White Paper. Data Security In The Converged Enterprise Network. Version 3.4
|
|
|
- Dustin Ford
- 10 years ago
- Views:
Transcription
1 White Paper Version 3.4
2 Page: 2 of 16 Table of Contents 1 The Evolving Enterprise Network Network Security Technical Risks: Myths and Reality Network Security Business Risks Securing Your Data: The Business Perspective Technology Alternatives Securing Network Traffic with Layer 2 Encryption Point-to-Point Topology Mesh Topologies The InfoGuard Solution Conclusion...16
3 Page: 3 of 16 1 The Evolving Enterprise Network Enterprise networks continue to grow and evolve at a torrid pace; driven by changes in the underlying technologies, changes in business requirements and the evolution of architectures. While fundamental drivers such as cost effective processing power, new applications and pervasive information sharing continue to grow network traffic, a changing business environment has both accelerated the pace of this growth, and driven networks to become highly geographically dispersed. Industry mergers, out sourcing, off shoring, SAN, home shoring, alliances and business continuity are but a few of the driving factors. Looking into the near future, new approaches in conducting business such as collaborative and cloud computing promise to further accelerate the growth of high throughput distributed networks. Figure 1: Drivers of Enterprise Network Evolution Fortunately network technologies have kept pace with these demands. In the local area network the ubiquitous adoption of Ethernet has driven per port prices down sharply, while throughput has grown from 1Mbps to 10Gbps. The cost effectiveness of fibre, combined with its throughput, has provided the technology to drive tremendous price/performance improvements, initially in long haul infrastructure, and most recently in the metro area infrastructure. Modern buildings and expanding cities have been installing fibre infrastructure for years, while in other more established areas utility companies, governments, startup carriers and even traditional carriers have been making the investments to bring fibre within the reach of major customer sites. In parallel, service providers have been effectively migrating their network architectures, working to driving all forms of traffic onto a single converged IP network riding on top of the fibre infrastructure, which will yield further economic gains. Figure 2: Comparison of Copper and Fibre Cables of the Same Capacity (Source: Corning Incorporated) However the widespread deployment of geographically distributed networks leveraging high capacity shared fibre infrastructure, often connected across multiple service providers, brings the question of data security right to the foreground. In this paper we explore the requirements for data security in today s networks, alternate solutions to meet those requirements, deployment options and implementation resources.
4 Page: 4 of 16 2 Network Security Technical Risks: Myths and Reality Historically network-based data security was a technology utilized only by sophisticated organizations with highly sensitive data. For instance military and intelligence organizations have for a long-time successfully used encryption devices on their network links. This attitude began to change as organizations began to commercially exploit the Internet on a widespread basis, and learned the very real security issues inherent in a shared network infrastructure. As a result, all prudent organizations today employ technologies such as SSL and VPNs to successfully encrypt and protect their valuable data in transit. Similar risks exist in the broadband fibre networks now being deployed by enterprises. However, as with any new development, these risks may not yet be understood. Let us explore the most common misconceptions: Myth One of the most common misconceptions circulating in the market is the myth that fibre optic cables can not be tapped; an information relic of the early years of the fibre optic industry. Monitoring transmission losses across the network will enable you to detect fibre taps. The volume and complexity of data that exists within a fibre makes interception highly unlikely. Leasing private dark-fibre channels is inherently secure. Reality A variety of readily available commercial tools enable personnel with general technical skills and access to the fibre anywhere along its route to easily tap it (see Figure 3). These tools include some which cause no network disruptions: Splicers: easy to use but cause a temporary disruption Splitter/couplers: more sophisticated, but do not cause even temporary disruptions No-touch technique: most sophisticated, and again, no disruptions The diagram below illustrates that highly effective tapping devices are available which consume less than 1% of the transmitted light, making detection impractical. Note that the costs of the taps and associated miscellaneous hardware are comparable to the standard equipment used by any software hacker. As discussed previously, the build out of fibre infrastructure has been substantial, producing a market for a variety of reasonably priced analysis tools. These tools are readily available, and are perfectly suited to intercepting and decoding a fibre steam. Available tools include: Spectrum analyzers to filter out particular wavelengths Data analyzers that can capture, record and postprocess common high speed data streams, including Gigabit Ethernet, SONET/SDH and FC protocols Whether a channel is provisioned or dark, it will follow a similar network path, providing similar opportunities for tapping at closets, junction boxes, equipment rooms and other vulnerable locations. For long haul links the channel is likely to go through multiple carriers, and may go through different countries with different data protection norms or objectives. John Pescatore of Gartner estimates that 75% of fibre cables are publicly accessible.
5 Page: 5 of 16 Splicer: Inserts a «Y» bridge in the cable Splitter/Coupler: Light emitted from bent cable picked up by adjacent receiver No-touch: Normal low-level light emitted from cable picked up by sensitive receiver Figure 3: Common Fibre Tapping Techniques As you can see, all of these myths are quite flawed. Like any network technology, today s fibrebased links are vulnerable to interception. The volume of data, in fact, makes those links more attractive and prized targets. 3 Network Security Business Risks Network security exposure is a function of both technical risk, which we established above, and business risk. What are the major factors that may motivate an individual or organization to tap into your network? Based upon experience, most breaches have been motivated by one of three factors: Corporate/industrial/financial espionage Adversarial governments Internal personnel issues While these types of breaches do not occur every day, there is enough history to demonstrate a pattern of risk, which is causing industry and governmental bodies to adopt preventative measures, which we will discuss below. Examples of publicly exposed breaches include: Discovery of an illegal fibre eavesdropping device placed on the Verizon network serving a mutual fund company, as documented in the Wolf report 1. Deutsche Telekom s three main trunk lines were found to have been breached at Frankfurt Airport 2. According to the 2007 Security Situation Report by the German BTI, 40 percent of all organizations will be the targets of financially motivated criminal attacks by Optical taps were discovered on the networks of large pharmaceutical companies in the UK and France 4 1 Wolfgang Müller-Scholz, Wolf Report, Das Schweigekartell I & II, March Hacking At The Speed Of Light, SecuritySolutions.com, April 1, 2006, Sandra Kay Miller 3 The IT Security Situation in Germany in 2007, Federal Office for Information Security, p45 4 Fiber Optic Networks Vulnerable to Attack, Information Security Magazine, November 15, 2006, Sandra Kay Miller 5 Credit Card Security Falters, WSJ, April 29,2008 and FTC Treats TJX Unfairly, Wright s Legal Beagle,
6 Page: 6 of 16 Theft of 4.2 million credit and debit card records over a 3 month period from PCI compliant Hannaford Supermarkets 5, reportedly through tapping a fibre-optic cable in the internal network In the 2006/2007 Security Survey carried out by the Association for Security of the Economy (ASW), 52% of German enterprises reported that they were confronted with economic espionage and tapping attacks 6. This data aligns with popular reports of highly professional commercial hacking groups 7. Numerous examples of governments tapping the networks of other nations, as well as networks internal to their own nation: 1) The US government is widely reported, in sources such as CNN, to have built the capability to tap submerged fibre cables from both last and current generation submarines 8 2) Illegal monitoring equipment was discovered on the Dutch and German police networks 9 3) The French government has tapped UK networks to gain access to top management conversation during competitive bids against French companies 4) 14% of German enterprises reported that they are faced with espionage carried out by national intelligence services 10 5) The US government was discovered to have set up monitoring rooms at AT&T facilities to tap the fiber links connecting WorldNet to global networks 11 One way to put a more quantifiable face on the adversarial government threat is to look at the narrow experience of one country. In 2004 the U.S. government reported that individuals from almost 100 countries attempted to acquire sensitive U.S. technologies, which are of course a subsector of the total threat profile. That data is roughly comparable to the 2003 data. Note that of these attempts, only 36% were made by foreign governments or entities controlled by them 12 ; commercial entities and individual were responsible for the remaining attempts. 6 CIO Magazine on-line, German Economy Fears Attacks on the Net, June 6, 2007, 7 Theft ring accused of hacking 41 million credit card numbers, StarTribune, August 6, USS Carter Will Be Able To Eavesdrop, February 18, 2005, John J. Lumkin, 9 Fiber Optic Networks Vulnerable to Attack, Information Security Magazine, November 15, 2006, Sandra Kay Miller 10 CIO Magazine on-line, German Economy Fears Attacks on the Net, June 6, 2007, 11 Stumbling Into a Spy Scandal, Wired, May 17, 2006, Inside The Feds Secret Wiretapping Rooms, Jeffrey Klein and Paolo Pontoniere, New American Media, September 20, 2006, 12 Annual Report To Congress on Foreign Economic Collection and Industrial Espionage 2004, Office of the National Counterintelligence Executive, April 2005
7 Page: 7 of 16 4 Securing Your Data: The Business Perspective Given the current environment, combined with the vulnerability and attractiveness of backbone links as targets, the era when protecting such links was considered a nice to have option has drawn to a close. There are a variety of compelling business reasons that IT managers are using to prioritize protection of these links: Compliance. Industry studies show that compliance with regulatory requirements is a major concern to corporate management. A broad range of regulations are currently in place with requirements in some specifically mentioning encryption, or simply implied in others. For instance: o o o o Payment Card Industry Security Standard (PCI) Applies globally to merchants who transmit cardholder data; requiring them to encrypt data across open, public networks. EC Directive 2002/58, Data Protection Act 1998, EU European community rules that require both technical and organizational protection against unauthorized access or processing of private data. Gramm-Leach-Bliley Act (GLBA) A law requiring financial institutions in the U.S. to consider whether encryption of customer financial information while in transit is appropriate. With the Federal Financial Institutions Council handbook indicating that financial institution should employ encryption to mitigate the risk of alteration or disclosure of information in transit, the burden is placed on the institution to show that encryption is not needed. Health Care Information and Portability Act (HIPAA) Requires protected health care information in the U.S. to be encrypted in transit if it is determined to be reasonable and appropriate. With numerous other regulations and guidelines such as SOX, Basel II and ISO 27001/27002 in place, it is clear that companies are being strongly guided to take measures to secure sensitive data in transit. Due Care. Irrespective of specific regulations, in many countries companies, and the managers within companies, are legally expected to exercise due care in protecting the company s assets and the information entrusted by their customers (the formal legal concept is known as duty of care in some countries. In other countries the legal concept is covered by the supervisory obligations of top management 13 ). Should a damaging incident occur, they will not be held liable if it can be proven that sufficient care had been taken. This means you should understand the typical and prudent measures taken by other organizations, and meet or exceed those standards (for instance ensuring you meet best practices). Perhaps the best source of information for understanding typical and prudent measures is the widely read Computer Crime and Security Survey 14 issued annually by the CSI with the participation of the U.S. Federal Bureau of Investigation. In Figure 4 we see that each year a greater percentage of respondents have adopt the use of encryption technology for data in transit, with the 2008 data showing that 71% of the 521 respondents are users. This 13 The IT Security Situation in Germany in 2007, Federal Office for Information Security, p CSI Computer Crime and Security Survey, by Robert Richardson, p19
8 Page: 8 of 16 data reinforces the point made above, that standards have been rising quickly to encompass protection of data in transit, particularly when 3 rd party and shared network elements are utilized. F Figure 4: Data Security Measures, incl. Encryption in Transit i Financial and Reputational Risk. Breaches in network security can lead to both direct financial losses, in the case where the target of the breach is proprietary information, and loss of reputation. From an overall financial perspoective, the average cost of a breach in 2007 was $6.3 million; an increase of 43% over Increasingly organizations are being required by law to notify customers of security breaches. In the U.S., laws of this type are sweeping through the state legislatures at a rapid pace, with at least 43 states having enacted some form of notification legislation 16. Other countries have similar laws, such as the EU Data Protection Directive. In today s highly competitive market, such revelations, when your company may be spending enormous sums of money to develop brands and loyalty, can be just as significant as Figure 5: Percent of Total Breach Cost by Category the direct financial losses. An indication of this is the breakdown of actual costs reported by 35 breached companies participating in a 2007 study; showing 56% was due, in their cases, to revenue declines resulting from lost customer business Annual Study: U.S. Cost of a Data Breach, Ponemon Institute, November 2007, p2 16 State of California Office of Privacy Protection, Recommended Practices on Notice of Security Breaches Involving Personal Information, May 2008, p Annual Study: U.S. Cost of a Data Breach, Ponemon Institute, November 2007, p10
9 Page: 9 of 16 In fact, of the breached companies participating in the 2007 Ponemon study, the number one technology measure implemented following their breach was encryption.
10 Page: 10 of 16 5 Technology Alternatives Given that best practices dictate the need to protect data on valuable network links, there are two basic approaches to encryption that can be taken. We will examine the tradeoffs inherent in each approach. 1. Encrypting at the network link layer (layer 3), typically using an IPSec option in the network routers. With this option the data packet is encrypted with the encryption option and an additional IP header is added to the encrypted packet as shown in Figure 6, resulting in additional overhead which effectively shrinks the bandwidth. Disadvantages of this approach include: Introduces significantly more processing latency (40% to 60% in independent tests), which is an issue given the trend toward converged networks that include delay sensitive applications such as VoIP, video, transactional data, synchronous data mirroring, real-time monitoring and so forth. Reduces network throughput due to the additional encryption overhead added, as shown in red in Figure 6. This is a particularly big issue for smaller frames (64 and 128 bytes) which comprise 65% of traffic globally. For instance the typical overhead of 57 bytes added to a 64 byte frame results in incremental overhead of 47%! Also note that additional overhead and latency can be generated in the case of large frames where the L3 encryption overhead will cause additional fragmentation. At higher network speeds, throughput may be further degraded due to the fact that the hardware is not purpose built. In some devices multiple cards can be added to attempt to overcome performance limitations; however this adds significant complexity and cost to the solution. Complex to setup and administer. With encryption being performed within the router, at setup, and whenever the network configuration changes, security policies must be updated in local and remote routers. This may require the use of additional management software. Furthermore, due to the additional overhead and latency added when enabling L3 encryption, it may become necessary to introduce additional QoS schemes, adding further configuration complexity. Whenever changes are made, they will also need to be tested and verified.
11 Page: 11 of 16 The advantage of layer 3 encryption is that it can be implemented within the network router. However this typically requires one or more options to be added to the router, essentially negating this advantage. Figure 6: Comparison of Layer 2 and Layer 3 Encryption Techniques 2. Encrypting at the data link layer (layer 2), typically using stand-alone encryption devices. This approach introduces no additional overhead, as demonstrated in Figure 6, there by maximizing network throughput. Other advantages include: Introduces minimal latency (in the s range ), which is positive for all applications, but is especially necessary for real-time applications such as video, VoIP, data mirroring, real-time monitoring and converged networks which may contain these data types. Does not introduce additional overhead, maximizing throughput. Provides support for all protocols, providing application flexibility and enabling deployment of a single common approach to network security across the enterprise. An IPSec encryption approach only supports IP traffic. Purpose built devices are used, which are designed for specific network speeds, ensuring there are no throughput limitations and a longer lifecycle. Easy to use. Since purpose built independent devices are used, they are easily configured offline and installed quickly, without impacting other network equipment. There are no issues with software compatibility, and no need to deal with VPN/policy/tunneling/routing table rules and configuration.
12 Page: 12 of 16 Lower cost of ownership. The cost of ownership for a L2 versus a L3 solution is comprised of differences in both upfront costs, plus the differences in on going operating costs of each solution. These will vary depending upon site specific factors such as equipment types, communications line cost and loading. However in general L2 solutions are notably lower in total cost of ownership. Although there may be some differences in the relative costs of hardware and software for these approaches, the biggest differences are in the area of operating costs. As noted above, the L3 approach is notably more complex, resulting in higher costs for installation, initial configuration, on-going configuration changes and testing. Furthermore, due to the L3 overhead, additional bandwidth may be required to maintain performance, adding incremental carrier costs. In summary for high speed networks, layer 2 encryption provides wirespeed throughput, minimal latency, broader protocol support, less complexity and lower cost of ownership than layer 3 encryption, making it a clearly preferable solution.
13 Page: 13 of 16 6 Securing Network Traffic with Layer 2 Encryption Although today s converging networks can result in very sophisticated architectures, Layer 2 encryption technology is available which is capable of supporting virtually all common application scenarios; enabling you to protect your data regardless of topology, carrier service or protocol. InfoGuard is one of the leading suppliers of L2 encryption solutions, and is unique in their ability to provide a family of solutions capable of supporting a broad range of network architectures, protocols and speeds. Below we review some of the most popular examples of applications selected from their customer base in over 130 countries, to illustrate the simplicity of securing sensitive network traffic. 6.1 Point-to-Point Topology One of the simplest applications of InfoGuard s encryption devices is the ubiquitous point-topoint topology used to connect backup centers to the primary data centers, suppliers to production centers, and so forth. As we see in Figure 7 the devices are of course deployed in pairs to enable encryption and decryption of the traffic crossing the network. In the case of the InfoGuard family of encryption devices, the fibre can be enterprise owned or carrier provided, and both Ethernet and SDH/SONET interfaces up to 10 Gbps are supported for connecting to the network from the user facilities. This configuration is exceptionally easy to get up and running. Figure 7: Typical Point-to-point Configuration Because of the ample throughput provided by fibre connections, many users want to share these point-to-point connections among applications. InfoGuard s family of devices allow this to be done easily, as shown in Figure 8, without the need to involve another vendor, or to purchase additional encryption devices. A single encrypted 10 Gbps stream is transmitted on the fibre, with multiplexing (TDM) taking place on the client network side. InfoGuard supports a variety of client protocols, including Ethernet, Ficon and Fibrechannel, at a variety of speeds up to the capacity of the selected product. As a result the products are utilized in a wide variety of applications, including storage area networking (SAN), wide area data networking (WAN), disaster recovery and so forth. Figure 8: Typical Multiplexed Configuration
14 Page: 14 of Mesh Topologies Over the last several years carriers have begun to introduce a variety of carrier grade Ethernet services. Enterprises are migrating from their older services, such as Frame Relay, ATM and leased lines to these newer services, due to the simplicity of managing Ethernet services, the lower cost of ownership and the increased flexibility provided. Not only can increased bandwidth be easily provisioned, but the carriers are capable of supporting a variety of topologies, ranging from point-to-point, to full mesh topologies which provide complete connectivity between multiple end points; supporting multiple virtual connections at each end point. Although point-to-point deployments still predominate, point-to-multipoint, and full mesh topologies are significant and growing faster, as they provide improved connectivity at a lower cost; for instance allowing a headquarters location to connect to all branches (point-to-multipoint), or all divisions of an enterprise to connect with each other (full mesh). Figure 9 shows a typical example. InfoGuard devices are placed between the user/network interfaces to provide encryption, similar to the point-to-point topology. Note, however, that only a single device is required at each location, although each location is connected to all other locations, providing significant savings in hardware and operational cost. A variety of services such as dark fibre, WDM, EoMPLS, VPLS or VPWS can be utilized at various throughput levels to provide the necessary connectivity, allowing you to select the appropriate service for your needs. As in the point-to-point case, the flexibility of the InfoGuard devices allows support for a wide variety of applications ranging from campus or metropolitan area networking (e.g. connecting suppliers to a nearby factory) to WAN. Figure 9: Typical Mesh Configuration
15 Page: 15 of 16 7 The InfoGuard Solution InfoGuard is one of the leading suppliers of L2 encryption devices, providing the support needed to analyze your requirements in detail, and recommend the appropriate solution. InfoGuard is a member of the Crypto Group of companies, which employ over 300 security experts supporting over 130 companies globally. Since 1952 the group has been producing world class encryption equipment in Switzerland, long known as a secure global expertise center for encryption technology. This track record of financial and technical security places InfoGuard in a unique position as a dependable global supplier of L2 encryption solutions. In order to support the full range of applications reviewed above, InfoGuard provides three lines of encryption products; Ethernet, SDH/SONET and multiprotocol. An overview of their functionality is provided in Figure 10. Point-to-Multipoint Multipoint-to-Multipoint Ethernet SONET/SDH Multilink Multiprotocol Point-to-Point Point-to-Point Point-to-Point 20/100/200 Mbps and 1Gbps Gigabit Ethernet data encryption Layer 2 Solution Designed for pointto-point and multipoint Ethernet networks (EPS, EVPL, EPLAN, EVPLAN) 1/10 Gbps Ethernet data encryption Layer 2 Solution Designed for high performance connections over Dark Fiber, DWDM, CWDM and SAN OC-192/STM-64 SONET/SDH data encryption Supports path- and line-encryption Flexible and cost effective combination of different services with TDM cards GbE, Fibre Channel and FICON data encryption up to 10 Gbps Mapping and encryption of up to 10 channels into a single link Figure 10: InfoGuard Encryption Product Line Overview All the products provide a variety of common features designed to make the devices highly secure, easy to setup and manage: Selectable 128/256 bit AES encryption Automatic key generation via random number generator and key distribution via Security Card or inter-unit management Automatic key exchange/update without link loss at selectable time intervals Secure local and remote management Audit and event logging A MTBF greater than 50,000 hours, with dual hot-pluggable power supplies and fans The products are supported by a customer support center which operates 24x7 to ensure your critical data is never at risk.
16 Page: 16 of 16 To begin your project it is recommended that you consult with InfoGuard s experienced staff of application specialists who will work to design the optimal solution for your needs, develop an implementation plan, and support your organization throughout implementation. 8 Conclusion In this paper we have established that: Virtually all enterprises of significant scale employ a wide variety networking connections containing sensitive data This data is vulnerable from both a technical and business perspective The current business environment not only supports, but requires sensitive data be protected in transit The most effective means of protecting this data is with Layer 2 encryption Layer 2 encryption devices are available that support all common application scenarios InfoGuard is an experienced provider of Layer 2 encryption devices with the product line breadth and support infrastructure which will enable you to secure your data quickly and effectively InfoGuard has the track record of business success to become a reliable long term partner to your organization You are invited to obtain more information by: Visiting InfoGuard s web site at ing InfoGuard at [email protected]
Fiber-Optic Networks: Is Safety Just an Optical Illusion?
TECHNOLOGY ASSESSMENT Fiber-Optic Networks: Is Safety Just an Optical Illusion? Romain Fouchereau IDC OPINION Fiber-optic cable networks have been deemed the fastest, most reliable, and most secure way
Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies
Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies Reaching a Balance Between Communications and Security
Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer
Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer Layer 2 Network Encryption where safety is not an optical illusion Todays Agenda Fibre is safe
ethernet services for multi-site connectivity security, performance, ip transparency
ethernet services for multi-site connectivity security, performance, ip transparency INTRODUCTION Interconnecting three or more sites across a metro or wide area network has traditionally been accomplished
How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper
How Proactive Business Continuity Can Protect and Grow Your Business For most companies, business continuity planning is instantly equated with disaster recovery the reactive ability of a business to continue
WAN and VPN Solutions:
WAN and VPN Solutions: Choosing the Best Type for Your Organization xo.com WAN and VPN Solutions: Choosing the Best Type for Your Organization WAN and VPN Solutions: Choosing the Best Type for Your Organization
High Speed Encryption Made in Germany
High Speed Encryption Made in Germany Today s Trends in Network Encryption 2 Today s Trends in Network Encryption Contents Background ATMedia GmbH Why Encryption? Which Encryption? How to deploy Encryption
Virtual Privacy vs. Real Security
Virtual Privacy vs. Real Security Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing
IN CONTROL AT LAYER 2: A TECTONIC SHIFT IN NETWORK SECURITY.
IN CONTROL AT LAYER 2: A TECTONIC SHIFT IN NWORK SECURITY. WHO SHOULD READ THIS WHITE-PAPER: NWORK ARCHITECTS / MANAGERS, DATA SECURITY MANAGERS, CIOs, CSOs. EXECUTIVE SUMMARY Network hacking and corporate
November 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance
White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA
MPLS/IP VPN Services Market Update, 2014. United States
MPLS/IP VPN Services Market Update, 2014 United States August 2014 Contents Section Slide Numbers Executive Summary 4 Market Overview & Definitions 8 Drivers & Restraints 14 Market Trends & Revenue Forecasts
SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and
SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and Management SafeNet Network Encryption and Isolation Solution
Multi Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
Communication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
ROGERS DELIVERS THE SPEED, POWER AND RELIABILITY OF FIBRE RIGHT TO YOU.
ROGERS DELIVERS THE SPEED, POWER AND RELIABILITY OF FIBRE RIGHT TO YOU. ROGERS BUSINESS SOLUTIONS When you partner with Rogers Business Solutions, you benefit from on-going collaboration with our team
Primary Data Center. Remote Data Center Plans (COOP), Business Continuity (BC), Disaster Recovery (DR), and data
White Paper Storage Extension Network Solutions Between Data Centers Simplified, Low Cost, Networks for Storage Replication, Business Continuity and Disaster Recovery TODAY S OPERATING CLIMATE DEMANDS
The Evolution of Ethernet
June 2010 White Paper The Evolution of Ethernet How Ethernet solutions, such as NTT America s VLink, can help businesses reduce private networking costs while leveraging Ethernet technology. Introduction
The Business Case for Ethernet Services Whitepaper Sponsored by Time Warner Cable Business Class
The Business Case for Ethernet Services Whitepaper Sponsored by Time Warner Cable Business Class Executive Summary Network-based applications such as Voice over IP (VoIP), cloud, collaboration services
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream
WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED
WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED RAJESH KUMAR SUNDARARAJAN Assistant Vice President - Product Management, Aricent Group WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED This whitepaper
HIGH PERFORMANCE ENCRYPTION SOLUTIONS SECURING CRITICAL NATIONAL INFRASTRUCTURE
HIGH PERFORMANCE ENCRYPTION SOLUTIONS SECURING CRITICAL NATIONAL INFRASTRUCTURE CRITICAL NATIONAL INFRASTRUCTURE The UKs national infrastructure is defined by Government as those facilities, systems, sites
How To Get More Bandwidth From Your Business Network
Choosing Ethernet Services IS ETHERNET THE RIGHT CHOICE FOR YOUR NETWORK? Business Ethernet Including Ethernet over Copper (EoC) and Ethernet over Digital Signal Cross-connect (EoDSx) Delivers Cost- Effective,
Accelerate Private Clouds with an Optimized Network
Accelerate Private Clouds with an Optimized Network An Allstream White Paper 1 Table of contents The importance of WAN 1 WAN challenges for Private Clouds 1 WAN Optimization methods 2 Benefits of WAN Optimization
Using Carrier Ethernet to Create Cost Effective and Secure Wide Area Networks How Layer 2 Encryption Enables Better Use of Bandwidth.
White Paper Using Carrier Ethernet to Create Cost Effective and Secure Wide Area Networks How Layer 2 Encryption Enables Better Use of Bandwidth Sherman Schlar Schlar Consulting Group April 2010 Schlar
L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast.
L2 Box Layer 2 Network encryption Verifiably secure, simple, fast. reliable line encryption. Nowadays internal and confidential data is exchanged between locations or computer centres of public authorities
WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter
WHITEPAPER VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter The Holy Grail: Achieving Simplicity and Control in the IT Infrastructure Today s Information Technology decision-makers
Benefits of RPR for Utility Critical Infrastructure Networks
Benefits of RPR for Utility Critical Infrastructure Networks Introduction Utility company professionals charged with designing, maintaining and managing survivable communications networks to support CI,
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
Evolving Your Network with Metro Ethernet and MPLS VPNs
Evolving Your Network with Metro Ethernet and MPLS VPNs Change is a constant in enterprise networking and the axiom definitely holds true when considering wide-area connectivity options. Experienced IT
High speed Ethernet WAN: Is encryption compromising your network?
High speed Ethernet WAN: Is encryption compromising your network? Trademark: 2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet. All other product names
Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008
Making the Case for Satellite: Ensuring Business Continuity and Beyond July 2008 Ensuring Business Continuity and Beyond Ensuring business continuity is a major concern of any company in today s technology
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
Application Note License-Exempt Gigabit Ethernet Microwave Radio Applications
Application Note License-Exempt Gigabit Ethernet Microwave Radio Applications Applicable Products: EX-5r GigE, EX-5r-c GigE Introduction The accelerated growth of fixed and mobile wireless broadband services
Cox Business. L2 / L3 and Network Topology Overview. February 1, 2011
Cox Business L2 / L3 and Network Topology Overview February 1, 2011 Layer 3 / Layer 2 Comparo Protocol Architecture Control Change: Adding sites Change: IP changes Faults: Management Faults: Calls Layer
Ethernet is service provider terms can be delivered from speeds starting from 1mb all the way up to 1Gb+.
Carrier Ethernet vs. (Standard) Ethernet The Ethernet Evolution. The Basics What is Ethernet? Ethernet (technical term is IEEE 802.3) has set the standard in how service providers connect customers to
APPLICATION NOTE. Benefits of MPLS in the Enterprise Network
APPLICATION NOTE Benefits of MPLS in the Enterprise Network Abstract As enterprises evolve to keep pace with the ever-changing business climate, enterprises networking needs are becoming more dynamic.
LoopStar 700. Next Generation Ethernet Access and Transport Solutions
LoopStar 700 Next Generation Ethernet Access and Transport Solutions The LoopStar 700 Product Family The LoopStar 700 product family delivers all efficiently consolidate all services onto a the features
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
AT&T Ethernet Services. Your Network Should Fit Your Business Needs, Not The Other Way Around
AT&T Services Your Network Should Fit Your Business Needs, Not The Other Way Around Your network has growing demands for new high speed data applications and service consolidation. Services can help meet
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R F l e x i b l e N e t w o r k - B a s e d, E n t e r p r i s e - C l a s s I P
Cisco SAFE: A Security Reference Architecture
Cisco SAFE: A Security Reference Architecture The Changing Network and Security Landscape The past several years have seen tremendous changes in the network, both in the kinds of devices being deployed
Enterprise Business Products 2014
Enterprise Business Products 2014 Enterprise Ethernet Services EPL (Ethernet Private Line) - provides point-to-point connectivity between two business locations with scalable bandwidth speeds via an Ethernet
High Speed Ethernet WAN: Is encryption compromising your network?
High Speed Ethernet WAN: Is encryption compromising your network? 2015 Gemalto 2015. All rights reserved. Gemalto, the Gemalto logo, are trademarks and service marks of Gemalto and are registered in certain
CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense
CONNECT PROTECT Communication, Networking and Security Solutions for Defense Engage Communication provides Defense, Homeland Security and Intelligence Communities with innovative and cost effective solutions
How To Get A Metro Ethernet Connection For Healthcare Providers
Metro Ethernet for the Healthcare Industry Why You Should Choose Cox Metro Ethernet While being one of the most highly regulated of all industries, the healthcare industry is faced with the social needs
UNDERSTANDING BUSINESS ETHERNET SERVICES
UNDERSTANDING BUSINESS ETHERNET SERVICES EMPOWER YOUR BUSINESS TO MEET 21ST CENTURY DEMANDS INTRODUCTION The network is your business has been a mantra for many years indicating how businesses rely more
Monitoring Service Delivery in an MPLS Environment
Monitoring Service Delivery in an MPLS Environment A growing number of enterprises depend on (or are considering) MPLS-based routing to guarantee high-bandwidth capacity for the real-time applications
UNDERSTANDING BUSINESS ETHERNET SERVICES
EMPOWER YOUR BUSINESS TO MEET 21ST CENTURY DEMANDS INTRODUCTION The network is your business has been a mantra for many years indicating how businesses rely more heavily on being networked between their
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations
IVCi s IntelliNet SM Network
IVCi s IntelliNet SM Network Technical White Paper Introduction...2 Overview...2 A True ATM Solution End to End...2 The Power of a Switched Network...2 Data Throughput:...3 Improved Security:...3 Class
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
WHITE PAPER. Gaining Total Visibility for Lawful Interception
WHITE PAPER Gaining Total Visibility for Lawful Interception www.ixiacom.com 915-6910-01 Rev. A, July 2014 2 Table of Contents The Purposes of Lawful Interception... 4 Wiretapping in the Digital Age...
GETTING THE MOST FROM THE CLOUD. A White Paper presented by
GETTING THE MOST FROM THE CLOUD A White Paper presented by Why Move to the Cloud? CLOUD COMPUTING the latest evolution of IT services delivery is a scenario under which common business applications are
NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NETWORK SERVICES
NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NWORK SERVICES A Major CCTV network and surveilance services provider chose Senetas certified high-speed encryptors to protect European law enforcement CCTV network
The Next Generation Network:
JULY, 2012 The Next Generation Network: Why the Distributed Enterprise Should Consider Multi-circuit WAN VPN Solutions versus Traditional MPLS Tolt Solutions Network Services 125 Technology Drive Suite
The term Virtual Private Networks comes with a simple three-letter acronym VPN
Application Brief Nortel Networks Virtual Private Networking solutions for service providers Service providers addressing the market for Virtual Private Networking (VPN) need solutions that effectively
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
NETWORK ISSUES: COSTS & OPTIONS
VIDEO CONFERENCING NETWORK ISSUES: COSTS & OPTIONS Prepared By: S. Ann Earon, Ph.D., President Telemanagement Resources International Inc. Sponsored by Vidyo By:S.AnnEaron,Ph.D. Introduction Successful
Introduction to Meg@POP
Introduction to Meg@POP SingTel Meg@POP is a comprehensive suite of IP services for businesses which need a secured connection to multiple locations, parties or services in Singapore. It provides a simple
Solution Brief. Secure and Assured Networking for Financial Services
Solution Brief Secure and Assured Networking for Financial Services Financial Services Solutions Page Introduction To increase competitiveness, financial institutions rely heavily on their networks to
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
Enterprises have turned to cloud-based applications
JULY 2014 THE STATE OF Data Center Networking The Cloud Effect on Data Center Networking Enterprise IT departments are seeking highperformance connections to data centers for mission-critical, cloud-based
Secure Network Access Solutions for Banks and Financial Institutions. Secure. Easy. Protected. Access.
Secure Network Access Solutions for Banks and Financial Institutions Secure. Easy. Protected. Access. Cybersecurity A Growing Concern for Banks The banking sector is shifting from using closed, proprietary
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
convergence: preparing the enterprise network
hp procurve networking business january 2003 convergence: preparing the enterprise network business white paper protecting investments with the hp procurve adaptive EDGE architecture table of contents
Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests
Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test
the about MPLS security
uth 22 the about truth MPLS security 11 MPLS is private. MPLS is a shared service! We use a private network is often stated as the reason for not protecting data as it travels over 3rd party networks.
100 Gigabit Ethernet is Here!
100 Gigabit Ethernet is Here! Introduction Ethernet technology has come a long way since its humble beginning in 1973 at Xerox PARC. With each subsequent iteration, there has been a lag between time of
Comparing MPLS and Internet Links for Delivering VoIP Services
IP Telephony Contact Centers Mobility Services WHITE PAPER Comparing MPLS and Internet Links for Delivering VoIP Services September 2005 avaya.com Table of Contents Overview... 1 Historical Perspective...
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
Virtual Private LAN Service (VPLS)
Virtual Private LAN Service (VPLS) Walking through Wan history, from the early days Leased lines Customers subscribe to dedicated point-to-point links Cost prohibitive for customers Started in the 1980
Smart Solutions for Network IP Migration
for Network IP Migration Network Access Timing and Synchronization Test & Measurement Agenda: Architectures and Topologies Product life cycle Media and Protocol Conversion Application Cases Conclusion
Multi-protocol Label Switching
An INS White Paper Multi-protocol Label Switching An economic way to deliver integrated voice, video and data traffic March 2013 Run your business on one network Multi-protocol Label Switching (MPLS) is
July, 2006. Figure 1. Intuitive, user-friendly web-based (HTML) interface.
Smart Switches The Value-Oriented Alternative for Managed Switching White Paper September, 2005 Abstract This White Paper provides a short introduction to Web Smart switches and their importance in a local
A Talari Networks White Paper. Transforming Enterprise WANs with Adaptive Private Networking. A Talari White Paper
ATalariNetworksWhitePaper TransformingEnterpriseWANswith AdaptivePrivateNetworking ATalariWhitePaper 2 TransformingEnterpriseWANwithAdaptivePrivateNetworking Introduction IT departments face pressures
The Role of Carrier Ethernet in Business Applications
The Role of Carrier Ethernet in Business Applications Examining the Choices for your Business Applications February 2012 Positioning Paper Page 1 of 11 Table of Contents 1 Introduction... 3 2 Characteristics
Carrier Ethernet: New Game Plan for Media Converters
Introduction IEEE Std. 802.3ah, also referred to as Ethernet in the First Mile (EFM) standard, has a well established name within the industry today. It lays out ground rules for implementing Ethernet
Dynamic Verizon Ethernet Solutions for the Extended Manufacturing Enterprise
executive brief: data networking Dynamic Verizon Ethernet Solutions for the Extended Manufacturing Enterprise Executive Summary Comprised of both internal and external organizations, including a company
CTS2134 Introduction to Networking. Module 07: Wide Area Networks
CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data
The Keys for Campus Networking: Integration, Integration, and Integration
The Keys for Campus Networking: Introduction Internet Protocol (IP) is considered the working-horse that the vast majority of current and future applications use as the key technology for information exchange,
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
Resilient Metropolitan Area Networks
Resilient Metropolitan Area Networks t. 902.442.1540 f. 902.442.1559 w. www.internetworking-atlantic.com 1 Resilient Metropolitan Area Networks Technologies for wide area network (WAN) and metropolitan
10 Gigabit Ethernet: Scaling across LAN, MAN, WAN
Arasan Chip Systems Inc. White Paper 10 Gigabit Ethernet: Scaling across LAN, MAN, WAN By Dennis McCarty March 2011 Overview Ethernet is one of the few protocols that has increased its bandwidth, while
How To Secure My Data
How To Secure My Data What to Protect??? DATA Data At Rest Data at Rest Examples Lost Infected Easily Used as Backup Lent to others Data Corruptions more common Stolen Left at airports, on trains etc Hard
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
Data Center Interconnect: Small Vendors Innovate, but Large Ones Are Catching Up
Rick Talbot Current Analysis Senior Analyst, Advisory Report Vendors Innovate, December 30, 2011 Issue As service providers turn to content delivery networks and cloud computing to deliver their value-add
The Impact Of The WAN On Disaster Recovery Capabilities A commissioned study conducted by Forrester Consulting on behalf of F5 Networks
February 2007 The Impact Of The WAN On Disaster Recovery Capabilities A commissioned study conducted by Forrester Consulting on behalf of F5 Networks TABLE OF CONTENTS Introduction: Upgrading Disaster
MPLS in Private Networks Is It a Good Idea?
MPLS in Private Networks Is It a Good Idea? Jim Metzler Vice President Ashton, Metzler & Associates March 2005 Introduction The wide area network (WAN) brings indisputable value to organizations of all
Overcoming Security Challenges to Virtualize Internet-facing Applications
Intel IT IT Best Practices Cloud Security and Secure ization November 2011 Overcoming Security Challenges to ize Internet-facing Applications Executive Overview To enable virtualization of Internet-facing
