Availability For Network Function Virtualization. Alon Bernstein Distinguished Engineer Cisco Systems

Size: px
Start display at page:

Download "Availability For Network Function Virtualization. Alon Bernstein Distinguished Engineer Cisco Systems"

Transcription

1 Availability For Network Function Virtualization Alon Bernstein Distinguished Engineer Cisco Systems

2 Availability Using Software In The Data Center Storage Compute Networking (NFV)

3 NFV Redundancy Requirements Minimal packet loss High bandwidth Stateful

4 Example : vcpe Redundancy

5 Example : vcpe Redundancy

6 Example : vcpe Data Path

7 ETSI-NFV

8 Conclusion NFV can support high availability Traditional as well as new Availability models are possible in the data center

9 Distributed Trace For Comcast Video May 2015

10 ARCHITECTURE SKETCH Comcast Confidential & Proprietary 2

11 GRAPH OF CALLS Comcast Confidential & Proprietary 3

12 GRAPH OF CALLS WITH ANNOTATIONS Comcast Confidential & Proprietary 4

13 SIMPLE CORE PROTOCOL Traces A trace encompasses all interactions, generally for some interesting user interaction. Here, it s going to encompass a video playback session. Spans A span is some small chunk of that, here, it will almost always be handling or making a service call. Traces and Spans both have IDs. Trace IDs in our scheme are GUIDs, Spans are pseudorandomly generated integers. Pass information around on X-MoneyTrace header. X-MoneyTrace:traceId=$TraceId;spanID=$SpanID;ParentID=$ParentID At each new span generation, generate a new Span ID, and move existing Span ID to the Parent Span. Every service call passes X-MoneyTrace, and every service responds with the same X-MoneyTrace when it responds to the call. Comcast Confidential & Proprietary 5

14 Virtual Business CPE Accelerating Quote to Cash and Enhancing Operational Flexibility Kevin Luehrs, Director, CableLabs

15 Cloud Technologies Transform the Landscape Cloud Computing to Software Defined Networks Dynamic demand for services in data centers drove evolution of Software Defined Networking (SDN) Separation of control from data Control functions centralized under a single software controller Software control of data paths, network functions and packet handling rules improve flexibility and enable greater automation.

16 Virtualization OS Hardware Virtualization Initiation of self-contained instances of an operating system and software applications on a hardware platform emulating an independent device. Virtual machines can be installed in a host and operate as separate devices even with different OS. OS OS Network Function Virtualization (NFV) Implementing network functions as software programs that can be run independently or as a group on industry standard servers. Route Load Balance DPI Functions can be moved out of purpose-built hardware into standard servers in the cloud. Switch Performance Management Tag

17 Cloud Technologies Transform the Landscape Hypothesis Cloud technologies that transformed data centers will similarly transform networks Opportunity The emergence of new access network technologies such as DOCSIS 3.1, EPON and EPoC and greater adoption of SDN provides opportunity for virtualization of networks and services.

18 Use Case: Virtual Business CPE Apply virtualization methods to delivery of business services SDN to configure endpoint devices and establish connections Software control facilitates automation NFV for flexibility in deploying services Business services providers run applications to provision and manage devices and connections. SDN & NFV can be used to accomplish this

19 Problem Statement No standard and open Application Programming Interfaces (APIs) are currently available to expose open source SDN controller features for Business Services applications. SDN controllers manage device configuration and connections based on inputs from network applications. Open source SDN controllers are supported by collaborative developer communities. Enable scale, rapid development, diversity of ideas

20 Proposed Solution Develop data models and standard open APIs enabling delivery of business services using open source virtualization techniques. Submit data models and APIs to open source project for evolution, adoption and use by NFV community. Develop a reference software platform integrating RESTful APIs, OpenDaylight and OVSDB/OVS

21 Virtual Business CPE Demo Platform Raspberry Pi

22 Thank You

23 A History of Abuse Lies, Damned Lies, and Cybersecurity Metrics

24 Past - The Abuse Department An Internet Service Provider s abuse department processes reports of Acceptable Use Policy (AUP) violations Reports enter the system via the ISP s abuse@ address. Reports range in seriousness from criminal activity down to people calling each other names

25 Annual Ticket Volume

26 Annual Ticket Volume by Type

27 Malware Ticket Volume

28 Present - The Customer Safety Department Since the early 2000 s, the number of customers intentionally launching attacks has dwindled to almost nothing compared with malware. Today s offenders are also victims, and we do our best to protect them

29 Spam Ticket Volume

30 From Abuse to Customer Safety

31 Future The Ecosystem Literally everyone on the internet has at least a detection capability Many also have a notification capability (e.g. banks, search engines, and social media) Some even have a remediation capability (e.g. Facebook s malware walled garden) It takes a village to raise a child, and it takes an internet to fight cybercrime.

32 RDK + CA/DRM: ENHANCING INTEROPERABILITY FOR ROBUST REVENUE SECURITY Petr Peterka Verimatrix

33 Agenda Benefits and Challenges of RDK RDK and Revenue Security Mitigating Threats to Revenue Security Power of Standardization Looking Forward

34 Benefits and Challenges of RDK Benefits: Common implementation vs. common specification Cost benefits Accelerated development Supports differentiation Challenges: Security threats Interoperability with CAS and DRM 4K UHD security requirements OSS license obligations require careful attention

35 RDK and Revenue Security CAS/DRM RDK interfaces: 1. Interaction with the content tuner/demultiplexer 2. Interaction with a hardware security (root of trust, descrambling, key ladders, etc.) 3. Interaction with the application layer 4. Access to IP stack 5. Forensic watermarking CAS should be isolated from the middleware and application functionality for robustness reasons Abstracting out main functions for interoperability reasons

36 Mitigating Threats Interaction between the application and the CA client: 1. Tuning/Navigation 2. Initialization/Provisioning 3. Authorization/Entitlements 4. On-screen Display

37 Power of Standardization Examples of relevant standards organizations: SCTE OMS: Hardware root of trust (K-LAD) DVB Simulcrypt and MPEG-DASH Common Encryption (CENC) GlobalPlatform: Trusted Execution Environment (TEE) OSS implementation is possible

38 Looking Forward RDK is stable but still need abstract CAS APIs and HW security abstraction Plus Downloadable Security extension pending FCC DSTAC outcome

39 Questions?

40 Introducing an Abstraction Layer to Control the User Experience, Apps and Integrate Content on All Screens By Albert Dahan Co-Founder and CTO, Metrological

41 Market Challenges Integrating live TV, OTT content, widgets, third party apps into a single user experience on all screens Retaining control of the user experience across a growing number of devices Native apps running on STB middleware clients require device-specific solutions for each STB, mobile and tablet device Managing multiple, separate backend management structures for each content source Growing development costs for maintaining multiple versions of each app for each device Mounting pressure to lower operational costs while meeting consumer demand for OTT/app content, live TV and VOD content increases the demands on STB CPU and memory

42 Native vs Abstraction Layer Approach Native Development Approach Resides on the device requiring a device-specific solution Dictates development of many different versions of each app for each device Based on closed, monolithic software solutions Requires MVPDs to upgrade to next-gen IP STBs with browsers Closed app development community Separates OTT, live TV and apps viewing Key functionality built into the app itself Abstraction Layer/Framework Uses browser as a generic integration point to run and control the user interface, apps and client services across connected devices A single version of each app runs on all devices Uses modular software components that connect new web-based and open source technologies Minimizes CPU and memory usage of the end device ; deployable on browserless legacy STBs Open app development community via SDKs Integrates OTT, app and live TV viewing experiences enables new functionality and interactivity Apps are isolated in their own sandbox, separating key functionality and using it as a shared resource

43 Abstract Layer/Framework Approach Separates MVPD backend, device middleware and operating system from the user interface, presentation and navigation layers on each device Operates independently from the device eliminating the need for device-specific approaches Merges all content onto one screen, enabling new contextual, mobile and social features Minimizes CPU and memory usage of the end device Deployable on legacy or browser-less STBs Uses small, modular software components that connect new web-based and open source technologies with existing legacy ecosystems Apps only need to be developed once to run on all devices and can be developed by anyone using an open Software Development Kit (SDK)

44 Evolution of TV App Platform Development Phase 1: Native apps on STB middleware Phase 2: Web-based apps Phase 3: Proprietary MVPD app environments Phase 4: HTML5-based abstraction layer *Need to develop app for each device *Requires browser optimization and lacks integration with middleware, backend *Each app must be developed for each MVPD *HTML5 standard still evolving

45 Thank you! Albert Dahan Co-Founder and CTO, Metrological

Towards Secure Multi-network Video Services. Steve Oetegenn, President

Towards Secure Multi-network Video Services. Steve Oetegenn, President Towards Secure Multi-network Video Services Steve Oetegenn, President Contents Market Dynamics Multi-network Solutions Evolution of Security 2 Copyright 2015 Verimatrix, Inc. CONFIDENTIAL OTT Market Dynamics

More information

demonstrations of service offerings and in public comments made during advisory committee meetings.

demonstrations of service offerings and in public comments made during advisory committee meetings. DSTAC SUMMARY REPORT FINAL: 8/28/2015 Introduction The STELA Reauthorization (STELAR) Act of 2014 directed the FCC Chairman to establish a working group of technical experts that represent the viewpoints

More information

SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi george.sarosi@twcable.com

SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi george.sarosi@twcable.com SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi george.sarosi@twcable.com Abstract Time Warner Cable is the second largest Cable TV operator in North America

More information

ARM s role in Open Source software

ARM s role in Open Source software ARM s role in Open Source software The Network Infrastructure perspective Bob Monkman Enterprise Segment Marketing Manager September 2015 Open Source Software: definition Open source software is developed

More information

OUR STRATEGY FOR STB-LESS IPTV

OUR STRATEGY FOR STB-LESS IPTV OUR STRATEGY FOR STB-LESS IPTV Dr. Oliver Friedrich, IPTV Semi 2014, The Hague ONE YEAR LATER General platform strategy & new deployments inside Deutsche Telekom HTML5, De-coupling, Partnering, Standards

More information

Making the Case for Open Source Controllers

Making the Case for Open Source Controllers White Paper Making the Case for Open Source Controllers Prepared by Roz Roseboro Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.brocade.com September 2014 Introduction Telcos face

More information

Testing & Assuring Mobile End User Experience Before Production. Neotys

Testing & Assuring Mobile End User Experience Before Production. Neotys Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,

More information

VIRTUALIZING THE EDGE

VIRTUALIZING THE EDGE VIRTUALIZING THE EDGE NFV adoption to transform telecommunications infrastructure Karthik Kailasam Director, Integrated Modular Solutions September 2015 Key Messages The transformation of telecom networks

More information

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of

More information

Securing end devices

Securing end devices Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security

More information

Introduction. Kari SYSTÄ. Laulasmaa 28.10.2013

Introduction. Kari SYSTÄ. Laulasmaa 28.10.2013 Introduction Kari SYSTÄ Laulasmaa 28.10.2013 About me a short CV Various research and teaching roles at TUT PhD in Computer Science in 1995 Various research and management positions in Nokia Interactive

More information

Threat landscape how are you getting attacked and what can you do better protect yourself and your e-commerce platform

Threat landscape how are you getting attacked and what can you do better protect yourself and your e-commerce platform Threat landscape how are you getting attacked and what can you do better protect yourself and your e-commerce platform Sebastian Zabala Senior Systems Engineer 2013 Trustwave Holdings, Inc. 1 THREAT MANAGEMENT

More information

Evolution of OpenCache: an OpenSource Virtual Content Distribution Network (vcdn) Platform

Evolution of OpenCache: an OpenSource Virtual Content Distribution Network (vcdn) Platform Evolution of OpenCache: an OpenSource Virtual Content Distribution Network (vcdn) Platform Daniel King d.king@lancaster.ac.uk Matthew Broadbent m.broadbent@lancaster.ac.uk David Hutchison d.hutchison@lancaster.ac.uk

More information

Alcatel-Lucent Multiscreen Video Platform RELEASE 2.2

Alcatel-Lucent Multiscreen Video Platform RELEASE 2.2 Alcatel-Lucent Multiscreen Video Platform RELEASE 2.2 Enrich the user experience and build more valuable customer relationships by delivering personal, seamless and social multiscreen video services Embrace

More information

Delivering Managed Services Using Next Generation Branch Architectures

Delivering Managed Services Using Next Generation Branch Architectures Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN

More information

Looking Ahead The Path to Moving Security into the Cloud

Looking Ahead The Path to Moving Security into the Cloud Looking Ahead The Path to Moving Security into the Cloud Gerhard Eschelbeck Sophos Session ID: SPO2-107 Session Classification: Intermediate Agenda The Changing Threat Landscape Evolution of Application

More information

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera rbarrera@grupo-dice.com. VERSION May, 2015

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera rbarrera@grupo-dice.com. VERSION May, 2015 Simplify IT With Cisco Application Centric Infrastructure Roberto Barrera rbarrera@grupo-dice.com VERSION May, 2015 Content Understanding Software Definded Network (SDN) Why SDN? What is SDN and Its Benefits?

More information

Prospects for Software Defined Networking & Network Function Virtualization in Media and Broadcast John Ellerton

Prospects for Software Defined Networking & Network Function Virtualization in Media and Broadcast John Ellerton Prospects for Software Defined Networking & Network Function Virtualization in Media and Broadcast John Ellerton Head of Media Futures, British Telecom john.ellerton@bt.com Agenda The Promise of SDN and

More information

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic 1110 Cool Things Your Firewall Should Do Extending beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application

More information

Sophistication of attacks will keep improving, especially APT and zero-day exploits

Sophistication of attacks will keep improving, especially APT and zero-day exploits FAQ Isla Q&A General What is Isla? Isla is an innovative, enterprise-class web malware isolation system that prevents all browser-borne malware from penetrating corporate networks and infecting endpoint

More information

Preparing your Business for Virtualization. Mirko Voltolini VP Network Technology mirko.voltolini@colt.net

Preparing your Business for Virtualization. Mirko Voltolini VP Network Technology mirko.voltolini@colt.net Preparing your Business for Virtualization Mirko Voltolini VP Network Technology mirko.voltolini@colt.net SDN and NFV are transforming networks The virtualisation of IT has transformed the consumption

More information

Strategic Direction of Networking IPv6, SDN and NFV Where Do You Start?

Strategic Direction of Networking IPv6, SDN and NFV Where Do You Start? Strategic Direction of Networking IPv6, SDN and NFV Where Do You Start? Yanick Pouffary HP Distinguished Technologist, Chief Technologist Technology Services Mobility & Networking Forward-looking statements

More information

1.1.1 Introduction to Cloud Computing

1.1.1 Introduction to Cloud Computing 1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the

More information

Group-Based Policy for OpenStack

Group-Based Policy for OpenStack Group-Based Policy for OpenStack Introduction Over the past four years, OpenStack has grown from a simple open source project to a major community-based initiative including thousands of contributors in

More information

Enhancing Hypervisor and Cloud Solutions Using Embedded Linux Iisko Lappalainen MontaVista

Enhancing Hypervisor and Cloud Solutions Using Embedded Linux Iisko Lappalainen MontaVista Enhancing Hypervisor and Cloud Solutions Using Embedded Linux Iisko Lappalainen MontaVista Setting the Stage This presentation will discuss the usage of Linux as a base component of hypervisor components

More information

Conference. Smart Future Networks THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF EVERYTHING

Conference. Smart Future Networks THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF EVERYTHING Conference THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF Smart Future Networks www.internet-of-things.no EVERYTHING Patrick Waldemar Vice President Telenor Research and Future

More information

SDN, NFV & Future Technologies. Chris Thompson Director of Product Management, Cloud Connectivity Solutions

SDN, NFV & Future Technologies. Chris Thompson Director of Product Management, Cloud Connectivity Solutions SDN, NFV & Future Technologies Chris Thompson Director of Product Management, Cloud Connectivity Solutions Agenda SDN & NFV projections Terminology and protocols Overview of SDN, NFV and NV CPE Evolution

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Steelcape Product Overview and Functional Description

Steelcape Product Overview and Functional Description Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session

More information

RTC:engine. WebRTC SOLUTION SIPWISE AND DEUTSCHE TELEKOM / TLABS ANNOUNCE COOPERATION FOR THE

RTC:engine. WebRTC SOLUTION SIPWISE AND DEUTSCHE TELEKOM / TLABS ANNOUNCE COOPERATION FOR THE SIPWISE AND DEUTSCHE TELEKOM / TLABS ANNOUNCE COOPERATION FOR THE WebRTC SOLUTION RTC:engine Sipwise and Deutsche Telekom AG / Telekom Innovation Laboratories signed a cooperation agreement for joint development

More information

The promise of SDN. EU Future Internet Assembly March 18, 2014. Yanick Pouffary Chief Technologist HP Network Services

The promise of SDN. EU Future Internet Assembly March 18, 2014. Yanick Pouffary Chief Technologist HP Network Services The promise of SDN EU Future Internet Assembly March 18, 2014 Yanick Pouffary Chief Technologist HP Network Services Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein

More information

What is SDN all about?

What is SDN all about? What is SDN all about? Emil Gągała Juniper Networks Piotr Jabłoński Cisco Systems In the beginning there was a chaos CLOUD BUILDING BLOCKS CAN I VIRTUALIZE MY Compute Network? Storage Where is my money?

More information

Simplifying IT with SDN & Virtual Application Networks

Simplifying IT with SDN & Virtual Application Networks Simplifying IT with SDN & Virtual Application Networks Justin Chiah Product Category Head HP Networking APJ Solutions for the New Style of IT Networking innovations lay the foundation for transformation

More information

Network Virtualization Solutions

Network Virtualization Solutions Network Virtualization Solutions An Analysis of Solutions, Use Cases and Vendor and Product Profiles October 2013 The Independent Community and #1 Resource for SDN and NFV Tables of Contents Introduction

More information

Introduction to Quality Assurance for Service Provider Network Functions Virtualization

Introduction to Quality Assurance for Service Provider Network Functions Virtualization Introduction to Quality Assurance for Service Provider Network Functions Virtualization Carsten Rossenhoevel, Managing Director European Advanced Networking Test Center 2015-09-08 Company Introduction

More information

Content Protection and Security Considerations for 5G KILROY HUGHES 2015.08.20

Content Protection and Security Considerations for 5G KILROY HUGHES 2015.08.20 Content Protection and Security Considerations for 5G KILROY HUGHES 2015.08.20 5G Content Protection and Security Topics 1. Is that a computer in your pocket? (or, are you just happy to see me? Mae West)

More information

Intel IT Cloud Extending OpenStack* IaaS with Cloud Foundry* PaaS

Intel IT Cloud Extending OpenStack* IaaS with Cloud Foundry* PaaS Intel IT Cloud Extending OpenStack* IaaS with Cloud Foundry* PaaS Speaker: Catherine Spence, IT Principal Engineer, Cloud Computing Acknowledgements: Aaron Huber, Jon Price November 2014 Legal Notices

More information

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

Cisco Application-Centric Infrastructure (ACI) and Linux Containers

Cisco Application-Centric Infrastructure (ACI) and Linux Containers White Paper Cisco Application-Centric Infrastructure (ACI) and Linux Containers What You Will Learn Linux containers are quickly gaining traction as a new way of building, deploying, and managing applications

More information

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST Future of Cloud Computing Irena Bojanova, Ph.D. UMUC, NIST No Longer On The Horizon Essential Characteristics On-demand Self-Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service

More information

Securing Office 365 with MobileIron

Securing Office 365 with MobileIron Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,

More information

IBM MobileFirst Launch David Lee Heyman

IBM MobileFirst Launch David Lee Heyman IBM MobileFirst Launch David Lee Heyman WW Mobile Business Agility Tiger Team IBM's Mobile Enterprise - A personal journey Watch now: http://youtu.be/0sealyljfag Announcing: IBM MobileFirst 5 2013 IBM

More information

CLOUD NETWORK DEFENSE

CLOUD NETWORK DEFENSE DATASHEET securing the cloud connected world CLOUD NETWORK DEFENSE POWERED BY WEDGEOS Overview - Cloud is the new Edge Mobility, cloud, consumerization of IT and Internet of things have completely redefined

More information

Security Challenges & Opportunities in Software Defined Networks (SDN)

Security Challenges & Opportunities in Software Defined Networks (SDN) Security Challenges & Opportunities in Software Defined Networks (SDN) June 30 th, 2015 SEC2 2015 Premier atelier sur la sécurité dans les Clouds Nizar KHEIR Cyber Security Researcher Orange Labs Products

More information

SourceFireNext-Generation IPS

SourceFireNext-Generation IPS D Ů V Ě Ř U J T E S I L N Ý M SourceFireNext-Generation IPS Petr Salač CCNP Security, CCNP, CICSP, CCSI #33835 petr.salac@alefnula.com Our Customers Biggest Security Challenges Maintaining security posture

More information

Middleware- Driven Mobile Applications

Middleware- Driven Mobile Applications Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary

More information

Traffic Management Solutions for Social Innovation Business

Traffic Management Solutions for Social Innovation Business Traffic Management Solutions for Social Innovation Business Hitachi Review Vol. 63 (2014), No. 1 51 Tatsuya Shimizu Yusuke Shomura, Dr. Eng. Hirofumi Masukawa Yukiko Takeda OVERVIEW: The spread of smartphones

More information

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013

More information

NFV Reference Platform in Telefónica: Bringing Lab Experience to Real Deployments

NFV Reference Platform in Telefónica: Bringing Lab Experience to Real Deployments Solution Brief Telefonica NFV Reference Platform Intel Xeon Processors NFV Reference Platform in Telefónica: Bringing Lab Experience to Real Deployments Summary This paper reviews Telefónica s vision and

More information

Learn how Open Source Software is Redefining SDN!

Learn how Open Source Software is Redefining SDN! Learn how Open Source Software is Redefining SDN! Open SDN Controller Team Vijay Arumugam Kannan, Product Manager Chris Metz, Distinguished Engineer 04/29/2015 Agenda Open Source and OpenDaylight? Cisco

More information

NFV: What Exactly Can Be Virtualized?

NFV: What Exactly Can Be Virtualized? NFV: What Exactly Can Be Virtualized? Jim Hodges d Senior Analyst, Heavy Reading Agenda NFV Drivers ETSI NFV Use Cases Virtualization Criteria Applying the Criteria NFV Challenges Summary 2 NFV Adoption

More information

Emerging Approaches in a Cloud-Connected Enterprise: Containers and Microservices

Emerging Approaches in a Cloud-Connected Enterprise: Containers and Microservices Emerging Approaches in a -Connected Enterprise: Containers and Microservices Anil Karmel Co-Founder and CEO, C2 Labs Co-Chair, NIST Security Working Group akarmel@c2labs.com @anilkarmel Emerging Technologies

More information

Jenkins World Tour 2015 Santa Clara, CA, September 2-3

Jenkins World Tour 2015 Santa Clara, CA, September 2-3 1 Jenkins World Tour 2015 Santa Clara, CA, September 2-3 Continuous Delivery with Container Ecosystem CAD @ Platform Equinix - Overview CAD Current Industry - Opportunities Monolithic to Micro Service

More information

White Paper. Five Steps to Firewall Planning and Design

White Paper. Five Steps to Firewall Planning and Design Five Steps to Firewall Planning and Design 1 Table of Contents Executive Summary... 3 Introduction... 3 Firewall Planning and Design Processes... 3 Step 1. Identify Security Requirements for Your Organization...

More information

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some

More information

Check Point and Security Best Practices. December 2013 Presented by David Rawle

Check Point and Security Best Practices. December 2013 Presented by David Rawle Check Point and Security Best Practices December 2013 Presented by David Rawle Housekeeping o Mobiles on Silent o No File Alarms planned o Fire exits are in front and behind and down the stairs o Downstairs

More information

Extending the Internet of Things to IPv6 with Software Defined Networking

Extending the Internet of Things to IPv6 with Software Defined Networking Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability

More information

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)... CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...

More information

F5 BIG DDoS Umbrella. Configuration Guide

F5 BIG DDoS Umbrella. Configuration Guide F5 BIG DDoS Umbrella Configuration Guide Jeff Stathatos September 2014 Table of Contents F5 BIG DDoS Umbrella... 1 Configuration Guide... 1 1. Introduction... 3 1.1. Purpose... 3 1.2. Limitations... 3

More information

Restorable Logical Topology using Cross-Layer Optimization

Restorable Logical Topology using Cross-Layer Optimization פרויקטים בתקשורת מחשבים - 236340 - סמסטר אביב 2016 Restorable Logical Topology using Cross-Layer Optimization Abstract: Today s communication networks consist of routers and optical switches in a logical

More information

Saisei FlowCommand FLOW COMMAND IN ACTION. No Flow Left Behind. No other networking vendor can make this claim

Saisei FlowCommand FLOW COMMAND IN ACTION. No Flow Left Behind. No other networking vendor can make this claim Saisei FlowCommand The Saisei FlowCommand family of network performance enforcement (NPE) solutions offers a new paradigm for real-time user- and application-policy enforcement and visibility made possible

More information

Qualifying SDN/OpenFlow Enabled Networks

Qualifying SDN/OpenFlow Enabled Networks Qualifying SDN/OpenFlow Enabled Networks Dean Lee Senior Director, Product Management Ixia Santa Clara, CA USA April-May 2014 1 Agenda SDN/NFV a new paradigm shift and challenges Benchmarking SDN enabled

More information

Delivering Pay TV Content throughout the Connected Home Amol Bhagwat

Delivering Pay TV Content throughout the Connected Home Amol Bhagwat Delivering Pay TV Content throughout the Connected Home Amol Bhagwat Vice President & Vice-Chair, DLNA Board of Directors Principal Architect, Video Application Technologies, CableLabs DLNA VidiPath TM

More information

SDN PARTNER INTEGRATION: SANDVINE

SDN PARTNER INTEGRATION: SANDVINE SDN PARTNER INTEGRATION: SANDVINE SDN PARTNERSHIPS SSD STRATEGY & MARKETING SERVICE PROVIDER CHALLENGES TIME TO SERVICE PRODUCT EVOLUTION OVER THE TOP THREAT NETWORK TO CLOUD B/OSS AGILITY Lengthy service

More information

SOFTWARE DEFINED NETWORKING

SOFTWARE DEFINED NETWORKING SOFTWARE DEFINED NETWORKING Bringing Networks to the Cloud Brendan Hayes DIRECTOR, SDN MARKETING AGENDA Market trends and Juniper s SDN strategy Network virtualization evolution Juniper s SDN technology

More information

Do Containers fully 'contain' security issues? A closer look at Docker and Warden. By Farshad Abasi, 2015-09-16

Do Containers fully 'contain' security issues? A closer look at Docker and Warden. By Farshad Abasi, 2015-09-16 Do Containers fully 'contain' security issues? A closer look at Docker and Warden. By Farshad Abasi, 2015-09-16 Overview What are Containers? Containers and The Cloud Containerization vs. H/W Virtualization

More information

Verizon Managed SD WAN with Cisco IWAN. October 28, 2015

Verizon Managed SD WAN with Cisco IWAN. October 28, 2015 Verizon Managed SD WAN with Cisco IWAN. October 28, 2015 Agenda Evolution of the WAN SD WAN delivers business outcomes Verizon s Managed IWAN solution Challenges for SD WAN adoption Deployment guidelines

More information

OF 1.3 Testing and Challenges

OF 1.3 Testing and Challenges OF 1.3 Testing and Challenges May 1 st, 2014 Ash Bhalgat (Senior Director, Products), Luxoft Santa Clara, CA USA April-May 2014 1 Agenda OpenFlow : What and Why? State of OpenFlow Conformance Challenges

More information

The Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow

The Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow Addressing Security And Performance How Your Enterprise is Impacted Today and Tomorrow THE CLOUD: SECURED OR NOT? IN A STUDY BY MICROSOFT, 51 percent of companies who moved to the cloud said that since

More information

White Paper - Huawei Observation to NFV

White Paper - Huawei Observation to NFV White Paper - Huawei Observation to NFV White Paper - Huawei Observation to NFV 1 NFV Overview...2 1.1 Motivation for Network Function Virtualization...2 1.2 NFV Ecosystem Is Being Built Up...3 2 Major

More information

Content Protection in Silverlight. Microsoft Corporation

Content Protection in Silverlight. Microsoft Corporation Content Protection in Silverlight Microsoft Corporation April 2010 Contents Contents...2 Introduction...3 What is Content Protection?... 3 Why Should You Protect Online Content?... 3 Techniques for Protecting

More information

Adaptive HTTP streaming and HTML5. 1 Introduction. 1.1 Netflix background. 1.2 The need for standards. W3C Web and TV Workshop, 8-9 February 2011

Adaptive HTTP streaming and HTML5. 1 Introduction. 1.1 Netflix background. 1.2 The need for standards. W3C Web and TV Workshop, 8-9 February 2011 W3C Web and TV Workshop, 8-9 February 2011 Adaptive HTTP streaming and HTML5 Mark Watson, Netflix Inc. 1 Introduction 1.1 Netflix background Netflix is a leading provider of streaming video services in

More information

Edge Virtualization and the MicroCloud. Benefits and Differences between Private and Public Clouds

Edge Virtualization and the MicroCloud. Benefits and Differences between Private and Public Clouds WHITE PAPER Edge ization and the MicroCloud Benefits and Differences between Private and Public Clouds AUTHOR: JOEL FUTTERMAN IPHOTONIX COO & CTO www.iphotonix.com The benefits of public and private clouds

More information

Adobe Flash Player and Adobe AIR security

Adobe Flash Player and Adobe AIR security Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,

More information

Network Virtualization

Network Virtualization . White Paper Network Services Virtualization What Is Network Virtualization? Business and IT leaders require a more responsive IT infrastructure that can help accelerate business initiatives and remove

More information

VMware ThinApp Application Virtualization Made Simple

VMware ThinApp Application Virtualization Made Simple VMware ThinApp Application Virtualization Made Simple Rob Groenhuis Senior Systems Engineer VMware Netherlands BV 2009 VMware Inc. All rights reserved Agenda VMware s Vision Why Application Virtualization?

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

Securing the private cloud

Securing the private cloud Securing the private cloud Gary Gardiner Security Engineer 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone Top Trends of 2011 1 2 3 4 5 6 7 8 9 Virtualization & Cloud Computing

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

Understanding the Business Case of Network Function Virtualization

Understanding the Business Case of Network Function Virtualization White paper Understanding the Business Case of Network Function Virtualization Part I of the series discusses the telecom market scenario in general, market and business drivers behind push for a building

More information

Cisco Advanced Malware Protection for Endpoints

Cisco Advanced Malware Protection for Endpoints Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection

More information

SDN/Virtualization and Cloud Computing

SDN/Virtualization and Cloud Computing SDN/Virtualization and Cloud Computing Agenda Software Define Network (SDN) Virtualization Cloud Computing Software Defined Network (SDN) What is SDN? Traditional Network and Limitations Traditional Computer

More information

An Introduction to Cloud Computing Concepts

An Introduction to Cloud Computing Concepts Software Engineering Competence Center TUTORIAL An Introduction to Cloud Computing Concepts Practical Steps for Using Amazon EC2 IaaS Technology Ahmed Mohamed Gamaleldin Senior R&D Engineer-SECC ahmed.gamal.eldin@itida.gov.eg

More information

ActiveVideo CloudTV GuideCast: Delivering User Interfaces from the Cloud

ActiveVideo CloudTV GuideCast: Delivering User Interfaces from the Cloud ActiveVideo CloudTV GuideCast: Delivering User Interfaces from the Cloud With the rise of modern smartphones and tablets, consumers can search for, browse, and view video content through slick, web-based

More information

TOP TEN CONSIDERATIONS

TOP TEN CONSIDERATIONS White Paper TOP TEN CONSIDERATIONS FOR CHOOSING A SERVER VIRTUALIZATION TECHNOLOGY Learn more at www.swsoft.com/virtuozzo Published: July 2006 Revised: July 2006 Table of Contents Introduction... 3 Technology

More information

Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University

Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University Transition to NFV Cost of deploying network functions: Operating expense

More information

SDP Hackathon #4 Analysis & Report

SDP Hackathon #4 Analysis & Report SDP Hackathon #4 Analysis & Report High Availability Public Cloud Research March 28, 2016 Research Participants The Software-Defined Perimeter (SDP) Research Workgroup of the Cloud Security Alliance (CSA)

More information

Software Defined Environments

Software Defined Environments November 2015 Software Defined Environments 2015 Cloud Lecture, University of Stuttgart Jochen Breh, Director Architecture & Consulting Cognizant Global Technology Office Agenda Introduction New Requirements

More information

Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems

Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Brian McCarson Sr. Principal Engineer & Sr. System Architect, Internet of Things Group, Intel Corp Mac Devine

More information

Cloud Computing Concept, Technology & Architecture

Cloud Computing Concept, Technology & Architecture Cloud Computing Concept, Technology & Architecture Chapter 07 Cloud Computing Mechanisms 課 程 名 稱 : 雲 端 管 理 系 統 授 課 教 師 : 高 勝 助 Contents Technology mechanisms foundational to cloud platforms are covered,

More information

Finding Network Security Breaches Using LiveAction Software to detect and analyze security issues in your network

Finding Network Security Breaches Using LiveAction Software to detect and analyze security issues in your network LiveAction Application Note Finding Network Security Breaches Using LiveAction Software to detect and analyze security issues in your network September 2012 http://www.liveaction.com Table of Contents

More information

Network Functions Virtualization in Home Networks

Network Functions Virtualization in Home Networks Network Functions Virtualization in Home Networks Marion Dillon Timothy Winters Abstract The current model of home networking includes relatively low- cost, failure- prone devices, requiring frequent intervention

More information

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest

More information

Analyzing HTTP/HTTPS Traffic Logs

Analyzing HTTP/HTTPS Traffic Logs Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that

More information

Zentera Cloud Federation Network for Hybrid Computing

Zentera Cloud Federation Network for Hybrid Computing Zentera Cloud Federation Network for Hybrid Computing The New Era of Hybrid Computing Cloud computing technology, the next computing paradigm after client-server, will shift enterprise IT to a new era

More information

Security 2012: A Handbook for Cyber Security

Security 2012: A Handbook for Cyber Security Security 2012: A Handbook for Cyber Security Amichai Shulman, CTO Robert Rachwald, Director of Security Strategy IMPERVA Session ID: SECT-204 Session Classification: General Interest Agenda Trend selection

More information

Video Collaboration & Application Sharing Product Overview

Video Collaboration & Application Sharing Product Overview . Video Collaboration & Application Sharing Product Overview Overview NPL s Collaborative Real-Time Information Sharing Platform (CRISP ) combines high quality video collaboration, remote application sharing

More information

Driving SDN Adoption in Service Provider Networks

Driving SDN Adoption in Service Provider Networks WHITEPAPER Software Defined Networking (SDN) Driving SDN Adoption in Service Provider Networks This whitepaper provides an overview of key requirements and enablers for driving SDN adoption in Service

More information

Lecture 26 Enterprise Internet Computing 1. Enterprise computing 2. Enterprise Internet computing 3. Natures of enterprise computing 4.

Lecture 26 Enterprise Internet Computing 1. Enterprise computing 2. Enterprise Internet computing 3. Natures of enterprise computing 4. Lecture 26 Enterprise Internet Computing 1. Enterprise computing 2. Enterprise Internet computing 3. Natures of enterprise computing 4. Platforms High end solutions Microsoft.Net Java technology 1 Enterprise

More information