The NSF SecureCloud Project: Cybersecurity for Enterprise Class Data Centers
|
|
|
- Phebe Wilkins
- 9 years ago
- Views:
Transcription
1 The NSF SecureCloud Project: Cybersecurity for Enterprise Class Data Centers Casimer DeCusatis, Ph.D. Assistant Professor, Marist HVCSC
2 Overview Introduction to Marist College & the NY State Cloud Computing and Analytics Center Motivation for SDN/NFV/Cloud security research Goals of the NSF SecureCloud research program Experimental test bed and results to date
3 23 credit minor in Cybersecurity Intro to Programming (4 credits) Data Communication (4 credits) Internetworking (4 credits) Intro to Cybersecurity (4 credits Virtual Lab) offered every fall above 3 courses are prerequisites Hacking & Penetration Testing (3 credits Virtual Lab) offered every spring Intro Cybersecurity is a prerequisites Mobile Security (4 credits Virtual Lab) offered every spring Intro Cybersecurity is a prerequisites Intro Cybersecurity Hacking & Penetration Testing Mobile Device Security The first 3 courses are required for all computer science students, meaning they only need to complete the remaining 3 technical electives.
4
5 The Traditional Trust Economy 5
6 Trust used to be expensive Architecture of banks & government buildings evokes tradition, solidity, and enduring history Stamp of approval, guaranteed reputation Projects an aura of excellence Comes with a built-in reputation and social status Building brands in the pre-digital era was expensive 6
7 Trust used to be expensive Architecture of banks & government buildings evokes tradition, solidity, and enduring history Stamp of approval, guaranteed reputation Projects an aura of excellence Comes with a built-in reputation and social status Building brands in the pre-digital era was expensive Trust came from being purposely wasteful You can trust us, look at how much we spend on our buildings! 7
8 Why are we willing to put our trust in people we ve never met? A. Stan, The future is the trust economy, (April 24, 2016) 8
9 Trust simply does not apply to packets. Identity at the network level is merely an assertion of certain attributes that may be true or false, forged or real. However, all we can truly know about network traffic is what is contained in packets, and packets cannot tell us about the veracity of the asserted identity, let alone the intentions or incentives of the entity generating the packets.
10 Trust but Verify Verify and Never Trust pril
11 Eliminates the notion of a trusted vs untrusted network Disruptive technologies like SDN, NFV enable zero trust
12 The need for visibility and agility Yet only 25% of these were discovered In a few days Average time to discovery = 205 days (6-7 months) From Verizon data breach report
13
14 NSF SecureCloud Project Campus Cyberinfrastructure Data Networking Integration (2 years, $690 K) Casimer DeCusatis (PI), 4 students, other faculty/cio co-pi Industry partners including IBM, Ciena, Brocade, BlackRidge, Cisco Autonomic security for cloud computing environments Develop & deploy novel end-to-end security policy for each application Dynamically monitor the network both within and between data centers (up to 100 km) and change security configuration in response to attacks Develop & test new code, eventually deploy into production at Marist Goals Sense & response for denial of service attacks, IP spoofing, botnets, and malware Segregate traffic based on properties for improved visibility & quarantine threats Security analytics on big data sets collected from honeypots & cloaking key infrastructure
15 Identity-Based Network Security for the Cloud Networks do not allow for user or device identity to be determined before establishing network connections BlackRidge Transport Access Control (TAC) authenticates identity and enforces security policy on the first packet, before a network session is established Caller-ID for the Internet First Packet Authentication Before caller-id, you needed to answer to determine identity. After caller-id, you only answer authenticated and authorized callers. Session Setup Data Packet Flows time First Packet Authentication stops unauthorized access at the earliest possible time. Current security products start after network sessions are established.
16 Trusted Client Trusted Client Switch Untrusted Ingress port Management Port And NTP Port TAC insertion hardware Untrusted Management Network Virtual TAC validation Virtual Machine (VM) Trusted Egress port Protected Resource (SDN Controller) SDN Honeypot (fake SDN controller) UnTrusted Client
17 Without BlackRidge Servers Being Scanned Cloaked and Protected: You Can t Attack What You Can t See BlackRidge Enforce Mode Servers Not Found 12 Open Ports Found No Open Ports Found Cloaked, Protected, and Isolated!
18 Live Research Results: Blocking 100% of Unauthorized Traffic s_all.shtml Firewall IPS Protection BlackRidge Protection Firewall/IPS allows large number of TCP connection attempts through and information to leak. BlackRidge does not allow any unauthorized connection attempts or scans (information leakage) to occur.
19 LongTail Live Updates & Honeypots We have deployed 21 SSH honeypots across the Hudson Valley Collected and analyzed over 41 million data points over a 12 month period, and identified over 100 unique attack patterns IEEE TryCybSi Project, LongTail Honeypot 19
20 ICO with Application Security Policy Marist Remote Management App SDN Controller and Network Hypervisor With cloud orchestrator API Marist API code NetConf Ciena Blue Planet SDN Controller and Network Hypervisor With cloud orchestrator API Local Probes Marist LongTail & Honeypot (SSH, SDN) Remote Probes Brocade/Vyatta 5600 V-Router/Firewall WDM Node C Ciena Metro Ethernet WDM Node B Brocade/Vyatta 5600 V-Router/Firewall WDM Node A
21 Conclusions Zero Trust is an emerging network security framework Trust nothing, verify everything NSF SecureCloud uses first packet authentication and transport layer cloaking to implement the principles of zero trust NSF SecureCloud uses LongTail analytics to classify attack patterns, and generate rapid, automated, proportional response SSH Honeypots available now, SDN honeyports coming soon
22 Recent Research Publications C. DeCusatis, J. Ziskin, T. Bundy, The rise of SDN optical networks; has automated provisioning arrived?, invited presentation, Pacific Telecom Conference, Honolulu, Hawaii (January 2014) C. DeCusatis, R. Cannistra, B. Carle, M. Johnson, J. Kapadia, Z. Meath, M. Miller, D. Young, T. Bundy, G. Zussman, K. Bergman, A. Carranza, C. Sher-DeCusatis, A. Pletch, R. Ransom, Dynamic orchestration test bed for SDN and NFV at the New York State Center for Cloud Computing & Analytics, OFC 2014 annual meeting, San Francisco, CA (accepted & to be published, March 2014) C. DeCusatis et.al., Developing a software defined networking curriculum through industry partnership, Proc. ASEE Annual Meeting, Hartford, CT (April 3-5, 2014) ** named among top 10 conference papers ** Internet2 Global Summit, April 6-10, 2014, Denver, Colorado C. DeCusatis, SDN, NFV, and the cloud disruption: the next generation open data center interoperable network (ODIN), BrightTalk webinar, April 17, C. DeCusatis, R. Cannistra, T. Bundy, Software Defined Environments and Next Generation Networks: a tutorial, Proc. Keystone Initiative for Network Based Education and Research (KINBER) 2014 annual meeting (an Internet2 affiliate), Harrisburg, PA, April 23-25, 2014 C. DeCusatis and L. Miano, Cloud computing and software defined environments, Pace University college of computer science and engineering seminar series, April 30, 2014 C. DeCusatis and R. Cannistra, Dynamic management and provisioning of software defined cloud data centers, Proc. NSF Enterprise Computing Conference (ECC), paper SC3101, June 8-10, Marist College, Poughkeepsie, NY (2014) 22
23 or
Software Defined Networking Real World Use Cases (Test bed at Marist/IBM)
Software Defined Networking Real World Use Cases (Test bed at Marist/IBM) Todd Bundy Director Business Development, ADVA Optical Networking [email protected] Our Students, Our Future Benjamin Carle
Software Defined Networking - Real World Use Cases (Test bed at Marist/IBM)
Software Defined Networking - Real World Use Cases (Test bed at Marist/IBM) Our speakers today Todd Bundy Director Global Alliances, ADVA Optical Networking [email protected] Joe Weinman SVP, Cloud
How to Achieve Operational Assurance in Your Private Cloud
How to Achieve Operational Assurance in Your Private Cloud As enterprises implement private cloud and next-generation data centers to achieve cost efficiencies and support business agility, operational
Software Defined Networking Real World Use Cases (Test bed at Marist/IBM)
Software Defined Networking Real World Use Cases (Test bed at Marist/IBM) Todd Bundy Director Business Development, ADVA Optical Networking [email protected] Our Students, Our Future Benjamin Carle
BlackRidge Technology Transport Access Control: Overview
2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service
Designing Virtual Network Security Architectures Dave Shackleford
SESSION ID: CSV R03 Designing Virtual Network Security Architectures Dave Shackleford Sr. Faculty and Analyst SANS @daveshackleford Introduction Much has been said about virtual networking and softwaredefined
SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network
SDN AND SECURITY: Why Take Over the s When You Can Take Over the Network SESSION ID: TECH0R03 Robert M. Hinden Check Point Fellow Check Point Software What are the SDN Security Challenges? Vulnerability
Security Solution Architecture for VDI
Solution Architecture for VDI A reference implementation of VMware BENEFITS Validated solution architecture provides unprecedented end-to-end security dashboard for virtual desktop infrastructure (VDI)
Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre
Unlock the full potential of data centre virtualisation with micro-segmentation Making software-defined security (SDS) work for your data centre Contents 1 Making software-defined security (SDS) work for
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro [email protected] 26.03.2013
Flexible SDN Transport Networks With Optical Circuit Switching
Flexible SDN Transport Networks With Optical Circuit Switching Multi-Layer, Multi-Vendor, Multi-Domain SDN Transport Optimization SDN AT LIGHT SPEED TM 2015 CALIENT Technologies 1 INTRODUCTION The economic
Mirantis OpenStack Express: Security White Paper
Mirantis OpenStack Express: Security White Paper Version 1.0 2005 2014 All Rights Reserved www.mirantis.com 1 Introduction While the vast majority IT professionals are now familiar with the cost-saving
APIs The Next Hacker Target Or a Business and Security Opportunity?
APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
Virtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY
ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY One of the largest concerns of organisations is how to implement and introduce advanced security mechanisms to protect
SOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Freddie Örnebjär TREX Workshop 2012 2012 Brocade Communications Systems, Inc. 2012/09/14 Software-Defined Networking (SDN): Fundamental Control
STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
Software defined networking. Your path to an agile hybrid cloud network
Software defined networking Your path to an agile hybrid cloud network Is your enterprise network ready for the latest business and consumer trends? Cloud How easily can your users connect to cloud resources?
The Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow
Addressing Security And Performance How Your Enterprise is Impacted Today and Tomorrow THE CLOUD: SECURED OR NOT? IN A STUDY BY MICROSOFT, 51 percent of companies who moved to the cloud said that since
Security Challenges & Opportunities in Software Defined Networks (SDN)
Security Challenges & Opportunities in Software Defined Networks (SDN) June 30 th, 2015 SEC2 2015 Premier atelier sur la sécurité dans les Clouds Nizar KHEIR Cyber Security Researcher Orange Labs Products
Citrix - CXD-300 - Deploying Citrix XenDesktop 7 Solutions
Citrix - CXD-300 - Deploying Citrix XenDesktop 7 Solutions Duration: 5 Days Course Price: $4,995 Course Description Course Overview This training course provides students with the skills required to successfully
Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits
A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide
Software Defined Network (SDN)
Georg Ochs, Smart Cloud Orchestrator ([email protected]) Software Defined Network (SDN) University of Stuttgart Cloud Course Fall 2013 Agenda Introduction SDN Components Openstack and SDN Example Scenario
Technical Note. ForeScout CounterACT: Virtual Firewall
ForeScout CounterACT: Contents Introduction... 3 What is the vfw?.... 3 Technically, How Does vfw Work?.... 4 How Does vfw Compare to a Real Firewall?.... 4 How Does vfw Compare to other Blocking Methods?...
Cisco Nexus 1000V Switch for Microsoft Hyper-V
Data Sheet Cisco Nexus 1000V Switch for Microsoft Hyper-V Product Overview Cisco Nexus 1000V Switches provide a comprehensive and extensible architectural platform for virtual machine and cloud networking.
Network Virtualization Solutions - A Practical Solution
SOLUTION GUIDE Deploying Advanced Firewalls in Dynamic Virtual Networks Enterprise-Ready Security for Network Virtualization 1 This solution guide describes how to simplify deploying virtualization security
Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera [email protected]. VERSION May, 2015
Simplify IT With Cisco Application Centric Infrastructure Roberto Barrera [email protected] VERSION May, 2015 Content Understanding Software Definded Network (SDN) Why SDN? What is SDN and Its Benefits?
Connecting your Virtual Machine to the Internet. BT Cloud Compute. The power to build your own cloud solutions to serve your specific business needs
Connecting your Virtual Machine to the Internet BT Cloud Compute The power to build your own cloud solutions to serve your specific business needs Introduction Once you have created your virtual machine
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
Securing Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
THE BLUENOSE SECURITY FRAMEWORK
THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program
Netzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
Wedge Networks: Transparent Service Insertion in SDNs Using OpenFlow
Wedge Networks: EXECUTIVE SUMMARY In this paper, we will describe a novel way to insert Wedge Network s multiple content security services (such as Anti-Virus, Anti-Spam, Web Filtering, Data Loss Prevention,
IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion...
IP Link Best Practices for Network Integration and Security Table of Contents Introduction...2 Passwords...4 ACL...5 VLAN...6 Protocols...6 Conclusion...9 Abstract Extron IP Link technology enables A/V
SOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Eric Choi < [email protected]> Senior Manager, Service Provider Business Unit, APJ 2012 Brocade Communications Systems, Inc. EPF 7 2012/09/17 Software-Defined Networking
HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer
HAWAII TECH TALK SDN Paul Deakin Field Systems Engineer SDN What Is It? SDN stand for Software Defined Networking SDN is a fancy term for: Using a controller to tell switches where to send packets SDN
Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks
IPsonar provides visibility into every IP asset, host, node, and connection on the network, performing an active probe and mapping everything that's on the network, resulting in a comprehensive view of
How To Orchestrate The Clouddusing Network With Andn
ORCHESTRATING THE CLOUD USING SDN Joerg Ammon Systems Engineer Service Provider 2013-09-10 2013 Brocade Communications Systems, Inc. Company Proprietary Information 1 SDN Update -
SDN Security Considerations in the Data Center. ONF Solution Brief October 8, 2013
SDN Security Considerations in the Data Center ONF Solution Brief October 8, 2013 Table of Contents 2 Executive Summary 3 SDN Overview 4 Network Security Challenges 6 The Implications of SDN on Network
Data Center Network Evolution: Increase the Value of IT in Your Organization
White Paper Data Center Network Evolution: Increase the Value of IT in Your Organization What You Will Learn New operating demands and technology trends are changing the role of IT and introducing new
Recent Developments in Transport SDN
Recent Developments in Transport SDN JunJie Li OIF Representative China Telecom Layer 123 SDN & OpenFlow APAC Congress Singapore May 26-28, 2015 About the OIF The Optical Internetworking Forum: Represents
Check Point and Security Best Practices. December 2013 Presented by David Rawle
Check Point and Security Best Practices December 2013 Presented by David Rawle Housekeeping o Mobiles on Silent o No File Alarms planned o Fire exits are in front and behind and down the stairs o Downstairs
A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks
A Coordinated Virtual Infrastructure for SDN in Enterprise Networks Software Defined Networking (SDN), OpenFlow and Application Fluent Programmable Networks Strategic White Paper Increasing agility and
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
OpenStack/Quantum SDNbased network virtulization with Ryu
OpenStack/Quantum SDNbased network virtulization with Ryu Kei Ohmura NTT May 31, 2013 Outline Introduction to Ryu OpenStack Quantum and Ryu Demo Summary 2 What is Ryu 流流 (ryu) means flow 龍龍 (ryu) means
Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre
Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre Wilfried van Haeren CTO Edgeworx Solutions Inc. www.edgeworx.solutions Topics Intro Edgeworx Past-Present-Future
How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan
Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches
Data Center Security Strategies and Vendor Leadership: North American Enterprise Survey
INFONETICS RESEARCH SURVEY EXCERPTS Data Center Security Strategies and Vendor Leadership: North American Enterprise Survey Report Excerpts August 2014 By Analyst Jeff Wilson Table of Contents BIG CHANGES
The Secure Web Access Solution Includes:
F5 - AppDome Partnership F5 and AppDome share a vision that BYOD users should benefit from secure access to enterprise internal portals for increased productivity. With the exponential growth of mobile
Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure
Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure Security studies back up this fact: It takes less than 20
Software Defined Networking Hva kan du starte med i dag? Geir Åge Leirvik HP Networking
Software Defined Networking Hva kan du starte med i dag? Geir Åge Leirvik HP Networking Agenda App Store keeping it simple HP apps: Protector Optimizer Lync Partners apps: BlueCat DNS KEMP Community apps:
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Securing end devices
Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Securing the Virtualized Data Center With Next-Generation Firewalls
Securing the Virtualized Data Center With Next-Generation Firewalls Data Center Evolution Page 2 Security Hasn t Kept Up with Rate Of Change Configuration of security policies are manual and slow Weeks
Business Case for NFV/SDN Programmable Networks
Business Case for NFV/SDN Programmable Networks Executive Summary Traditional network designs are failing to meet service providers business requirements. The designs lead to complex hardware stacks, over-provisioning
Orchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain
SESSION ID: ANF-T08 Orchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain Sean Doherty VP Technology Partnerships and Alliances Symantec @SeandDInfo Deb Banerjee Chief Architect,
Protecting Your SDN and NFV Network from Cyber Security Vulnerabilities with Full Perimeter Defense
Protecting Your SDN and NFV Network from Cyber Security Vulnerabilities with Full Perimeter Defense Telco Systems and Celare in a nutshell Company overview Some of our customers Sister companies, subsidiary
"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"
To Study the Overall Cloud Computing Security Using Virtual Private Network. Aparna Gaurav Jaisingpure/Gulhane Email id: [email protected] Dr.D.Y.Patil Vidya Pratishthan s Dr. D.Y Patil College of
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
SDN and NFV in the WAN
WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network
Top virtualization security risks and how to prevent them
E-Guide Top virtualization security risks and how to prevent them There are multiple attack avenues in virtual environments, but this tip highlights the most common threats that are likely to be experienced
SOFTWARE DEFINED NETWORKING
SOFTWARE DEFINED NETWORKING Bringing Networks to the Cloud Brendan Hayes DIRECTOR, SDN MARKETING AGENDA Market trends and Juniper s SDN strategy Network virtualization evolution Juniper s SDN technology
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments
Enterprise-Grade Security from the Cloud
Datasheet Website Security Enterprise-Grade Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed security
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
Leveraging SDN and NFV in the WAN
Leveraging SDN and NFV in the WAN Introduction Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are two of the key components of the overall movement towards software defined
The Nexpose Expert System
Technical Paper The Nexpose Expert System Using an Expert System for Deeper Vulnerability Scanning Executive Summary This paper explains how Rapid7 Nexpose uses an expert system to achieve better results
SOFTWARE DEFINED NETWORKING: A PATH TO PROGRAMMABLE NETWORKS. Jason Kleeh September 27, 2012
SOFTWARE DEFINED NETWORKING: A PATH TO PROGRAMMABLE NETWORKS Jason Kleeh September 27, 2012 What if you could Build your next data center optimized for highest demands in flexibility, reliability, and
Best Practices for DanPac Express Cyber Security
March 2015 - Page 1 Best Practices for This whitepaper describes best practices that will help you maintain a cyber-secure DanPac Express system. www.daniel.com March 2015 - Page 2 Table of Content 1 Introduction
Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 [email protected] 866-605- 6328 www.redhawksecurity.
Planning Guide for Penetration Testing John Pelley, CISSP, ISSAP, MBCI Long seen as a Payment Card Industry (PCI) best practice, penetration testing has become a requirement for PCI 3.1 effective July
SOFTWARE-DEFINED NETWORKING (SDN)/NFV AND ACADEMIC RESEARCH IN CANADA
SOFTWARE-DEFINED NETWORKING (SDN)/NFV AND ACADEMIC RESEARCH IN CANADA CHRIS BACHALO CTO JUNIPER CANADA APR 28, 2015 INDUSTRY TRENDS WHITE BOX Reliable software still needed Feature / function Cost savings
OPC UA vs OPC Classic
OPC UA vs OPC Classic By Paul Hunkar Security and Communication comparison In the world of automation security has become a major source of discussion and an important part of most systems. The OPC Foundation
Threat-Centric Security for Service Providers
Threat-Centric Security for Service Providers Enabling Open & Programmable Networks Sam Rastogi, Service Provider Security Product Marketing, Security Business Group Bill Mabon, Network Security Product
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need
SECURING YOUR MODERN DATA CENTER WITH CHECK POINT
SECURING YOUR MODERN DATA CENTER WITH CHECK POINT Javier Hijas Security Architect Check Point Europe 1 Agenda 1 2 3 4 What Questions is a modern / Answers datacenter Datacenter protection evolution Security
Biznet GIO Cloud Connecting VM via Windows Remote Desktop
Biznet GIO Cloud Connecting VM via Windows Remote Desktop Introduction Connecting to your newly created Windows Virtual Machine (VM) via the Windows Remote Desktop client is easy but you will need to make
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Open Networking User Group SD-WAN Requirements Demonstration Talari Test Results
Open Networking User Group SD-WAN Requirements Demonstration Talari Test Results May 13, 2015 Talari 550 South Winchester Suite 550 San Jose, CA 95128 www.talari.com Defining the Software Defined WAN The
Advanced Security Services with Trend Micro Deep Security and VMware NSX Platforms
A Trend Micro Technical White Paper June 2015 Advanced Security Services with Trend Micro and VMware NSX Platforms >> This document is targeted at virtualization, security, and network architects interested
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
XPROBE. Building Efficient Network Discovery Tools. Fyodor Yarochkin
XPROBE Building Efficient Network Discovery Tools Fyodor Yarochkin Outline Introduction Some motivating stories: real-life attacks Efficient network mapping with Lazy Scan mode Layer 7 extensions Scripting
