NOVA Cyber Security Technology Research & Development Centre (NOVA CS-TRDC)



Similar documents
WEB APPLICATION FIREWALLS: DO WE NEED THEM?

ددم یلع اي PROFILE Name: Date of Birth: Marriage: Job experience: WORKING EXPERIENCE December 2014 Present MCI and April 2013 December 2014

Security Testing Summary of Next-Generation Enterprise VoIP Solution: Unify Inc. OpenScape SBC V8

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

SourceFireNext-Generation IPS

PENTEST. Pentest Services. VoIP & Web.

Unified Threat Management, Managed Security, and the Cloud Services Model

Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Embedded Java & Secure Element for high security in IoT systems

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

This ESG White Paper was commissioned by Blue Coat and is distributed under license from ESG.

Reducing Configuration Complexity with Next Gen IoT Networks

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

SIP Proxy. SIP Proxy. Bicom SYSTEMS. SIP Proxy... Advanced Simplicity

Integrating Web Application Security into the IT Curriculum

Guidance Regarding Skype and Other P2P VoIP Solutions

On-Premises DDoS Mitigation for the Enterprise

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Implementing Cisco IOS Network Security

CTS2134 Introduction to Networking. Module Network Security

Network Performance Monitoring at Minimal Capex

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense

Secure Cloud-Ready Data Centers Juniper Networks

IBM QRadar Security Intelligence April 2013

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

ASTRI s Internet-of-Things (IoT) Gateway and Management Platform

Hillstone Intelligent Next Generation Firewall

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Assuria from ZeroDayLab

Solution Review: Siemens Enterprise Communications OpenScape Session Border Controller

Open Source Security Tool Overview

INFORMATION SECURITY TRAINING CATALOG (2015)

Voice over IP Security

Security Coordination with IF-MAP

Critical Controls for Cyber Security.

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

June 2014 WMLUG Meeting Kali Linux

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

Application Security Testing

Analyzing HTTP/HTTPS Traffic Logs

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Intro to Firewalls. Summary

Solutions and IT services for Oil-Gas & Energy markets

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Securing Unified Communications for Healthcare

System Specification. Author: CMU Team

ARM mbed IoT Device Platform. November 3 rd, 2014

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Effective Methods to Detect Current Security Threats

Cyan Networks Secure Web vs. Websense Security Gateway Battle card

A Model-based Methodology for Developing Secure VoIP Systems

DDoS Protection Technology White Paper

SMART IoT PROTOCOLS. Creating the Living Network. Chonggang Wang Innovation Lab, InterDigital Communications. December 8, 2014

Bachelor of Information Technology (Network Security)

Adobe Systems Incorporated

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Preparing VoIP and Unified Communications Systems for IPv6 Technical Summary September 2014

The Protection Mission a constant endeavor

Ingate Firewall/SIParator SIP Security for the Enterprise

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

ICTTEN8195B Evaluate and apply network security

FISMA / NIST REVISION 3 COMPLIANCE

Radware s Behavioral Server Cracking Protection

How To Protect A Web Application From Attack From A Trusted Environment

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Securing Smart City Platforms IoT, M2M, Cloud and Big Data

Network Intrusion Analysis (Hands-on)

VOIP Attacks On The Rise

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Mitigating the Security Risks of Unified Communications

The Internet of Things

VoIP Wars: Destroying Jar Jar Lync

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

Oracle s Unified Communications Infrastructure Solution. Delivering Secure, Reliable, and Scalable Unified Communications Services

Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release

Active Response: Automated Risk Reduction or Manual Action?

Voice over IP Communications

<Insert Picture Here> Oracle Web Services Manager (WSM)

Update On Smart Grid Cyber Security

White Paper. avaya.com 1. Table of Contents. Starting Points

Technology Highlights Of. (Medusa)

Architecture of a new DDoS and Web attack Mitigation System for Data Center

Transcription:

NOVA Cyber Security Technology Research & Development Centre (NOVA CS-TRDC)

48 years experience, first and largest private telecom and software development company in Turkey Develops ICT software solutions for more than 200 global operators The biggest ICT system integrator company in the region 2200+ employees - 750+ highly qualified R&D engineers (25% with MSc & PhD) Turkey s software export champion 65 scientific articles (journal papers, conference precedeings) in three years First runner-up of ICT sector in Turkey s patent classification @2013, Over 70 yearly patent applications R&D 4G Development, IMS, VoIP services, Web applications, HW SW Communications, Cyber Security Products etc. 2

NETAŞ Telecommunication R&D Departments Local custom product and solution design for Intl. ICT Software R&D The pioneer of software export, Turkey s largest VoIP R&D High quality, best class SW R&D for 45+ yrs to multinational companies ICT R&D Defense R&D 3 Network/Application Layer Security Products & Services Cyber Security R&D Mission critical communication SW/HW design for defense organisation

NOVA Cyber Security Tecnology Research&Development Centre Mission: Foster excellence through collaborative effort to delivers products and services that significantly enhances security and continuity of critical ICT systems that serves society and the businesses. Research Areas - Architecture for Scalable, Higly Available Network Data Processing with Low Latency - Big Data Analytics for Network/Applications, Machine Learning and Anomaly Detection, Behaviour Analysis - Media Communication Security, End-to-End Security - IoT/M2M System Architecture and Security Products and Services - VoIP & Web Application Firewalls - VoIP & Web Application Vulnarability Scanning Tools - Media Security Platform as secure communication infrastructure - Penetration Test for Enterprises ( Network, VoIP, Web )

NOVA CS-TRDC - Capabilities Formal SDLC Practices Platform Development Intrusion Detection System Development Protocol & Service Development Machine Learning and Anomaly Detection Behaviour Analysis M2M/IoT Architecture with Security Focus LAN/WAN Networking Virtualization, NFV Protocol Complience Testing Automated Testing Stress and Volume Testing

NOVA Cyber Security Services and Products (Vertical and Horizantal) Security Services Vulnerability Detection Tools Nova IOT Spy (IOT Vulnerability Detection and Forensics, 5G) Nova MMA (Mobile Malware Analysis) Nova 4.5G-SPY (IMS application security scanner) Near Real Time Central Control Unit Security Products Nova STATS (Network & VoIP & Web Statistical Alarm System) Nova SOC (Reputation based Security Operation Center for V & W Gate) Nova V-OMS (VoIP Operational Management System) Nova V-IDPS (VoIP Intrusion Detection & Prevention Systems) Nova V-SPY (VoIP Application Security Scanner) Nova W-SPY (Web Application Security Scanner) Real Time Nova MSP (MSP Embedded HW Security) Nova MSP (Media Security Platform) Nova V-GATE (VoIP Application Firewall) Nova W-GATE (Web Application Firewall) Green On Going 2015 / Blue New 2016 / Orange Planned 2016

NOVA Cyber Security Developments via 5G TA8 / TA13 / TA19 APP. SECURİTY Nova SOC ( Security Operation Management ) CENTRAL CORE Nova V-OMS (Operational Management System) Nova SPY ( Vulnarbilty Analysis) SYSTEM SECURE? GET CONNECTED Nova GATE (VoIP & Web Application Firewall) Nova M2M (Secure M2M Platform) Nova STATS ( Network Analytics) Nova MSP (Secure Media Communication ) BIG DATA SECURE MEDIA

THANK YOU

Netaş NOVA Cyber Security Department Research and Product Development Firewalls, IDS/IPS, M2M Security, Mobile Malware, Vulnerability Analsis, Fuzzer Tools, Monitoring and Big Data Security Analytics about VoIP, Web, Mobile Platform Development Common Security Platform, Media Security Platform and onem2m Supported Secure Field Infrastructure Platform Anomaly Detection and Prevention Anomaly Detection and Prevention by using Machine Learning especially regarding both network and application layer security. Deep Packet Inspection Penetration and Software Verification Test Capabilities IOT Vulnerability Detection and Forensics, VoIP Application Security Scanner, Web Application Security Scanner Capturing and Analyzing Network Netflow, VoIP and Web traffic based on Deep Packet Inspection.

VoIP, VoWiFi, VoLTE Solutions Security Nova Product and Projects - VoIP NOVA V-GATE (VoIP Application Firewall) is a modular, transparent, high performance VoIP firewall aimed towards protecting VoIP systems from high costly, damaging attacks by preventing known and unknown application-layer attacks such as toll fraud, premium rate services, Dos/DDoS/TDoS, brute force, fuzzing. NOVA V-SPY (VoIP Vulnerability Scanning and Analysis Tool) is a modular, high performance vulnerability scanning framework aimed towards helping penetration testers and administrators that evaluate the security of VoIP applications. VoIP IDS / IPS is our new project to prevent toll and traffic frauds and also service abuse especially. VoIP Monitoring is our new project to monitor VoIP systems on both performance and security sides. Competencies Platform Development Linux (Ubuntu) System Administration Test scripting (Python) Database (PostgreDB, MongoDB) Virtualization (VMware), Web Services Development C, C++ SOAP, J2EE, JSP Protocol & Service Development Telecom standards (SIP, XML, SOAP, and HTTP) Network (TCP/IP, Signaling), Mitigate Fuzzing, DDoS, Flood Attacks Fault Mgmt. (SNMP), Load Balancing, High Availability Big Data Analytics, Machine Learning and Anomaly Detection End-to-End UC and VoIP Security Testing (DDoS, different attack tests) Performance Testing (Call Generator, Stress Tests)

Nova - Mobile Security Nova Product and Projects Mobile NOVA MSP (Media Security Platform) ensures that your devices and operating systems communicate independently and securely. Nova MSP provides secure communication for both client-to-server and client-to-client communication even in unsecure networks and also offers secure media transfer enriched with various security methods and flexible crypto algorithm usage, enabling secure voice and video communication, file and message transfer, and whiteboard usage. Mobile Security Scanner is our roadmap project which includes vulnerability scanning framework to test mobile applications. Mobile Malware Analysis is our roadmap project to detect mobile malware applications and malicious behavioral. Competencies Mobile Application Development (Android/iOS) End-to-End Secure Media Secure Voice/Video and Instant Messaging Communication Platforms File Encryption WebRTC Technology Encryption Algorithms: AES128/192/256, Blowfish, TripleDES Smart Card: RSA 2048/4096 SHA 512 (CC EAL5+) Web Application Development ( Windows/ Android/ Macintosh) Scalable Server Architecture Secure Web Socket TLS Connection

Nova Web Security Our Product and Projects Nova W-GATE (Web Application Firewall) is an application that detects and prevents attacks made to HTTP / HTTPS / HTML5 / SOAP / XML-RPC / Web Service applications. Nova W-SPY (Web Vulnerability Scanning and Analysis Tool) is a Web application security scanner tool including Web Crawler, Vulnerability Analyzer, Intercepting Proxy, Web RTC Support, Web Sockets Support, Comprehensive Reporting features. Competencies Multi Process Framework Reverse Proxy SSL/TLS Utilities VLAN and Network Management Module Web Threat Detection Techniques Web Threat Protection Techniques Web Services(XML and SOAP) Load Balancing Policy Management PostgreSQL and MySQL Hibernate (ORM + OGM) AngularJS and Bootstarp Web Crawler Vulnerability Analyzer Intercepting Proxy Web RTC Support C, C++ SOAP, J2EE, JSP

Big Data Security Statistical Approach Nova Product and Projects Big Data Nova STATS (Network, VoIP and Web Behavioral Anomaly Detection Tool) is holistic behavioral anomaly detection tool project by using network flow data, VoIP and Web packets together. Nova SOC Phase 1 (Border Security Product Log Analyzer) is an orchestration and security operation center tool project to improve performance, security and compliance of security applications such as IP firewall, NGFW, Web and VoIP Application Firewall and IDS/IPS products. Competencies Network based Behavioral Anomaly Detection VoIP and Web Packet based Behavioral Anomaly Detection Packet Analysis Session Analysis Big Data Collection Big Data Management Big Data Feature Engineering and Analysis Big Data Sharing NetFlow Data Apache Big Data Tools Logging Load Balancing Security Policy and Rule Management and Optimization Compliance Audit

IOT, M2M Security Nova Product and Projects IOT, M2M Nova M2M Security (from local network to M2M Gateway and Core and Service Platform) Sensors communication and IP Connection via M2M Gateway while Core Centers controls sensors and applications via application plafform Nova M2M Service Security (Service Orchestration Platform Security) All services interactions and communications via Core, sensors communication being secure and encryted IOT Forensics Competencies onem2m Standartization by ETSI 6LowPAN Zigbee IPv4, IPv6 Layer protocols Restfull Architecture design COAP MQTT LWM2M SOA Forensics tools Attack Vectors generation and detction, prevention systems Encryption, trust and data integrity

Nova Penetration Test Services NOVA PENTEST SERVICES UC network, VoIP and Web applications IOT, M2M with Security Services and Consultancy test the applications, infrastructure and devices themselves to ensure they are protected from VoIP, WEB and Unified Communications-related attacks.