CONTENT SECURITY KRAMER S APPROACH TO SECURING DATA WITHIN WIRELESS TRANSMISSION KRAMER WHITE PAPER WWW.KRAMERUS.COM



Similar documents
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

COLLABORATION AV SYSTEMS IN THE AGE OF BYOD

Web Security Considerations

Topics in Network Security

The Secure Sockets Layer (SSL)

Configure WorkGroup Bridge on the WAP131 Access Point

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Wireless Encryption Protection

Network Security Part II: Standards

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin.

VIA HOW TO CONFIGURE A DMZ FOR SECURE COLLABORATION KRAMER WHITE PAPER. By Lars Duziack

Blaze Vault Online Backup. Whitepaper Data Security

Computer Networks. Secure Systems

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture

Aegis Padlock for business

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

SSL/TLS. What Layer? History. SSL vs. IPsec. SSL Architecture. SSL Architecture. IT443 Network Security Administration Instructor: Bo Sheng

The Security Behind Sticky Password

The next generation of knowledge and expertise Wireless Security Basics

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:

A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS

Chapter 7 Transport-Level Security

Transport Layer Security Protocols

The Hidden Dangers of Public WiFi

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Software Engineering 4C03 Research Project. An Overview of Secure Transmission on the World Wide Web. Sean MacDonald

chap18.wireless Network Security

Internet threats: steps to security for your small business

VPN Lesson 2: VPN Implementation. Summary

Chapter 10. Network Security

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

DataTrust Backup Software. Whitepaper Data Security. Version 6.8

Huawei WLAN Authentication and Encryption

WHITE PAPER Usher Mobile Identity Platform

The Misuse of RC4 in Microsoft Word and Excel

An Oracle White Paper December The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

March PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

BYOD: BRING YOUR OWN DEVICE.

Wireless Networks. Welcome to Wireless

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

Wireless Network Best Practices for General User

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

How To Protect A Wireless Lan From A Rogue Access Point

Beyond Retail: The Imperative for Ubiquitous Security in Wireless Printers

Securing your Linksys WRT54G

WIRELESS SECURITY IN (WI-FI ) NETWORKS

TLS and SRTP for Skype Connect. Technical Datasheet

Chapter 17. Transport-Level Security

How To Protect Your Data From Being Hacked

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Security Protocols/Standards

Overview. SSL Cryptography Overview CHAPTER 1

WLAN Information Security Best Practice Document

Communication Systems SSL

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Data Superhero Online Backup Whitepaper Data Security

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

How To Protect Your Network From A Hacker Attack On Zcoo Ip Phx From A Pbx From An Ip Phone From A Cell Phone From An Uniden Ip Pho From A Sim Sims (For A Sims) From A

Network Security Essentials Chapter 5

The increasing popularity of mobile devices is rapidly changing how and where we

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

National Cyber Security Month 2015: Daily Security Awareness Tips

Top 10 Security Checklist for SOHO Wireless LANs

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

Securing an IP SAN. Application Brief

The following chart provides the breakdown of exam as to the weight of each section of the exam.

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

More effective protection for your access control system with end-to-end security

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

Three attacks in SSL protocol and their solutions

Chapter 6 CDMA/802.11i

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Communication Security for Applications

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

The Importance of Wireless Security

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Question How do I access the router s web-based setup page? Answer

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Transcription:

CONTENT SECURITY KRAMER S APPROACH TO SECURING DATA WITHIN WIRELESS TRANSMISSION KRAMER WHITE PAPER WWW.KRAMERUS.COM

Executive Summary There has been a fundamental shift in how people collaborate in today s meeting spaces, and how they are also connecting to technology. Previously, meeting space participants only had to know which hardwired cable they needed to plug in to connect to a display or projector. Even so, those cables came with their own connectively issues; specifically, the HDMI cable. With HDMI, users were presented with connectivity challenges ranging from damaged pins to HDCP issues. Today s meeting space utilizes wireless connectivity, which neatly solves just about all of the aforementioned connectivity problems. However, that does not mean that wireless connectivity comes free of caveats! One of the biggest challenges facing wireless environments today is security; how do you secure content while transmitting it wirelessly from a bring your own device (BYOD) tablet or smartphone to a display or projector? Meeting participants may well wonder, What is my wireless presentation/collaboration solution doing to ensure my content is not vulnerable to cyber theft or hacking? According to research and advisory firm Gartner, Inc., A failure to manage information accurately can be fatal to the success of MDM programs. The company has also stated, By 2016, 20 percent of CIOs in regulated industries will lose their jobs for failing to implement the discipline of information governance successfully. Wireless presentation and collaboration products are growing in popularity, but most of them provide little to no security or protection against unauthorized users and data hacks. This paper will cover the processes by which Kramer s VIA technologies provide encryption and data protection for all content being transmitted and shared from tablets, smartphones, and laptops. 2 CONTENT SECURITY KRAMER S APPROACH TO SECURING DATA WITHIN WIRELESS TRANSMISSION

Content Security Wireless presentation and collaboration solutions have flooded the market place within the past 5 years. These products vary in capabilities from consumer-grade connectivity for in-home movies and photo sharing to commercial-grade connectivity meant for the rigors of an office or classroom setting. Unfortunately for today s consumer, the story we are not hearing is how this new generation of presentation/collaboration products will impact the security of corporate, educational, and institutional IT networks. Network security is a critical issue. It seems that each passing week brings fresh news of a hack into supposedly secure networks run by major retailers, colleges and universities, and even the federal government. Manufacturers have spent considerable time and money promoting features of their individual wireless solutions. Even so, virtually every manufacturer has ignored even the most basic levels of content security. Worse, many depend solely on existing security within a network such as firewalls to protect content, leaving you responsible for any possible data breaches. Through 2016, spending on governing information must increase to five times the current level to be successful. - Gartner Independent research has confirmed that organizations must invest in internal infrastructure to protect and secure data being transmitted over their networks, especially when BYODs are used. According to Gartner, it follows that every presentation/collaboration product connected to an enterprise network should have security at the top of its list of features and not just one layer, but multiple layers of secure connectivity. Kramer s VIA platform was specifically designed with the understanding that although wireless connectivity and collaboration is the wave of the future, the security of content cannot be ignored. Let s take a closer look at how VIA handles data security. CONTENT SECURITY KRAMER S APPROACH TO SECURING DATA WITHIN WIRELESS TRANSMISSION 3

Kramer VIA Data Protection Technology Wireless Protection Normally, VIA Collage, VIA Campus and VIA Connect PRO would be connected to a thirdparty Wi-Fi access point. These devices provide one level of secure communication through the Wi-Fi Protected Access 2 (WPA2) protocol. WPA2 combines the Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP) and Advanced Encryption Standard (AES) to dynamically generate 128, 192, or 256-bit cryptographic keys each time someone logs in wirelessly to a VIA session. (For wireless access points using the older WPA standard or mixed WPA/WPA2 modes, the Temporal Key Integrity Protocol (TKIP) provides 128-bit keys for every packet.) Protecting Communications Through the Network with Encryption Within VIA Collage, VIA Campus and VIA Connect PRO, another layer of secure communication is present with the Transport Layer Security (TLS) 1.2 protocol, both for authentication and for data flowing in and out of VIA. TLS replaces the Secure Socket Layer, an earlier form of security for electronic commerce through Web (HTTP) pages. TLS protocols provide communication security over a computer network by using X.509 certificates, which negotiate symmetric session keys that are then used to encrypt data flowing between the parties. This becomes the backbone of the Kramer VIA encryption process. By implementing the TLS Record Protocol, VIA also provides connection security with an encryption method (the Data Encryption Standard (DES)), while the TLS Handshake Protocol (Figure 2) allows each VIA unit and user to authenticate each other and to negotiate an encryption algorithm and cryptographic keys before data is exchanged. By using TLS, a secure connection is created within the VIA Collage, VIA Campus and VIA Connect PRO between client software and server software. 4 CONTENT SECURITY KRAMER S APPROACH TO SECURING DATA WITHIN WIRELESS TRANSMISSION

Application (HTTP,...) Session (TLS) Transport (TCP) Protocol Application Alert ChangeCipherSpec Handshake Network Data Link Physical Record Fragmentation Compression (opt) Integrity Authentication Encryption Figure 2 As mentioned earlier, the Advanced Encryption Standard provides 128, 192, or 256-bit cryptographic keys. To date, AES-192 and AES-256 ciphers have not been cracked in extensive, repeated tests by the National Security Agency (NSA). Accordingly, the combination of WPA2/AES and VIA s built-in TLS 1.2 encryption offers a very high level of security for every collaboration session to all mobile/wireless participants. Existing firewalls and VIA s TLS implementation provide equal protection to participants logged in through LAN connections. (Figure 3) Even so, it is possible that a so-called brute force attack could be attempted. Institutions that handle sensitive material, such as proprietary information or financial data often prefer to implement even more robust security measures. One such measure would be to choose passwords with at least 16 characters, mixing letters, numbers, and symbols. Another would be to encrypt the actual files themselves. Public key exchange Hello! ENCRYPT y6uwsi DECRYPT Hello! Figure 3 CONTENT SECURITY KRAMER S APPROACH TO SECURING DATA WITHIN WIRELESS TRANSMISSION 5

This level of digital security of the material itself is referred to as File Server Security Level (FSSL) encryption, because it requires a considerable amount of time and effort to break the keys. These encryption keys convert any transmitted content from a BYOD device through a network into an unreadable cipher. This is done by applying a set of complex algorithms to the original content, converting the data into streams of seemingly random alphanumeric characters, only decipherable at the receiving end with the proper decryption keys. Not all Encryption Schemes are Created Equally It is important to note that there are several types of encryption schemes in use today, but not all of them are secure. Other solutions may use simplified algorithms that are easily broken using modern computing power; another point of vulnerability that must be considered by any IT manager adding a presentation/collaboration solution to their network. Kramer s VIA platform implements the most advanced data protection and security in the industry. Protection from the Outside World The operating systems in VIA solutions also incorporate Firewall protection to provide protection against malware and viruses. An additional layer of security is provided through the use of random room codes that are only visible to meeting participants who log-in through WPA2 connections or LANs. These room codes can be programmed to change automatically at pre-determined intervals, and can also be displayed on the collaboration platform log-in page or provided by different means (orally, texts, emails). (Figure 4) Room Name Nick Name Code 192.168.1.50 medibella 3175 Login Figure 4 6 CONTENT SECURITY KRAMER S APPROACH TO SECURING DATA WITHIN WIRELESS TRANSMISSION

Summary and Conclusion As you can see, there are 4 levels of security when using Kramer VIA Solutions. Aside from WPA-2 protection in wireless access points, Kramer VIA Solutions provide three additional levels of security, as follows: TLS 1.2 protection of communication on the network File Server Level Security of files and information sent on the network Windows firewall protection between the network and outside world BYOD devices are becoming more prevalent within corporate and classroom environments. The International Data Corporation (IDC) recently reported that the use and sales of smartphones and tablets will continue to rise with mobile device and app sales reaching $484 billion. More importantly, 18% of tablet sales will be to businesses. This is relevant data because it is a contributing factor to the integration of wireless connectivity products on client networks. As with any other presentation/collaboration product line, there are a multitude of different solutions to choose from and the selection process can seem overwhelming. Regardless of the in-room needs and business drivers, there is a shared concern that IT manager have, and that is content security. Be sure to consider network security issues and how exactly that specific product handles them. Taken together, the protections built-in to Kramer s VIA Collage, VIA Campus and VIA Connect PRO, in combination with secure wireless networks, company firewalls, and in many cases File Server Level Security, provide an extremely high level of security for meetings that keeps pace with the needs of today s corporate, educational, government, and institutional networks. CONTENT SECURITY KRAMER S APPROACH TO SECURING DATA WITHIN WIRELESS TRANSMISSION 7

About Kramer Since 1981, Kramer Electronics Ltd. has been a leading player and pioneer in the Pro AV industry. With 26 global offices across six continents and support and distribution in over 100 countries, Kramer offers an extensive and innovative Pro AV solutions portfolio for Corporate, Education, Houses of Worship, Government, Live Events, Healthcare, and more. For over three decades, Kramer has built its reputation on strong personal relationships with its customers and providing the highest level of service and support in the industry. Kramer has won numerous awards, including the 2013 Pioneer of AV Award at InfoComm in honor of its Founder, President & Chairman, Dr. Joseph Kramer. Kramer s award winning analog and IPdriven solutions for collaboration, streaming and control are at the forefront of an ever-evolving Pro AV industry. Kramer s consistent sales growth and expansion into new markets is a testament to the company s commitment to R&D and reliance on customer feedback. For more information, visit us at: www.kramerav.com KRAMER ELECTRONICS, Ltd. KRAMER ELECTRONICS USA, Inc. 3 Am VeOlamo St. Jerusalem, Israel, 9546303 Tel: + 972 73 265 0200 Fax: + 972 2 653 5369 E-mail: info@kramerel.com Web: www.kramerelectronics.com Headquarters 6 Route 173 West Clinton, NJ 08809, USA Tel: (908) 735 0018 (888) 275 6311 Fax: (908) 735 0515 Tech Support after 6pm EST: Tel: (888) 275 6311 E-mail: info@kramerus.com Web: www.kramerus.com 2016 Kramer Electronics, Ltd. All rights reserved. Reproduction in whole or in part without written permission is prohibited.