (CPU, STORAGE, NETWORK) NFV INFRASTRUCTURE Malicious A code Hypervisor could be provides implemented some level to hack of isolation through the walls 13

14 Protection of Applications & VNFs 5 Secured/measured boot & security enclaves for sensitive VNFs HYPERVISOR HARDWARE RESOURCES (CPU, STORAGE, NETWORK) NFV INFRASTRUCTURE Secure Malicious enclaves A code Hypervisor ( Hardware could be provides Mediated implemented some Execution level to hack of Environment ) isolation through the walls in the CPU increase isolation between the VNFs but are limited in capacity 14

15 Protection of Applications & VNFs 5 Secured/measured boot & security enclaves for sensitive VNFs HYPERVISOR HARDWARE RESOURCES (CPU, STORAGE, NETWORK) Cloud HSM(s) NFV INFRASTRUCTURE 15 A Secure local or Malicious enclaves cloud-based A code ( HMEE ) Hypervisor HSM could tethered in be provides the implemented CPU to some the increase Enclave level to hack isolation of could isolation through increase between the walls the security VNFs level of the system for operations such as Key Generation or Mutual Auth. between functions

16 Protection of Applications & VNFs 5 Secured/measured boot & security enclaves for sensitive VNFs HYPERVISOR VNF Protect Agent HARDWARE RESOURCES (CPU, STORAGE, NETWORK) Cloud HSM HSM(s) NFV INFRASTRUCTURE 16 A Secure A HSM VNF Malicious tethered enclaves Protection A to code ( HMEE ) Hypervisor the Agent, could Enclave hosted in be provides the could implemented itself CPU increase some the level to Hardware the hack isolation of security isolation through Mediated between level the of walls Execution the system VNFs Environment for operations can be such tethered as Key to real Generation HSMs based or Mutual in the Auth. cloud between allowing functions for elasticity and scalability

17 Advantages of VNF Protect Agent 5 Secured/measured boot & security enclaves for sensitive VNFs Container based protection, seamless interworking for VNFs or apps being deployed in various clouds Cloud based key management system means it s scales easily VNFs can be transferred from machine A to B seamlessly without deletion, recreation Flexible control mechanism, no single ownership structure => Centralised management (vs isolated, distributed hardware mechanisms) 17

18 Software Licensing Management How to forge sustainable business relationships between multiple stakeholders in a complex 5G environment APPLICATION PROVIDERS On-premise and cloud B2B applications NETWORK VENDORS Virtual Network Function scalable licensing CLOUD PROVIDERS Cloud services and applications The importance of security, protection, licensing, usage and entitlement management solutions is critical in helping the industry monetize their software and driving disruptive business models 18

19 Usage Based Pricing COMPANY PROFILE Name: Industry: Country: Revenues: Ericsson Telecom Supplier Sweden $US 9.8 BN REQUIREMENTS 1. Pay- per- use pricing models. 2. Mass usage data collec>on. 3. Telco- grade high availability and ultra- high performance. 4. En>rely hosted and operated by Ericsson. SENTINEL DELIVERABLES THE GEMALTO SOLUTION 1. Sen>nel Cloud 2. Consul>ng services 3. Integra>on Support 4. Customiza>ons 5. In- house opera>on of Sen>nel Cloud Back- Office EMS Define En>tle Ac>vate Report Sen$nel SCC License Usage Aggregate Sen$nel Client SCS API RunFme Device App License

20 Device Security per 5G Segment FOR THE MAIN 5G SUB-SEGMENTS, WE NEED TO ANALYSE: Device Capabilities (consumption/processing/memory...) Connectivity Cost (device) Connectivity Cost (recurring subscription) Type of service provider data in transit FOR THE ABOVE, WE NEED TO DETERMINE THE FOLLOWING REQUIREMENTS: Data Protection / Confidentiality Privacy / Anonymity Denial of Service Protection Anti-Clone mechanism WE THEN APPLY SECURITY SOLUTIONS (END-TO-END) 20

21 Segmenting Security Needs of Major 5G Use-Cases Security Needs (MNO/SP) Sub. Authentication Anti-DoS Confidentiality Sub. Authentication Anti-DoS Authenticity ID/Privacy Sub. Authentication Confidentiality+ ID/Privacy+ Integrity+ Anti-DoS Authenticity Sub. Authentication Confidentiality++ ID/Privacy++ Integrity++ Device FW Integrity Anti-DoS Authenticity Sub. Authentication Confidentiality+++ ID/Privacy+++ Integrity+++ Device FW Integrity Anti-DoS Authenticity Credentials Protection Complimentary Core Security to reinforce SOFTWARE IN TRUSTED ENCLAVE / SECURE ELEMENT WALLED GARDEN / OUT-OF-BAND MGMT / TOKENISATION / A.R.M. / S.F.U Basic Sensors Broadband Modem Set-Top Box Auto Info-tainment Industrial Basic Smart Wearable Retail (PoS) Laptop Smartphone/tablet Auto Telematics Home Automation Industrial Critical Medical Wearable Metering/Critical Sensors Public Safety/1st Resp. Military Remote Surgery V2X S.F.U.: Security Firmware Upgrade A.R.M.: Active Risk Management 21

22 It s important to find the right balance PROTECT IDs device Secure Element Software in Trusted Enclave Active Risk Management Out of Band Tokenisation Security Firmware Upgrade MANAGE IDs AND GRANT ACCESS core END-TO-END MOBILE NETWORK + SERVICE PROVIDER SECURITY FRAMEWORK RISK 22

23 Weaker Security at Device: Reinforce Core If a device does not support a Secure Element (cost, data worthless ) PROTECT IDs device Software in Trusted Enclave Active Risk Management Tokenisation Security Firmware Upgrade MANAGE IDs AND GRANT ACCESS core END-TO-END MOBILE NETWORK + SERVICE PROVIDER SECURITY FRAMEWORK RISK 23

24 Stronger Device Security: Core adapted accordingly If the SP data in transit requires normal to best-in-class security PROTECT IDs device Secure Element Security Firmware Upgrade MANAGE IDs AND GRANT ACCESS core END-TO-END MOBILE NETWORK + SERVICE PROVIDER SECURITY FRAMEWORK RISK 24

25 To conclude Virtualization brings new challenges in securing your core and edge clouds. Adapt appropriate security per network slice blueprint. Establish trust between functions, encrypt all data at rest or in transit. Choose your end-to-end security architecture wisely based upon the value of the data being transmitted and don t only consider the device bill of materials. Gemalto is focused on security at the device, multiaccess edge and the core with an appropriate footprint per 5G segment meeting both MNO and Service Provider requirements. We re working with the entire industry to continue to secure next generation mobile communications. 25

26 Thank you Paul Bradley, Head of 5G Gemalto Mobile Services & IoT Christian Kuhn, Senior Director, Business Gemalto Enterprise & Cybersecurity 26

ARM processors driving automotive innovation

ARM processors driving automotive innovation ARM processors driving automotive innovation Chris Turner Director of advanced technology marketing, CPU group ARM tech forums, Seoul and Taipei June/July 2016 The ultimate intelligent connected device

More information

Orange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November

Orange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November Orange Smart Cities Smart Metering and Smart Grid : how can a telecom operator contribute? November 5 2012 Nathalie Leboucher Vice President Smart Cities Program Orange 1 the Orange Group in a nutshell

More information

EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE PUBLIC

EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE PUBLIC EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE 6 2018 PUBLIC PUBLIC 2 Key concerns with IoT.. PUBLIC 3 Why Edge Computing? CLOUD Too far away Expensive connectivity

More information

Security in Cloud Environments

Security in Cloud Environments Security in Cloud Environments Security Product Manager Joern Mewes (joern.mewes@nokia.com) 16-11-2016 1 Cloud transformation happens in phases and will take 5+ years Steps into the cloud Now 2016+ 2020+

More information

Vodafone keynote. How smart networks are changing the corporate WAN. Peter Terry Brown Director of Connectivity & UC.

Vodafone keynote. How smart networks are changing the corporate WAN. Peter Terry Brown Director of Connectivity & UC. How smart networks are changing the corporate WAN Vodafone keynote Peter Terry Brown Director of Connectivity & UC 17 October 2017 About Vodafone Enterprise Connectivity & UC IoT Cloud & Security Our vision:

More information

5G Revolution & Service security in Korea

5G Revolution & Service security in Korea 5G Revolution & Service security in Korea 2018.03.19. Jae Hoon Nah 5G Standardization timeline Standards development & deployment Source: IHS 2 Usage scenario for 5G (ITU-R) 3 Potential opportunities of

More information

WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS

WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS Carrier networks are undergoing their biggest transformation since the beginning of the Internet. The ability to get to market quickly and to respond to

More information

IoT It s All About Security

IoT It s All About Security IoT It s All About Security Colin Walls colin_walls@mentor.com Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions. Linux is the registered trademark of Linus Torvalds

More information

Delivering High-mix, High-volume Secure Manufacturing in the Distribution Channel

Delivering High-mix, High-volume Secure Manufacturing in the Distribution Channel Delivering High-mix, High-volume Secure Manufacturing in the Distribution Channel Steve Pancoast Vice President, Engineering Secure Thingz Inc Rajeev Gulati Vice President and CTO Data IO Corporation 1

More information

Multi-tenancy of network operators and edge cloud services using small cells

Multi-tenancy of network operators and edge cloud services using small cells Multi-tenancy of network operators and edge cloud services using small cells Emmanouil Kafetzakis, Ph.D. ORION Innovations P.C. mkafetz@orioninnovations.gr Infocom World 2017, 25-10-2017 Athens, Greece

More information

PROVIDING NETWORK OPERATOR MULTI-TENANCY AND EDGE CLOUD SERVICES USING SMALL CELLS

PROVIDING NETWORK OPERATOR MULTI-TENANCY AND EDGE CLOUD SERVICES USING SMALL CELLS PROVIDING NETWORK OPERATOR MULTI-TENANCY AND EDGE CLOUD SERVICES USING SMALL CELLS Ioannis Giannoulakis, Ph.D. National Centre for Scientific Research Demokritos giannoul@iit.demokritos.gr Emmanouil Kafetzakis,

More information

Intelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access

Intelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access Now a part of Cisco We bought Viptela Intelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access Branch Hybrid WAN Transport IPsec Secure MPLS (IP-VPN) Private Cloud Virtual Private

More information

How Smart Networks are changing the Corporate WAN

How Smart Networks are changing the Corporate WAN How Smart Networks are changing the Corporate WAN Mark Bennett Head of Global Fixed Connectivity Vodafone Group Enterprise September 12017 About Vodafone Enterprise Unified Comms Cloud & Hosting Internet

More information

and public cloud infrastructure, including Amazon Web Services (AWS) and AWS GovCloud, Microsoft Azure and Azure Government Cloud.

and public cloud infrastructure, including Amazon Web Services (AWS) and AWS GovCloud, Microsoft Azure and Azure Government Cloud. DATA SHEET vthunder SOFTWARE FOR VIRTUAL & CLOUD INFRASTRUCTURE A10 vthunder software appliances enable organizations to SUPPORTED SOLUTIONS gain flexible, easy-to-deploy and high-performance secure application

More information

Azure Active Directory B2C. Daniel Dickinson Enterprise Mobility Specialist

Azure Active Directory B2C. Daniel Dickinson Enterprise Mobility Specialist Azure Active Directory B2C Daniel Dickinson Enterprise Mobility Specialist Are you ready? Is your identity system ready and secure? A consumer identity and access management system needs to be: Consumer-centric

More information

Network 2020 Vision. Nikos G. Panagiotidis Business Development Manager Intel Hellas S.A.

Network 2020 Vision. Nikos G. Panagiotidis Business Development Manager Intel Hellas S.A. Network 2020 Vision from Telco to QOE Service Provider Nikos G. Panagiotidis Business Development Manager Intel Hellas S.A. Need Positive Technology Spiral End To End IT Mobile Devices OSS/BSS User Experience

More information

Connecting Securely to the Cloud

Connecting Securely to the Cloud Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico

More information

Provisioning secure Identity for Microcontroller based IoT Devices

Provisioning secure Identity for Microcontroller based IoT Devices Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May

More information

TRESCCA Trustworthy Embedded Systems for Secure Cloud Computing

TRESCCA Trustworthy Embedded Systems for Secure Cloud Computing TRESCCA Trustworthy Embedded Systems for Secure Cloud Computing IoT Week 2014, 2014 06 17 Ignacio García Wellness Telecom Outline Welcome Motivation Objectives TRESCCA client platform SW framework for

More information

Network Virtualisation Vision and Strategy_ (based on lesson learned) Telefónica Global CTO

Network Virtualisation Vision and Strategy_ (based on lesson learned) Telefónica Global CTO Network Virtualisation Vision and Strategy_ (based on lesson learned) Telefónica I+D @ Global CTO 18.03.2014 Business development requires a continuous evolution of our network but it still seems unable

More information

Cloud strategy and deployment Experience. Carmen Agúndez Market Area Europe and Latin America Cloud Lead

Cloud strategy and deployment Experience. Carmen Agúndez Market Area Europe and Latin America Cloud Lead Cloud strategy and deployment Experience Carmen Agúndez Market Area Europe and Latin America Cloud Lead network evolution to 5G Integrated nodes Virtualized deployment Cloud deployment 5G Core Enterprise

More information

The Open Application Platform for Secure Elements.

The Open Application Platform for Secure Elements. The Open Application Platform for Secure Elements. Java Card enables secure elements, such as smart cards and other tamper-resistant security chips, to host applications, called applets, which employ Java

More information

MWC 2015 End to End NFV Architecture demo_

MWC 2015 End to End NFV Architecture demo_ MWC 2015 End to End NFV Architecture demo_ March 2015 demonstration @ Intel booth Executive summary The goal is to demonstrate how an advanced multi-vendor implementation of the ETSI ISG NFV architecture

More information

Enabling Smart Energy as a Service via 5G Mobile Network advances. The Energy as a Service: when the Smart Energy uses the 5G technology

Enabling Smart Energy as a Service via 5G Mobile Network advances. The Energy as a Service: when the Smart Energy uses the 5G technology Enabling Smart Energy as a Service via 5G Mobile Network advances The Energy as a Service: when the Smart Energy uses the 5G technology Ljubljana, 5G PPP Phase 3 Stakeholders Info day October 17 2017 Fiorentino

More information

Enhanced Privacy ID (EPID), 156

Enhanced Privacy ID (EPID), 156 Index A Accountability, 148 ActiveDirectory, 153 Amazon AWS EC2, 168 Anonymity, 148 Asset tagging, 96 Attestation definition, 65 dynamic remote attestation techniques, 66 IMA, 67 Intel Trust Attestation

More information

A Developer's Guide to Security on Cortex-M based MCUs

A Developer's Guide to Security on Cortex-M based MCUs A Developer's Guide to Security on Cortex-M based MCUs 2018 Arm Limited Nazir S Arm Tech Symposia India Agenda Why do we need security? Types of attacks and security assessments Introduction to TrustZone

More information

Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development

Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat

More information

Looking ahead with IBM i. 10+ year roadmap

Looking ahead with IBM i. 10+ year roadmap Looking ahead with IBM i 10+ year roadmap 1 Enterprises Trust IBM Power 80 of Fortune 100 have IBM Power Systems The top 10 banking firms have IBM Power Systems 9 of top 10 insurance companies have IBM

More information

Revolutionising mobile networks with SDN and NFV

Revolutionising mobile networks with SDN and NFV Revolutionising mobile networks with SDN and NFV Cambridge Wireless Virtual Networks SIG 8 th May 2014 Philip Bridge, Senior Network Architect at EE May 2014 Networks are getting messy Vertically integrated

More information

Using the tpm with iot

Using the tpm with iot Using the tpm with iot David Grawrock Security Architect, Senior Principle Engineer Agenda History Lesson What Does IoT Need How Does The Fulfill Needs Usage IoT Security 2 History Worked on the from 1999

More information

SmartNICs: Giving Rise To Smarter Offload at The Edge and In The Data Center

SmartNICs: Giving Rise To Smarter Offload at The Edge and In The Data Center SmartNICs: Giving Rise To Smarter Offload at The Edge and In The Data Center Jeff Defilippi Senior Product Manager Arm #Arm Tech Symposia The Cloud to Edge Infrastructure Foundation for a World of 1T Intelligent

More information

Verizon Software Defined Perimeter (SDP).

Verizon Software Defined Perimeter (SDP). Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.

More information

TRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS

TRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS TRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS MATTHEW SHORT SR PRODUCT LINE MANAGER DIGITAL NETWORKING MATTHEW.SHORT@NXP.COM A NEW POSITION OF STRENGTH #1 Communications Processors #1 RF Power Transistors

More information

NFV Infrastructure for Media Data Center Applications

NFV Infrastructure for Media Data Center Applications NFV Infrastructure for Media Data Center Applications Today s Presenters Roger Sherwood Global Strategy & Business Development, Cisco Systems Damion Desai Account Manager for Datacenter, SDN, NFV and Mobility,

More information

#RSAC #RSAC Thing Thing Thing Thing Thing Thing Edge Edge Gateway Gateway Cut costs Create value Find information in data then act Maintain Things Enrol Authorized Users & Things Authentication

More information

DIY Hosting for Online Privacy. Shoumik Palkar and Matei Zaharia Stanford University

DIY Hosting for Online Privacy. Shoumik Palkar and Matei Zaharia Stanford University DIY Hosting for Online Privacy Shoumik Palkar and Matei Zaharia Stanford University Before: A Federated Internet The Internet and its protocols were designed to be federated Organizations would host own

More information

5G SIM: Maximising MNO Investment in 5G Networks

5G SIM: Maximising MNO Investment in 5G Networks 5G SIM: Maximising MNO Investment in 5G Networks MNO migration to 5G has begun 67 Mobile Network Operators (MNOs) in 39 countries have announced 5G availability between 2018 and 2022 Source: GSA 1.36 billion

More information

DIY Hosting for Online Privacy

DIY Hosting for Online Privacy DIY Hosting for Online Privacy Shoumik Palkar and Matei Zaharia Stanford University Appeared at HotNets 2017 Before: A Federated Internet The Internet and its protocols were designed to be federated Organizations

More information

Enabling Agility through Modularity and Microservices TM Forum Middle East Jan 2018

Enabling Agility through Modularity and Microservices TM Forum Middle East Jan 2018 Enabling Agility through Modularity and Microservices TM Forum Middle East Jan 2018 Joann O Brien VP APIs & Ecosystems, TM Forum 2017 TM Forum 1 5G open ecosystems represent a $582bn opportunity as other

More information

Where is the Network Edge? MEC Deployment Options, Business Case & SDN Considerations

Where is the Network Edge? MEC Deployment Options, Business Case & SDN Considerations Where is the Network Edge? MEC Deployment Options, Business Case & SDN Considerations Ian Goetz, Chief Architect, Vodafone Global Account, Juniper Networks August, 2016 Market Trends & The Network Environment

More information

How DPI enables effective deployment of CloudNFV. David Le Goff / Director, Strategic & Product Marketing March 2014

How DPI enables effective deployment of CloudNFV. David Le Goff / Director, Strategic & Product Marketing March 2014 How DPI enables effective deployment of CloudNFV David Le Goff / Director, Strategic & Product Marketing March 2014 Key messages of this presentation 1. DPI (Deep Packet Inspection) is critical for effective

More information

Transforming IT: From Silos To Services

Transforming IT: From Silos To Services Transforming IT: From Silos To Services Chuck Hollis Global Marketing CTO EMC Corporation http://chucksblog.emc.com @chuckhollis IT is being transformed. Our world is changing fast New Technologies New

More information

TRANSFORM YOUR NETWORK

TRANSFORM YOUR NETWORK TRANSFORM YOUR NETWORK SIMPLIFY MODERNIZATION WITH AN INNOVATIVE ECOSYSTEM OF CERTIFIED SOLUTIONS AND PARTNERS TELECOMMUNICATIONS ECOSYSTEM E-BOOK TABLE OF CONTENTS Adapt to growing network demand...3

More information

Delivering on Cloud Transformation Infinite Solutions update. Presenter: Adam Davies, January 20 th, 2016

Delivering on Cloud Transformation Infinite Solutions update. Presenter: Adam Davies, January 20 th, 2016 Delivering on Cloud Transformation Infinite Solutions update Presenter: Adam Davies, January 20 th, 2016 Agenda Market Landscape, Opportunities and Challenges Update on Cisco Infinite Solutions Related

More information

ITU Workshop on Telecommunication Service Quality. Service assurance for Virtualized Networks and End-to-End Xhaul and C-RAN

ITU Workshop on Telecommunication Service Quality. Service assurance for Virtualized Networks and End-to-End Xhaul and C-RAN ITU Workshop on Telecommunication Service Quality Service assurance for Virtualized Networks and End-to-End Xhaul and C-RAN Evgeny Romanov, Solution Engineer, InfoVista www.infovista.com VistaInsight,

More information

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Number: CLO-001 Passing Score: 800 Time Limit: 120 min File Version: 39.7 http://www.gratisexam.com/ COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Exam Name: CompTIA

More information

Creating new data freedom with the Shared Data Layer

Creating new data freedom with the Shared Data Layer Creating new data freedom with the Shared Data Layer Helping operators to realize the full business potential of their core network data White Paper Contents 1. Executive Summary: Simplified core architecture

More information

Securing IoT with the ARM mbed ecosystem

Securing IoT with the ARM mbed ecosystem Securing IoT with the ARM mbed ecosystem Xiao Sun / Senior Applications Engineer / ARM ARM mbed Connect / Shenzhen, China December 5, 2016 Lots of interest in IoT security Researchers are looking into

More information

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer Modelos de Negócio na Era das Clouds André Rodrigues, Cloud Systems Engineer Agenda Software and Cloud Changed the World Cisco s Cloud Vision&Strategy 5 Phase Cloud Plan Before Now From idea to production:

More information

Innovating to Increase Revenue

Innovating to Increase Revenue WHITE PAPER Innovating to Increase Revenue Uniquely Driving Differentiation & Competitive Advantage INTRODUCTION The business drivers for mobile operators looking to transform their networks are: 1) Declining

More information

CHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING

CHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING www.hcltech.com CHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING Why Next-Gen Networks? The rapid and large scale adoption of new age disruptive digital technologies has resulted in astronomical growth

More information

Standards for V2X Communication and Implications for OEMs and ITS

Standards for V2X Communication and Implications for OEMs and ITS Standards for V2X Communication and Implications for OEMs and ITS FISITA Jürgen Daunis London Nov. 12, 2015 PACE OF CHANGE >50 billion connected devices Connections (billion) 25 years 5 billion connected

More information

Who s Protecting Your Keys? August 2018

Who s Protecting Your Keys? August 2018 Who s Protecting Your Keys? August 2018 Protecting the most vital data from the core to the cloud to the field Trusted, U.S. based source for cyber security solutions We develop, manufacture, sell and

More information

The Evolution of Network Slicing

The Evolution of Network Slicing The Evolution of Network Slicing With the support of Intel Dimitris Mavrakis Research Director 1. NETWORK SLICING MARKET DEVELOPMENT The current telco market is facing a major evolutionary step, where

More information

IBM Cloud for VMware Solutions

IBM Cloud for VMware Solutions Introduction 2 IBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager VMware on IBM Cloud Mehran Hadipour Director Business Development - Zerto Internal Use Only Do not distribute 3

More information

Accelerate Your Cloud Journey

Accelerate Your Cloud Journey Dubai, UAE 20th March 2013 Accelerate Your Cloud Journey James Spearman Dimension Data - Solutions Architect Cloud 2012 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect 1 Dimension

More information

Matti Latva-aho Academy Professor Director for Finnish Wireless Flagship 6Genesis University of Oulu, Centre for Wireless Communications (CWC)

Matti Latva-aho Academy Professor Director for Finnish Wireless Flagship 6Genesis University of Oulu, Centre for Wireless Communications (CWC) Matti Latva-aho Academy Professor Director for Finnish Wireless Flagship 6Genesis University of Oulu, Centre for Wireless Communications (CWC) FINLAND www.oulu.fi/ www.6genesis.org Challenge #1: Verticals

More information

Network Vision: Preparing Telefónica for the next generation of services. Enrique Blanco Systems and Network Global Director

Network Vision: Preparing Telefónica for the next generation of services. Enrique Blanco Systems and Network Global Director Network Vision: Preparing Telefónica for the next generation of services Enrique Blanco Systems and Network Global Director 19.09.2017 Mobile Access Vision Increasing 4G coverage, features and network

More information

A Holistic View of Telco Clouds

A Holistic View of Telco Clouds A Holistic View of Telco Clouds Cloud Computing in the Telecom environment, bridging the gap Miyazaki, 4 March 2012 (A workshop in conjunction with World Telecom Congress 2012) Authors: Lóránt Németh,

More information

Göran Näslund M2M Business Development Manager Smart Metering Vodafone Global Enterprise Sweden

Göran Näslund M2M Business Development Manager Smart Metering Vodafone Global Enterprise Sweden Göran Näslund M2M Business Development Manager Smart Metering Vodafone Global Enterprise Sweden M2M An enabler of Smart Grid 2 OUR CREDENTIALS We have over 200 people dedicated to M2M in our organisation

More information

Systems Engineering for Software-Defined Network Virtualisation. John Risson, Solutions Engineering Manager IP and Transport Engineering, Telstra

Systems Engineering for Software-Defined Network Virtualisation. John Risson, Solutions Engineering Manager IP and Transport Engineering, Telstra Systems Engineering for Software-Defined Network Virtualisation John Risson, Solutions Engineering Manager IP and Transport Engineering, Telstra Agenda Motivation Case Studies Opportunities and Challenges

More information

IOT, ENTERPRISES AND 5G

IOT, ENTERPRISES AND 5G IOT, ENTERPRISES AND 5G ELEVATING POLICY TO THE NEXT STAGE Policy Control Conference, Berlin, April 4-5 2017 NEW CLASSES OF USE CASES drive needs for evolved policy Massive MTC Critical MTC SMART BUILDING

More information

Deliver Data Protection Services that Boost Revenues and Margins

Deliver Data Protection Services that Boost Revenues and Margins FAMILY BROCHURE Gemalto s SafeNet Identity and Data Protection Solutions for Service Providers Deliver Data Protection Services that Boost Revenues and Margins Today, your customers and prospects are facing

More information

Nokia AirGile cloud-native core: shaping networks to every demand

Nokia AirGile cloud-native core: shaping networks to every demand Nokia AirGile cloud-native core: shaping networks to every demand The future of core networks? Today s networks focus on delivering voice and broadband services to people. Yet the rise of the Internet

More information

Deployment Case Study of SDN and NFV Transformation. Marcela Blanco-Luna Solutions Architect Advanced Services

Deployment Case Study of SDN and NFV Transformation. Marcela Blanco-Luna Solutions Architect Advanced Services Deployment Case Study of SDN and NFV Transformation Marcela Blanco-Luna Solutions Architect Advanced Services Future Network Platform Service Creation Service Design Service Assurance Cloud Optimization

More information

5G Network Slicing and Convergence. Maria Cuevas, Head of core network and services research BT plc

5G Network Slicing and Convergence. Maria Cuevas, Head of core network and services research BT plc 5G Network Slicing and Convergence Maria Cuevas, Head of core network and services research BT plc Contents 1 2 5G drivers Network slicing a b c d e Key drivers Key requirements / technical challenges

More information

Making 5G Real. Ericsson Internal Guilherme Alves Ericsson

Making 5G Real. Ericsson Internal Guilherme Alves Ericsson Making 5G Real Guilherme Alves Ericsson 2018-05-17 Agenda The ecosystem Technologies at the heart of 5G Consumer interest levels Low Average High Consumers: Give us more with 5G! Higher performance is

More information

Overview of the Juniper Networks Mobile Cloud Architecture

Overview of the Juniper Networks Mobile Cloud Architecture Overview of the Juniper Networks Mobile Cloud Architecture Laying the Foundation for a Next-Generation Secure Distributed Telco Cloud White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale,

More information

Backup and Recovery. Backup and Recovery from Redstor. Making downtime a thing of the past Making downtime a thing of the past

Backup and Recovery. Backup and Recovery from Redstor. Making downtime a thing of the past Making downtime a thing of the past Backup and Recovery Backup and Recovery Backup from Redstor and Recovery from Redstor Making downtime a thing of the past Making downtime a thing of the past Reject risk Preventing data loss is a challenge

More information

Virtualizing Managed Business Services for SoHo/SME Leveraging SDN/NFV and vcpe

Virtualizing Managed Business Services for SoHo/SME Leveraging SDN/NFV and vcpe Virtualizing Managed Business Services for SoHo/SME Leveraging SDN/NFV and vcpe A Technical Paper prepared for SCTE/ISBE by Ajay Manuga VP Engineering Benu Networks amanuja@benunets.com 2017 SCTE-ISBE

More information

The Device Has Left the Building

The Device Has Left the Building The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use

More information

TITANIUM CLOUD VIRTUALIZATION PLATFORM

TITANIUM CLOUD VIRTUALIZATION PLATFORM TITANIUM CLOUD VIRTUALIZATION PLATFORM Glenn Seiler Software Defined Infrastructure BU 30 Minutes 12 Content Slides 2017 WIND RIVER. ALL RIGHTS RESERVED. Wind River Titanium Cloud Titanium Cloud is a cloud

More information

Google on BeyondCorp: Empowering employees with security for the cloud era

Google on BeyondCorp: Empowering employees with security for the cloud era SESSION ID: EXP-F02 Google on BeyondCorp: Empowering employees with security for the cloud era Jennifer Lin Director, Product Management, Security & Privacy Google Cloud What is BeyondCorp? Enterprise

More information

WIND RIVER NETWORKING SOLUTIONS

WIND RIVER NETWORKING SOLUTIONS WIND RIVER NETWORKING SOLUTIONS TRANSFORMING THE NETWORK Businesses of all kinds are benefitting from the transformation of the networks they rely on, from LANs to WANs. Those network transformations are

More information

OPTIMIZE. MONETIZE. SECURE. Agile, scalable network solutions for service providers.

OPTIMIZE. MONETIZE. SECURE. Agile, scalable network solutions for service providers. OPTIMIZE. MONETIZE. SECURE. Agile, scalable network solutions for service providers. INTRODUCTION F5 has innovated to help operators by embracing virtualization for the key elements of its portfolio, and

More information

Simplified service creation and delivery. Branch. SOHO Data Center. Control Center / NOC Packet Muse Service & Network Applications

Simplified service creation and delivery. Branch. SOHO Data Center. Control Center / NOC Packet Muse Service & Network Applications ElastiNET FOR SERVICE PROVIDERS DEAL CONFIDENTLY WITH A CHANGING WORLD In today s world change is the only constant. Enabling technologies are changing, as is competition and customer expectations. Service

More information

Busting the top 5 myths of cloud-based authentication

Busting the top 5 myths of cloud-based authentication Busting the top 5 myths of cloud-based authentication Insert Your Name Jason Hart CISSP CISM Vice President, Cloud Solutions SafeNet, Inc. Insert Your Title Insert Date Overview Cloud benefits Agility

More information

Managing & Accelerating Innovation with Open Source at the Edge

Managing & Accelerating Innovation with Open Source at the Edge Managing & Accelerating Innovation with Open Source at the Edge Bill Hunt, CTO - Dianomic Welcome! The IIoT Opportunity Resolve Complexity & Fragmentation with FogLAMP Use case: Defense Contractor Aircraft

More information

ELASTIC SERVICES PLATFORM

ELASTIC SERVICES PLATFORM ELASTIC SERVICES PLATFORM SIMPLIFYING SERVICE DELIVERY The telecom industry is at the dawn of a bright new era - one in which new services and technologies, such as 5G, IoT, and smart cities, hold promise

More information

CT and IT architecture reconstruction based on software_. Global CTO

CT and IT architecture reconstruction based on software_. Global CTO CT and IT architecture reconstruction based on software_ Global CTO 09.09.2015 We are evolving towards a Hyper Connected and Intelligent Digital World* The explosion of digital services makes connectivity

More information

An insight into the IDP Group from Gemalto. Thorsten Krüger Sales Director DACH & CEE

An insight into the IDP Group from Gemalto. Thorsten Krüger Sales Director DACH & CEE An insight into the IDP Group from Gemalto Thorsten Krüger Sales Director DACH & CEE The year 2014 was a great year! 2 The Reality: Data Breaches 2014 1,023,108,267 RECORDS EXPOSED as the result of 1,541

More information

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION

More information

Patching and Updating your VM SUSE Manager. Donald Vosburg, Sales Engineer, SUSE

Patching and Updating your VM SUSE Manager. Donald Vosburg, Sales Engineer, SUSE Patching and Updating your VM SUSE Manager Donald Vosburg, Sales Engineer, SUSE dvosburg@suse.com Why should I care? I just clone my base VM image, and after that it is not my problem... Understand the

More information

The Road to a Secure, Compliant Cloud

The Road to a Secure, Compliant Cloud The Road to a Secure, Compliant Cloud The Road to a Secure, Compliant Cloud Build a trusted infrastructure with a solution stack from Intel, IBM Cloud SoftLayer,* VMware,* and HyTrust Technology innovation

More information

Your Digital Network. Your Future Unlocking the True benefit of Software defined Networking. Amol September 2016

Your Digital Network. Your Future Unlocking the True benefit of Software defined Networking. Amol September 2016 Your Digital Network. Your Future Unlocking the True benefit of Software defined Networking Amol Phadke @Amol_AUP September 2016 Connected World Then Now Sensors Devices Networks APIs Apps Data 28.1B 25B

More information

ARM instruction sets and CPUs for wide-ranging applications

ARM instruction sets and CPUs for wide-ranging applications ARM instruction sets and CPUs for wide-ranging applications Chris Turner Director, CPU technology marketing ARM Tech Forum Taipei July 4 th 2017 ARM computing is everywhere #1 shipping GPU in the world

More information

Cybersecurity for Service Providers

Cybersecurity for Service Providers Cybersecurity for Service Providers Alexandro Fernandez, CISSP, CISA, CISM, CEH, ECSA, ISO 27001LA, ISO 27001 LI, ITILv3, COBIT5 Security Advanced Services February 2018 There are two types of companies:

More information

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud Christopher Covert Principal Product Manager Enterprise Solutions Group Copyright 2016 Symantec Endpoint Protection Cloud THE PROMISE OF CLOUD COMPUTING We re all moving from challenges like these Large

More information

Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture. White Paper

Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture. White Paper Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

MANAGING THE COMPLEXITY.

MANAGING THE COMPLEXITY. AS A SERVICE MANAGING THE COMPLEXITY. HOW WILL YOU SIMPLIFY ESN MIGRATION? Control room IT solutions play a vital role in incident management. Technologies such as Integrated Communications Control Systems

More information

Internet of Things: Driving the Transformation

Internet of Things: Driving the Transformation Internet of Things: Driving the Transformation Annabel Nickles, PhD, MBA Director, Emerging Platform Solutions Integrated Computing Research Intel Labs 1 What Are People Saying about IOT? Vol. 12345 Nr.001

More information

Service Delivery Platform

Service Delivery Platform Solution Brief Service Delivery Platform Enabling the transition to high-value and more differentiated network services with new consumption models for deploying VNFs. Keeping Up With Cloud Expectations

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the

More information

UNIFY SUBSCRIBER ACCESS MANAGEMENT AND EXPLOIT THE BUSINESS BENEFITS OF NOKIA REGISTERS ON VMWARE vcloud NFV

UNIFY SUBSCRIBER ACCESS MANAGEMENT AND EXPLOIT THE BUSINESS BENEFITS OF NOKIA REGISTERS ON VMWARE vcloud NFV SOLUTION OVERVIEW UNIFY SUBSCRIBER ACCESS MANAGEMENT AND EXPLOIT THE BUSINESS BENEFITS OF NOKIA REGISTERS ON VMWARE vcloud NFV Subscriber data management (SDM) plays a significant role in network evolution

More information

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control SESSION ID: CDS-T11 Sheung-Chi NG Senior Security Consulting Manager, APAC SafeNet, Inc. Cloud and Virtualization Are Change the

More information

Drive digital transformation with an enterprise-grade Managed Private Cloud

Drive digital transformation with an enterprise-grade Managed Private Cloud Singtel Business Product Factsheet Brochure Managed Private Defense Cloud Services Drive digital transformation with an enterprise-grade Managed Private Cloud Singtel Managed Private Cloud enables enterprises

More information

Current Challenges on SDN Research

Current Challenges on SDN Research Software Defined Networks ISCTE, April 04 2018 Current Challenges on SDN Research Rui L. Aguiar ruilaa@ua.pt Universidade de Aveiro Instituto de Telecomunicações 2005, it - instituto de telecomunicações.

More information

QoS/QoE in future IoT/5G Networks: A Telco transformation infrastructure perspective.

QoS/QoE in future IoT/5G Networks: A Telco transformation infrastructure perspective. TIM BRASIL Rio de Janeiro, 29 de Novembro de 2017 QoS/QoE in future IoT/5G Networks: A Telco transformation infrastructure perspective. AGENDA THE CONTEXT: UNDERSTANDING THE SCENARIOS TECHNOLOGIES, ARCHITECTURES

More information

Joel Obstfeld Director of Engineering SP CTO team November Cisco and/or its affiliates. All rights reserved. 1

Joel Obstfeld Director of Engineering SP CTO team November Cisco and/or its affiliates. All rights reserved. 1 Joel Obstfeld Director of Engineering SP CTO team November 2012 2012 Cisco and/or its affiliates. All rights reserved. 1 Controller architecture that efficiently computes & fits applica9on instances onto

More information

Security Architecture Models for the Cloud

Security Architecture Models for the Cloud White Paper Security Architecture Models for the Cloud Introduction While Hardware Security Module (HSM) customers traditionally have their own infrastructures and data centers and run HSMs on premises,

More information