Security for all: network-based protection for personal devices

Size: px
Start display at page:

Download "Security for all: network-based protection for personal devices"

Transcription

1 Security for all: network-based protection for personal devices Antonio Lioy Politecnico di Torino < polito.it > Cybersecurity & Privacy Innovation Forum 2015 Brussels, 28/4/2015

2 Why SECURity at the network EDge users deal with many "terminals" (laptop, desktop, tablet, smartphone, Internet-connected TV, car infosystem, with very different security levels complex management of security controls for so many platforms with so different characteristics withdifferent network connection can't consistently rely on network border protection with different policy requirements mobile devices at home vs BYOD at work SECURED = offload security controls from the user terminals to a trusted and secure network node Project SECURED ( 2

3 From heterogeneous to uniform security security applications independent from user terminals security protection independent from user location Project SECURED ( 3

4 Use cases home home gateway, protection of family (and visitors') devices enterprise wired/wireless access, protection of hosts (including servers?) public hotspot WiFi access, protection of visitors mobile 3G/4G access, protection of subscriber's device IoT wireless access point, protection of IoT node NOTE: first hop not "SECURED"? then create a secure connection to a SECURED-node somewhere in the network Project SECURED ( 4

5 The SECURED components NED (Network Edge Device) trusted node (with TC techniques) provides a Trusted Virtual Domain per user e.g. home gateway, corporate router, wireless AP, GGSN Personal Security Applications (PSA) executed at the NED specific tasks (packet filter, parental control, anti-phishing, content inspection, ) chained according to security policies security policies simplify configuration of PSAs and share "best practice" flexibility (users care about policy, not implementation) Project SECURED ( 5

6 The SECURED framework architecture 2. authenticate 1. trust authn 3. get apps application repository 4. get policies policy repository user terminal NED 5. protect! personal execution environment Project SECURED ( 6

7 The SECURED trust fabric NED (Network Edge Device user terminal policy app(s) secure & trusted channel TPM measures verifier Project SECURED ( 7

8 The NED components PSCM NED front-end, performs attestation, authn, policy analysis TVD Manager manages the network topology of a NED configures the infrastructure controls TVD lifecycle Personal Security Controller (PSC) stores the user service graph (PSAs and interconnections) determines the TVD topology from PSA and policy requirements monitors the status of the TVD Project SECURED ( 8

9 The NED components at play Project SECURED ( 9

10 Multilayered security policies the same connection may be subject to constraints from different tenants (depending on the network environment) policies are applied in a hierarchical way (according to the user and connection profiles) user is informed of the overall policy applied to her connection (and may refuse connecting to the network) government government ISP parent user (child) ISP corporation department user (employee) Project SECURED ( 10

11 Expressing security policies HSPL ~ high-level security policies for expressing the general end-user security requirements Alice is not authorized to access Internet traffic (type of content,{illegal websites}) Bob wants scanning (purpose,{malware}) MSPL ~ security capabilities to express configuration requests in an applicationindependent format based on capabilities (atomic features of a security function) capabilities grouped into categories, following an ontology each PSA declares the categories it provides automatic translation from HSPL to MSPL (and then to PSA) Project SECURED ( 11

12 Monolithic vs split NED end-user device end-user device network SEC edge device (SECURED) network edge device (SECURED) SEC computing device (SECURED) network network Project SECURED ( 12

13 Cloud / SDN / NFV for SECURED cloud controller 1. attestation 2. config( α ) network-hosted capabilities NFV! NED PSC PSA 1 PSA 2 PSA 3 α / 1 α / 2 α / 3 ext Mr. α custom network paths SDN! Project SECURED ( 13

14 The SECURED FP7 project FP7 call 10 Collaborative Project (FP7-ICT ) grant agreement no duration: 3 years (1/10/ /9/2016) EC contribution: 2.7 M Euro web: fp7.eu mail: coordinator@secured fp7.eu Project SECURED ( 14

15 The Consortium (I) Politecnico di Torino Italy coordinator = Prof. Antonio Lioy ( lioy@polito.it ) networking, trusted computing, security policies HP Laboratory Bristol United Kingdom networking, trusted computing Primetel PLC Cyprus telco, network and content provider (regional) Telefonica Investigacion y Desarrollo Spain telco and network provider (worldwide) Project SECURED ( 15

16 The Consortium (II) United Nations Interregional Crime and Justice Research Institute Italy social and policy aspects of security Universitat Politecnica de Catalunya Spain networking, mobility (Barcelona Supercomputing Center Spain) computational architectures VTT Technical Research Centre of Finland cybersecurity Project SECURED ( 16

17 THANK YOU! Project SECURED (

18 Disclaimer EU disclaimer SECURED (project no ) is co-funded by the European Union (EU) via the European Commission (EC), under the Information and Communication Technologies (ICT) theme of the 7th Framework Programme for R&D (FP7). This document does not represent the opinion of the EC and the EC is not responsible for any use that might be made of its content. SECURED disclaimer The information in this document is provided "as is", and no guarantee or warranty is given that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability. Project SECURED ( 18

Bootstrapping "softwarised" infrastructure trust: from SDN towards NFV

Bootstrapping softwarised infrastructure trust: from SDN towards NFV Bootstrapping "softwarised" infrastructure trust: from towards NFV Ludovic Jacquin Hewlett-Packard Laboratories < ludovic.jacquin@hp.com > Cybersecurity & Privacy Innovation Forum 2015 Brussels, 28/4/2015

More information

Offloading Security Applications into the Network

Offloading Security Applications into the Network echallenges e-2014 Conference Proceedings Paul Cunningham and Miriam Cunningham (Eds) IIMC International Information Management Corporation, 2014 ISBN: 978-1-905824-45-8 Offloading Security Applications

More information

SERIES A : GUIDANCE DOCUMENTS. Document Nr 3

SERIES A : GUIDANCE DOCUMENTS. Document Nr 3 DATRET/EXPGRP (2009) 3 - FINAL EXPERTS GROUP "THE PLATFORM FOR ELECTRONIC DATA RETENTION FOR THE INVESTIGATION, DETECTION AND PROSECUTION OF SERIOUS CRIME" ESTABLISHED BY COMMISSION DECISION 2008/324/EC

More information

In-Network Programmability for Next-Generation personal Cloud service support: The INPUT project

In-Network Programmability for Next-Generation personal Cloud service support: The INPUT project In-Network Programmability for Next-Generation personal Cloud service support: The INPUT project Constantinos Vassilakis, PhD Athens, 2/10/2015 Motivation Trend Move functionality and services to the cloud

More information

Movilidad 3.0: Más allá de BYOD. Pilar Santamaria. Directora de Desarrollo Negocio BN y Ciberseguridad, Región Sur de Europa

Movilidad 3.0: Más allá de BYOD. Pilar Santamaria. Directora de Desarrollo Negocio BN y Ciberseguridad, Región Sur de Europa Movilidad 3.0: Más allá de BYOD Pilar Santamaria Directora de Desarrollo Negocio BN y Ciberseguridad, Región Sur de Europa Tendencias: Movilidad y Web 3.0 Más allá de BYOD IPV6 y la Arquitectura Borderless

More information

Network Softwarisation An Open Development Ecosystem. Telefónica I+D @ Global CTO 26-03-2015

Network Softwarisation An Open Development Ecosystem. Telefónica I+D @ Global CTO 26-03-2015 Network Softwarisation An Open Development Ecosystem Telefónica I+D @ Global CTO 26-03-2015 We are evolving towards a Hyper Connected and Intelligent Digital World* The explosion of digital services makes

More information

T-NOVA: Network Functions As-a-Service Over Virtualized Infrastructures. George Xilouris T-NOVA Technical Coordinator

T-NOVA: Network Functions As-a-Service Over Virtualized Infrastructures. George Xilouris T-NOVA Technical Coordinator T-NOVA: Network Functions As-a-Service Over Virtualized Infrastructures George Xilouris T-NOVA Technical Coordinator T-NOVA Facts ICT Call 11 (FP7-ICT-2013-11) Objective ICT-2013.1.1.: Future Networks

More information

Network Virtualization and SDN/OpenFlow for Optical Networks - EU Project OFELIA. Achim Autenrieth, Jörg-Peter Elbers ADVA Optical Networking SE

Network Virtualization and SDN/OpenFlow for Optical Networks - EU Project OFELIA. Achim Autenrieth, Jörg-Peter Elbers ADVA Optical Networking SE Network Virtualization and SDN/OpenFlow for Optical Networks - EU Project OFELIA Achim Autenrieth, Jörg-Peter Elbers ADVA Optical Networking SE Networked Systems (NetSys) 2013 Stuttgart, 14.03.2013 Outline

More information

An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks An Oracle White Paper December 2013 The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks Introduction Today s mobile networks are no longer limited to voice calls. With

More information

Virtualization techniques for network functions. Fabrice Guillemin, Orange Labs, OLN/CNC/NCA September 14, 2015

Virtualization techniques for network functions. Fabrice Guillemin, Orange Labs, OLN/CNC/NCA September 14, 2015 Virtualization techniques for network functions Fabrice Guillemin, Orange Labs, OLN/CNC/NCA September 14, 2015 Introduction Network functions are today hosted by dedicated hardware, typically high performance

More information

Control Plane architectures for Photonic Packet/Circuit Switching-based Large Scale Data Centres

Control Plane architectures for Photonic Packet/Circuit Switching-based Large Scale Data Centres Control Plane architectures for Photonic Packet/Circuit Switching-based Large Scale Data Centres Salvatore Spadaro Optical Communications group Universitat Politècnica de Catalunya (UPC) Barcelona, Spain

More information

Crowdsourcing mobile networks from experiment

Crowdsourcing mobile networks from experiment Crowdsourcing mobile networks from the experiment Katia Jaffrès-Runser University of Toulouse, INPT-ENSEEIHT, IRIT lab, IRT Team Ecole des sciences avancées de Luchon Networks and Data Mining, Session

More information

Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO

Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO Taking Charge with Apps, Policy, Security and More October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO How You Can Achieve BYOD without Compromise Mike Nielsen Senior Director, Security Solutions

More information

Software Defined Optical Networks with Optical OpenFlow. Jörg-Peter Elbers, Achim Autenrieth ADVAnced Technology August 2012 Rev 1.

Software Defined Optical Networks with Optical OpenFlow. Jörg-Peter Elbers, Achim Autenrieth ADVAnced Technology August 2012 Rev 1. Software Defined Optical Networks with Optical OpenFlow Jörg-Peter Elbers, Achim Autenrieth ADVAnced Technology August 2012 Rev 1.0 Outline Software Defined Networks & OpenFlow Optical Domain Extensions

More information

SDN, a New Definition of Next-Generation Campus Network

SDN, a New Definition of Next-Generation Campus Network SDN, a New Definition of Next-Generation Campus Network Contents Campus Evolution and Development Trends... 1 Three Changes to Drive the Campus Network Development... 2 Fundamental Changes in User Behaviors...2

More information

CARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION?

CARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION? CARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION? Andreas Gladisch, Fritz-Joachim Westphal Deutsche Telekom Innovation Labs COMPLEXITY BY DOZENS OF SPECIALIZED BOXES AND THOUSANDS OF PROTOCOLS.

More information

Delivering Managed Services Using Next Generation Branch Architectures

Delivering Managed Services Using Next Generation Branch Architectures Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN

More information

APRICOT-APAN 2011, Hong Kong IPv6 Transition Conference 22 February 2011. C. K. Ng

APRICOT-APAN 2011, Hong Kong IPv6 Transition Conference 22 February 2011. C. K. Ng APRICOT-APAN 2011, Hong Kong IPv6 Transition Conference 22 February 2011 The Government of the Hong Kong Special Administrative Region C. K. Ng Programme Manager, Government Office of the Government Chief

More information

ICT Infrastructure & Network Management

ICT Infrastructure & Network Management Context ICT Infrastructure & Network Management Postgraduate Degree Programme Hogeschool-Universiteit Brussel 2014-2015 The HUB University College offers a wide range of postgraduate and other courses

More information

Policy-based Audit of Security Configuration. April 24-25, Berlin Serena Ponta, Henrik Plate (SAP)

Policy-based Audit of Security Configuration. April 24-25, Berlin Serena Ponta, Henrik Plate (SAP) Policy-based Audit of Security Configuration Cyber Security & Privacy EU Forum 2012 Cyber Security & Privacy EU Forum 2012 April 24-25, Berlin Serena Ponta, Henrik Plate (SAP) Audit objective Gain assurance

More information

Virtualization, SDN and NFV

Virtualization, SDN and NFV Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,

More information

Components. Key features

Components. Key features BlackBerry Enterprise Service 10 What is it? BlackBerry Enterprise Service 10 helps you manage BlackBerry smartphones and BlackBerry PlayBook tablets, as well as ios devices and Android devices, all from

More information

Cloudified IP Multimedia Subsystem (IMS) for Network Function Virtualization (NFV)-based architectures

Cloudified IP Multimedia Subsystem (IMS) for Network Function Virtualization (NFV)-based architectures 4th Workshop on Mobile Cloud Networking, June 19th, 2014, Lisbon, Portugal Cloudified IP Multimedia Subsystem (IMS) for Network Function Virtualization (NFV)-based architectures Giuseppe Carella, Marius

More information

Application Defined E2E Security for Network Slices. Linda Dunbar (Linda.Dunbar@huawei.com) Diego Lopez (diego.r.lopez@telefonica.

Application Defined E2E Security for Network Slices. Linda Dunbar (Linda.Dunbar@huawei.com) Diego Lopez (diego.r.lopez@telefonica. Application Defined E2E Security for Network Slices Linda Dunbar (Linda.Dunbar@huawei.com) Diego Lopez (diego.r.lopez@telefonica.com ) Into the Inter-connected World Internet Mobile Internet Internet of

More information

NFV: What Exactly Can Be Virtualized?

NFV: What Exactly Can Be Virtualized? NFV: What Exactly Can Be Virtualized? Jim Hodges d Senior Analyst, Heavy Reading Agenda NFV Drivers ETSI NFV Use Cases Virtualization Criteria Applying the Criteria NFV Challenges Summary 2 NFV Adoption

More information

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification

More information

Conference. Smart Future Networks THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF EVERYTHING

Conference. Smart Future Networks THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF EVERYTHING Conference THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF Smart Future Networks www.internet-of-things.no EVERYTHING Patrick Waldemar Vice President Telenor Research and Future

More information

The Role of Virtual Routers In Carrier Networks

The Role of Virtual Routers In Carrier Networks The Role of Virtual Routers In Carrier Networks Sterling d Perrin Senior Analyst, Heavy Reading Agenda Definitions of SDN and NFV Benefits of SDN and NFV Challenges and Inhibitors Some Use Cases Some Industry

More information

Networks for Cloud Computing. Paul Murray, Senior Researcher Cloud and Security Lab HP Labs, Bristol 6/9/2011

Networks for Cloud Computing. Paul Murray, Senior Researcher Cloud and Security Lab HP Labs, Bristol 6/9/2011 Networks for Cloud Computing Paul Murray, Senior Researcher Cloud and Security Lab HP Labs, Bristol 6/9/2011 Data Centre Networks for Cloud Computing Multi-tenancy and Security Host multiple customers

More information

Does SDN accelerate network innovations? Example of Flexible Service Creation

Does SDN accelerate network innovations? Example of Flexible Service Creation Does SDN accelerate network innovations? Example of Flexible Service Creation Andreas Gladisch VP Convergent Networks and Infrastructure, Telekom Innovation Labs 24.10.2012 Do you know what this is? Zuse

More information

VNF & Performance: A practical approach

VNF & Performance: A practical approach VNF & Performance: A practical approach Luc Provoost Engineering Manager, Network Product Group Intel Corporation SDN and NFV are Forces of Change One Application Per System Many Applications Per Virtual

More information

How Network Operators Do Prepare for the Rise of the Machines

How Network Operators Do Prepare for the Rise of the Machines Internet of Things and the Impact on Transport Networks How Network Operators Do Prepare for the Rise of the Machines Telecommunication networks today were never designed having Inter of Things use cases

More information

Dynamic Service Chaining for NFV/SDN

Dynamic Service Chaining for NFV/SDN Dynamic Service Chaining for NFV/SDN Kishore Inampudi A10 Networks, Inc. Agenda Introduction NFV Reference Architecture NFV Use cases Policy Enforcement in NFV/SDN Challenges in NFV environments Policy

More information

HP FlexNetwork Architecture

HP FlexNetwork Architecture HP Networking HP Networking 1 HP FlexNetwork Architecture FlexFabric Flex Campus FlexBranch FlexManagement Converges Network Management and Orchestration Open Scalable Secure Agile Consistent 2 Innovative

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

BRING YOUR OWN DEVICE

BRING YOUR OWN DEVICE BRING YOUR OWN DEVICE Legal Analysis & Practical TIPs for an effective BYOD corporate Policy CONTENTS 1. What is BYOD? 2. Benefits and risks of BYOD in Europe 3. BYOD and existing Policies 4. Legal issues

More information

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES FIREWALL Features SECURITY OF INFORMATION TECHNOLOGIES To ensure that they stay competitive and in order to expand their activity, businesses today know it is in their best interests to open up more channels

More information

SDN PARTNER INTEGRATION: SANDVINE

SDN PARTNER INTEGRATION: SANDVINE SDN PARTNER INTEGRATION: SANDVINE SDN PARTNERSHIPS SSD STRATEGY & MARKETING SERVICE PROVIDER CHALLENGES TIME TO SERVICE PRODUCT EVOLUTION OVER THE TOP THREAT NETWORK TO CLOUD B/OSS AGILITY Lengthy service

More information

Cloud Federations in Contrail

Cloud Federations in Contrail Cloud Federations in Contrail Emanuele Carlini 1,3, Massimo Coppola 1, Patrizio Dazzi 1, Laura Ricci 1,2, GiacomoRighetti 1,2 " 1 - CNR - ISTI, Pisa, Italy" 2 - University of Pisa, C.S. Dept" 3 - IMT Lucca,

More information

NFV and SDN Answer or Question?

NFV and SDN Answer or Question? NFV and SDN Answer or Question? Barry Graham Senior Program Director - Agile 2015 TM Forum 1 TM Forum: A Brief Introduction TM Forum is a non-profit global industry association which brings together the

More information

Internet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis

Internet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis Internet of Everything Cisco product managers Vytautas Zulonas Tomas Kirvelaitis Content Internet of Everything application Internet of Everything challenges Cisco solutions Convergence of Mobile, Social,

More information

Building Blocks Towards a Trustworthy NFV Infrastructure

Building Blocks Towards a Trustworthy NFV Infrastructure Building Blocks Towards a Trustworthy NFV Infrastructure IRTF NFVRG Adrian L. Shaw Hewlett-Packard Laboratories / July 22 nd, 2015 1 Why security and trust? Big requirement for critical

More information

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

ARCHITECT S GUIDE: Mobile Security Using TNC Technology ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 admin@trustedcomputinggroup.org www.trustedcomputinggroup.org

More information

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples

More information

SECURALIVE WEB SECURITY GATEWAY

SECURALIVE WEB SECURITY GATEWAY SECURALIVE WEB SECURITY GATEWAY allows you to filter users DNS queries using filtering categories and black and white lists of forbidden hosts. On access to a particular site being denied through DNS filtering,

More information

ICT budget and staffing trends in Healthcare

ICT budget and staffing trends in Healthcare ICT budget and staffing trends in Healthcare Enterprise ICT investment plans November 2013 ICT budget and staffing trends in Healthcare P a g e 1 www.kable.co.uk / The id Factor Ltd / + 44 (0) 207 936

More information

Cisco ACI and F5 LTM Integration for accelerated application deployments. Dennis de Leest Sr. Systems Engineer F5

Cisco ACI and F5 LTM Integration for accelerated application deployments. Dennis de Leest Sr. Systems Engineer F5 Cisco ACI and F5 LTM Integration for accelerated application deployments Dennis de Leest Sr. Systems Engineer F5 Agenda F5 Networks Who are we and what is Big-IP? F5 Synthesis Software Defined Application

More information

Secure Cloud and Remote Service Connections for AllJoyn Applications

Secure Cloud and Remote Service Connections for AllJoyn Applications Secure Cloud and Remote Service Connections for AllJoyn Applications Art Lancaster CTO, Affinegy Chair, Gateway Agent Working Group 12 November 2014 AllSeen Alliance 1 Agenda 1. Gateway Agent Working Group

More information

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview

More information

Integrating an Identity-Based Control Plane with the HIMALIS Network Architecture

Integrating an Identity-Based Control Plane with the HIMALIS Network Architecture Integrating an Identity-Based Control Plane with the HIMALIS Network Architecture Pedro Martinez-Julia 1, Ved P. Kafle 2, Antonio F. Skarmeta 1 pedromj@um.es, kafle@nict.go.jp, skarmeta@um.es 1 Department

More information

The Evolution of Internet Exchange: TOP-IX Public and Private Broadband Infrastructure in Piedmont, Italy

The Evolution of Internet Exchange: TOP-IX Public and Private Broadband Infrastructure in Piedmont, Italy The Evolution of Internet Exchange: TOP-IX Public and Private Broadband Infrastructure in Piedmont, Italy EU Policy Objectives Broadband Infrastructure: 100% BB coverage & NGN deployment. Network neutrality

More information

Software-Defined Networking for the Data Center. Dr. Peer Hasselmeyer NEC Laboratories Europe

Software-Defined Networking for the Data Center. Dr. Peer Hasselmeyer NEC Laboratories Europe Software-Defined Networking for the Data Center Dr. Peer Hasselmeyer NEC Laboratories Europe NW Technology Can t Cope with Current Needs We still use old technology... but we just pimp it To make it suitable

More information

Software Defined Networks

Software Defined Networks Software Defined Networks Dr. Uttam Ghosh, CDAC, Bangalore uttamg@cdac.in Outline Networking Planes OpenFlow Software Defined Network (SDN) SDN Origin What is SDN? SDN Architecture SDN Operation Why We

More information

Deliverable D7.1. Project Website and Project Presentation

Deliverable D7.1. Project Website and Project Presentation Enriched Network aware Video Services over Internet Overlay Networks www.envision project.org Deliverable D7.1 Project Website and Project Presentation Public report, Final Version, 29 January 2010 Authors

More information

Panel: Cloud/SDN/NFV 黃 仁 竑 教 授 國 立 中 正 大 學 資 工 系 2015/12/26

Panel: Cloud/SDN/NFV 黃 仁 竑 教 授 國 立 中 正 大 學 資 工 系 2015/12/26 Panel: Cloud/SDN/NFV 黃 仁 竑 教 授 國 立 中 正 大 學 資 工 系 2015/12/26 1 Outline Cloud data center (CDC) Software Defined Network (SDN) Network Function Virtualization (NFV) Conclusion 2 Cloud Computing Cloud computing

More information

move move us Newsletter 2014 Content MoveUs has successfully finished the first year of the project!

move move us Newsletter 2014 Content MoveUs has successfully finished the first year of the project! move us ICT CLOUD-BASED PLATFORM AND MOBILITY SERVICES : AVAILABLE, UNIVERSAL AND SAFE FOR ALL USERS MoveUs has successfully finished the first year of the project! Newsletter 2014 Welcome to MoveUs newsletter.

More information

Secure Cloud and Remote Service Connections for AllJoyn Applications

Secure Cloud and Remote Service Connections for AllJoyn Applications Secure Cloud and Remote Service Connections for AllJoyn Applications Art Lancaster CTO, Affinegy Chair, Gateway Agent Working Group 5 February 2015 AllSeen Alliance 1 Agenda 1. Gateway Agent Working Group

More information

SDN: A NEW PARADIGM. Kireeti Kompella CTO, JDI

SDN: A NEW PARADIGM. Kireeti Kompella CTO, JDI SDN: A NEW PARADIGM Kireeti Kompella CTO, JDI AGENDA What is SDN? Definition and goals of SDN Analogy with Compute Virtualization Orchestration for Agile Provisioning Unified SDN What parts of the network

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

W H I T E P A P E R N e x t - G e n e r a t i o n N e t w o r k i n g f o r t h e S m a r t E n t e r p r i s e C a m p u s

W H I T E P A P E R N e x t - G e n e r a t i o n N e t w o r k i n g f o r t h e S m a r t E n t e r p r i s e C a m p u s Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R N e x t - G e n e r a t i o n N e t w o r k i n g f o r t h e S m a r t E n t

More information

Network Functions as-a-service over Virtualised Infrastructures T-NOVA. Presenter: Dr. Mamadu Sidibe

Network Functions as-a-service over Virtualised Infrastructures T-NOVA. Presenter: Dr. Mamadu Sidibe Network Functions as-a-service over Virtualised Infrastructures T-NOVA Presenter: Dr. Mamadu Sidibe Presentation Outline Brief introduction to NFV T-NOVA Facts T-NOVA Consortium T-NOVA Vision T-NOVA objectives

More information

IT Strategy 2013 2017

IT Strategy 2013 2017 IT Strategy 2013 2017 V3.2 August 2013 Contents Part I Context Drivers Workplace Strategy Benefits of the Strategy Contents Part II Business Strategy Strategic Themes: Strong Line of Business Applications

More information

Edge Gateway and virtualization for IoT connectivity

Edge Gateway and virtualization for IoT connectivity Edge Gateway and virtualization for IoT connectivity Jukka Mäkelä, Mikko Valta, Pekka Karhula, Helena Rivas VTT Technical Research Centre of Finland More information contact: jukka.makela@vtt.fi Scenario

More information

What is SDN all about?

What is SDN all about? What is SDN all about? Emil Gągała Juniper Networks Piotr Jabłoński Cisco Systems In the beginning there was a chaos CLOUD BUILDING BLOCKS CAN I VIRTUALIZE MY Compute Network? Storage Where is my money?

More information

Use cases and Gap Analysis Hares (editor) draft-hares-i2nsf-use-gap-analysis- 00.txt Sue Hares

Use cases and Gap Analysis Hares (editor) draft-hares-i2nsf-use-gap-analysis- 00.txt Sue Hares Use cases and Gap Analysis Hares (editor) draft-hares-i2nsf-use-gap-analysis- 00.txt Sue Hares Use Cases and Requirements for an Interface to Network Security Functions (draft-pastor-i2nsf-merged-use-cases-00)

More information

Introducing the Forum s New Vision for Broadband

Introducing the Forum s New Vision for Broadband Introducing the Forum s New Vision for Broadband 1 1 Introduction What do we want? Broadband evolution Broadband 20/20 Top 5 use cases and their impact New BBF Work Areas/projects Participation in Broadband

More information

BYOD: End-to-End Security

BYOD: End-to-End Security BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com

More information

BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS

BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS Damian Bach AirWatch Session ID: SPO-T038 Session Classification: Intermediate Current & Future Mobile Landscape Number of mobile

More information

Enabling European E-commerce

Enabling European E-commerce Enabling European E-commerce Across Europe e-commerce is being fuelled by widescale availability of computing hardware, low cost broadband and advances in smartphone technology. As well as transforming

More information

State of the States: IT Trends, Priorities and Issues

State of the States: IT Trends, Priorities and Issues State of the States: IT Trends, Priorities and Issues OSC Financial Conference 2012 Doug Robinson, Executive Director National Association of State Chief Information Officers Fiscal recovery: budgets are

More information

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 On the features and challenges of security and privacy in distributed internet of things C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 Outline Introduction IoT (Internet of Things) A distributed IoT

More information

M2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom.

M2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom. M2M Communications and Internet of Things for Smart Cities Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom.fr WHAT IS EURECOM A graduate school & research centre in communication

More information

Why ISPs need SDN: SDN-based Network Service Chaining and Software-defined Multicast

Why ISPs need SDN: SDN-based Network Service Chaining and Software-defined Multicast Why ISPs need SDN: SDN-based Network Chaining and Software-defined Multicast ZKI Herbsttagung, Kaiserslautern, Germany, 24. Sept. 2014 Jeremias Blendin, Julius Rückert, David Hausheer Department of Electrical

More information

Virtualization techniques for redesigning mobile backhaul networks: challenges and issues. Fabrice Guillemin Orange Labs, IMT/IMT/OLN/CNC/NCA

Virtualization techniques for redesigning mobile backhaul networks: challenges and issues. Fabrice Guillemin Orange Labs, IMT/IMT/OLN/CNC/NCA Virtualization techniques for redesigning mobile backhaul networks: challenges and issues Fabrice Guillemin Orange Labs, IMT/IMT/OLN/CNC/NCA MobiArch 2015 September 7, 2015 Outline 1 2 3 Introduction Convergent

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information

THE ON-DEMAND DATA CENTER NETWORK TRANSFORMATION IN A CHANGING INDUSTRY. Ken Cheng, CTO, Brocade October, 2013

THE ON-DEMAND DATA CENTER NETWORK TRANSFORMATION IN A CHANGING INDUSTRY. Ken Cheng, CTO, Brocade October, 2013 THE ON-DEMAND DATA CENTER NETWORK TRANSFORMATION IN A CHANGING INDUSTRY Ken Cheng, CTO, Brocade October, 2013 Fundamentally we ve had to redesign and challenge the way we ve run distributed infrastructure

More information

Powering the Internet of Things: SDN/NFV Architectures

Powering the Internet of Things: SDN/NFV Architectures Powering the Internet of Things: SDN/NFV Architectures 6B Connected Devices 2013 2013 2016 2018 2020 50B Connected Devices Worldwide by 2020 Implications for Service Providers Scaling the Networks End

More information

Wireless Software Defined Networks Ayaka Koshibe, Akash Baid and Ivan Seskar

Wireless Software Defined Networks Ayaka Koshibe, Akash Baid and Ivan Seskar Wireless Software Defined Networks Ayaka Koshibe, Akash Baid and Ivan Seskar Rutgers University 2014 Fall IAB December 12 th, 2014 Need for Inter-network Cooperation Interaction between managed wireless

More information

Isaku Yamahata isaku.yamahata@intel.com CloudOpen Japan May 22, 2014

Isaku Yamahata isaku.yamahata@intel.com CloudOpen Japan May 22, 2014 OpenStack approach to SDN by way of NFV Advanced Network Service Framework Isaku Yamahata isaku.yamahata@intel.com CloudOpen Japan May 22, 2014 Legal Disclaimers Copyright 2014 Intel Corporation. All rights

More information

SDN for Wi-Fi OpenFlow-enabling the wireless LAN can bring new levels of agility

SDN for Wi-Fi OpenFlow-enabling the wireless LAN can bring new levels of agility WHITEPAPER SDN for Wi-Fi OpenFlow-enabling the wireless LAN can bring new levels of agility Copyright 2014 Meru Networks, Inc. All rights reserved. Table of Contents Executive summary... 3 Introduction...

More information

INDEPENDENT TECHNOLOGY SPECIALISTS IN EDUCATION

INDEPENDENT TECHNOLOGY SPECIALISTS IN EDUCATION INDEPENDENT TECHNOLOGY SPECIALISTS IN EDUCATION CONSIDERATIONS FOR DEVELOPING AND DEPLOYING A MOBILE LEARNING STRATEGY Many schools we are working with are looking to extend their use of tablet technology,

More information

Creating The World s First Open Programmable City @bristolisopen. Dimitra Simeonidou & Anna Tzanakaki

Creating The World s First Open Programmable City @bristolisopen. Dimitra Simeonidou & Anna Tzanakaki Creating The World s First Open Programmable City @bristolisopen Dimitra Simeonidou & Anna Tzanakaki Bristol: Liveable, Sustainable & Resilient City A vibrant ecosystem largest digital cluster in UK outside

More information

Security in Software Defined Networking. Professor : Admela Jukan Supervisor : Marcel Caria Student : Siqian Zhao

Security in Software Defined Networking. Professor : Admela Jukan Supervisor : Marcel Caria Student : Siqian Zhao Security in Software Defined Networking Professor : Admela Jukan Supervisor : Marcel Caria Student : Siqian Zhao Overview Software Defined Networking (SDN) Legacy Networking VS. SDN advantages of SDN the

More information

Emerging Trends in the Network Security Market in India, CY 2013

Emerging Trends in the Network Security Market in India, CY 2013 Emerging Trends in the Network Security Market in India, CY 2013 Advanced Threat Landscape will Give Rise to Increased Network Security Spending 9AC3-74 July 2014 Contents Section Slide Numbers Executive

More information

Beyond brokering: Proactive Role of Cloud Federations in Resource Management

Beyond brokering: Proactive Role of Cloud Federations in Resource Management Beyond brokering: Proactive Role of Cloud Federations in Resource Management Massimo Coppola (CNR-ISTI)! contrail is co-funded by the EC 7th Framework Programme under Grant greement nr. 257438 http://contrail-project.eu

More information

Networking Systems (10102)

Networking Systems (10102) Networking Systems (10102) Rationale Statement: The goal of this course is to help students understand and participate in the significant impact of computer networking in their lives. Virtually any career

More information

Internet of Things Value Proposition for Europe

Internet of Things Value Proposition for Europe Internet of Things Value Proposition for Europe European Commission - DG CONNECT Dr Florent Frederix, (Online) Trust and Cybersecurity unit 7 th European Conference on ICT for Transport Logistics 5 th

More information

Virtual CPE and Software Defined Networking

Virtual CPE and Software Defined Networking Virtual CPE and Software Defined Networking Virtual CPE and Software Defined Networking Residential broadband service providers are looking for solutions that allow them to rapidly introduce innovative

More information

What is Driving BYOD Adoption? SOLUTION CARD WHITE PAPER

What is Driving BYOD Adoption? SOLUTION CARD WHITE PAPER WHITE PAPER Enabling BYOD in K-12 with Seamless Mobile Device Accountability and Control How to ideally support mobile devices and maintain Web security and policy compliance in your schools About This

More information

Innovative means to exchange telecom fraud and network security risks information

Innovative means to exchange telecom fraud and network security risks information Innovative means to exchange telecom fraud and network security risks information Anastasius Gavras Eurescom GmbH Outline Who is Eurescom? Collaboration as an innovation instrument INNO-UTILITIES Sharing

More information

Developing Network Security Strategies

Developing Network Security Strategies NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

ARCHITECTURAL CLOUD SECURITY (ARCH)

ARCHITECTURAL CLOUD SECURITY (ARCH) Matthias Heyde / Fraunhofer FOKUS ARCHITECTURAL CLOUD SECURITY (ARCH) Marius Corici marius-iulian.corici@fokus.fraunhofer.de What we have Cloud Today: Homogeneous data centers Orchestrator Uniform VMs

More information

Extending the Internet of Things to IPv6 with Software Defined Networking

Extending the Internet of Things to IPv6 with Software Defined Networking Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability

More information

Juniper Networks, Ruckus Wireless Deliver Carrier-Class Performance for Enterprise Networks

Juniper Networks, Ruckus Wireless Deliver Carrier-Class Performance for Enterprise Networks Juniper Networks, Ruckus Wireless Deliver Carrier-Class Performance for Enterprise Networks Open, NFV-compliant solution simplifies operations and delivers flexible network architecture Challenge All types

More information

HP ExpertOne. HP0-Y45: Architecting HP Network Solutions. Table of Contents

HP ExpertOne. HP0-Y45: Architecting HP Network Solutions. Table of Contents HP ExpertOne HP0-Y45: Architecting HP Network Solutions HP Networking Exam preparation guide Table of Contents Overview 2 Why take the exam? 2 HP Network Architect V1 certification 2 Path 1 2 Path 2 3

More information

Introduction to the Mobile Access Gateway

Introduction to the Mobile Access Gateway Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch

More information

Enabling rapid and adaptive network applications deployment

Enabling rapid and adaptive network applications deployment Enabling rapid and adaptive network applications deployment Net Futures 2015 Session: Network Applications how to unleash the full innovation-potential of SDN and NFV March, 26 th 2015, Brussels Dr. Anastasios

More information

Evolving in the global digital scenario. Politecnico di Torino

Evolving in the global digital scenario. Politecnico di Torino Evolving in the global digital scenario Claudio G. Demartini Claudio G. Demartini Politecnico di Torino ECDL Foundation Philadelphia Dublin Brussels Cairo Dubai Singapore Over 13 Million ECDL Candidates

More information