Data Security on Every Network Layer. Internet Security Days 2015, Phantasialand Brühl ADVA Optical Networking SE



Similar documents
Crypto WDM Surprise! Ari Salomaa, ADVA June 9, 2014

Q IFRS Financial Results. October 20, 2011 Martinsried/Munich, Germany

Panel: The Future of Datacenter Networking Software-Defined Networking (SDN) for Datacenter Interconnect and Cloud Computing

The Extension of Software-Defined Networking to Transport Networks

Software Defined Networking Real World Use Cases (Test bed at Marist/IBM)

Network Virtualization and SDN/OpenFlow for Optical Networks - EU Project OFELIA. Achim Autenrieth, Jörg-Peter Elbers ADVA Optical Networking SE

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

MPLS/SDN Intersections Next Generation Access Networks. Anthony Magee Advanced Technology ADVA Optical Networking MPLS & Ethernet World Congress 2013

Cybercrime: risks, penalties and prevention

Software Defined Optical Networks with Optical OpenFlow. Jörg-Peter Elbers, Achim Autenrieth ADVAnced Technology August 2012 Rev 1.

Software Defined Networking - Real World Use Cases (Test bed at Marist/IBM)

Compliance and Unified Communication

Security Intelligence

Information Security Policy

Perspectives on Cybersecurity in Healthcare June 2015

Packet Optical Transport (POT) Fred Ellefson, 2/3/2009

Better Together: Microsoft Office 365 & Symantec Office 365

Agenda. clock tower in old city of Neuchatel ADVA Optical Networking. All rights reserved.

How To Secure An Rsa Authentication Agent

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?

Safe and Secure Faxing with Dialogic Brooktrout Fax Boards

Cybersecurity. Are you prepared?

CONSUMER CREDIT DEFAULT RATES DECREASE IN SEPTEMBER 2015 ACCORDING TO THE S&P/EXPERIAN CONSUMER CREDIT DEFAULT INDICES

Please give me your feedback

Developments in cybercrime and cybersecurity

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

formerly Help Desk Authority Quest Free Network Tools User Manual

LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES

GRANULAR POLYSILICON TECHNOLOGY

Nokia Networks. security you can rely on

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

InsureTech 2015: Addressing cybersecurity and fraud in the ME insurance industry

Security in the Cloud an end to end Problem

National Credit Default Rates Continued Their Upward Trend in December 2014 According to the S&P/Experian Consumer Credit Default Indices

Protecting VMs in a Multi-Tenancy Environment

Symantec Managed Security Services The Power To Protect

Overcoming Security Challenges to Virtualize Internet-facing Applications

Information Not Collected and Retained

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: A SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN THE ASIA-PACIFIC REGION

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

RSA SecurID Software Token Security Best Practices Guide

Maritime Insurance Cyber Security Framing the Exposure. Tony Cowie May 2015

Using Web Security Services to Protect Portable Devices

CYBER SECURITY Audit, Test & Compliance

END- USER LICENSE AGREEMENT FOR Helpdesk Pilot

Self Help Guides. Setup Exchange with Outlook

IT Security Management 100 Success Secrets

Internet Governance and Cybersecurity Patrick Curry MACCSA

London LAWN Terms of Service

Cyber Security. John Leek Chief Strategist

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

Update on Elkem Solar. Torgeir Ulset VP Sales & Marketing, Elkem Solar Cleantech Agder

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

Network & Information Security Policy

IBM QRadar Security Intelligence April 2013

SOLUTION CARD WHITE PAPER. What is Fueling BYOD Adoption? Mobile Device Accountability and Control

Securing Endpoints without a Security Expert

Network Technology CMP-354-TE. TECEP Test Description

SafeNet Authentication Service

The Current State of Cyber Security

Security Analytics Engine 1.0. Help Desk User Guide

Business Continuity and Disaster Recovery Solutions in Government

Cybersecurity and the Threat to Your Company

The webinar will begin shortly

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

An Oracle White Paper December The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

IRIS Report Commercial Espionage: The Threat from Chinese Cyber Attacks Executive Summary

Boundary Encryption.cloud Deployment Process Overview

Introduction. Clarification of terminology

Synology NAS Server Mail Station User Guide

OECD PROJECT ON CYBER RISK INSURANCE

Evolving Threats and Attacks: A Cloud Service Provider s viewpoint. John Howie Senior Director Online Services Security and Compliance

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Storage Cloud Infrastructures

Bachelor of Information Technology (Network Security)

CFIR - Finance IT 2015 Cyber security September 2015

The Cancer Running Through IT Cybercrime and Information Security

Getting Started with Apple Pay on the Authorize.Net Platform

An Introduction to Cyber Crime and Terrorism: Problems and the Challenges

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Mitigating the Risks of Privilege-based Attacks in Federal Agencies

Cyber Security - What Would a Breach Really Mean for your Business?

A BUSINESS CASE FOR BEHAVIORAL ANALYTICS. White Paper

SPEAR PHISHING UNDERSTANDING THE THREAT

Installation Guide Wireless 4-Port USB Sharing Station. GUWIP204 Part No. M1172-a

End User Agreement. between. Secure Backup Limited. and [END USER]

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Insurance implications for Cyber Threats

Security whitepaper. CloudAnywhere.

Beyond the Hype: Advanced Persistent Threats

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re

How To Protect Your Data With A Senior Security Encryptor From Being Hacked By A Hacker

Dell One Identity Cloud Access Manager How To Deploy Cloud Access Manager in a Virtual Private Cloud

The UK cyber security strategy: Landscape review. Cross-government

Transcription:

Data Security on Every Network Layer Internet Security Days 2015, Phantasialand Brühl ADVA Optical Networking SE

Agenda Impact of Cyber Crime and Data Theft Financial Service Sector Production Industry Cloud Service Provider Secure Data Highways Customer references and Industry 4.0 model Conclusion 2

Impact of Cyber Crime & Data Theft 3

Financial Service Sector Payment card transactions are the most widespread non cash payment method used in the EU. In 2012, transactions amounted to 3.5 trillion. Criminals acquired 1.33 billion from PCF. This represents 38 cents lost to fraud for every 1.000 worth of transactions. THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2014 4

Industrie 4.0 Roland Berger March 2015 CYBER-SECURITY Managing threat scenarios in manufacturing companies Industry 4.0 radical digitization of production and of products, too leaves manufacturing companies even more vulnerable to cyber-assaults. Attack potential damage caused by cyber-crime is astronomical. At one British company, a single attack triggered losses of 950 million. Cybercrime Costs - Global Economy global economy 350 billion per year, of which the theft of intellectual property accounts for 120 billion Cybercrime Costs US Corporations large US corporations an average of 9 million per firm per annum 5

Cloud Computing Services As more (personal) data is being stored in the cloud, we can expect to see more attacks on cloud services with the goal to disrupt services for economic or political motives steal/access data including ransomware Cybercrime will make use of publicly offered lowest cost Cloud Compute Service and run Big Data Analytics to get most out of intercepted data. Since Snowden we know where and how the NSA and others intercept data on fiber optic cables between two geographically separated Data Center location cable landing stations internet exchanges in shared hosting facilities http://leaksource.info/2013/10/31/muscular-nsa-gchq-tapping-communications-links-to-google-yahoo-data-centers/ 6

Secure Data Highways 7

Are Today's Information Highways Secure? Server Server Storage SAN, HPC Switches DWDM Transport Storage Y-Bridge for service activities Fiber Coupling device Easy access to the data in fiber optic cables. 8

How to secure the Information Highways? Server Server Storage SAN, HPC Switches DWDM Transport Storage Protect all data using encryption on the optical / physical layer. 9

Optical Layer Encryption @ A Glance 8000 7000 10G encrypted links in operation* 7230 With the introduction of the 100G encryption, ADVA will doubled the 10G encrypted links in 2015 this trend is predicted to continue. 6000 5000 4000 3000 3330 In 2015 ADVA expects additional growth of 10G encrypted links introduced for Secure WAN Connectivity. 2000 1000 0 1696 831 6 171 2010 2011 2012 2013 2014 2015 As MSPs will launch Encryption as a Service (EaaS) the 10G equivalent links may triple in 2015. Data Center Connectivity is the main application Secure WAN Connectivity is relevant for large enterprise customers 10

Customer References & Industry 4.0 Model 11

All Data Real-Time connecting all locations and things HQ with main Data Center Factory/R&D Design (Partner) Regional HQ Factory R&D/ Supplier (Partner) Sales & Service Regional HQ Sales & Service Performant and reliable data exchange between all locations 12

Conclusion 13

Ethernet Layer Optical Layer IP Layer Secure Network Infrastructure Model security on every network layer virtual connectivity Machines & sensors R&D activities Number: >1.000-100.000 virtual connectivity Branch offices & partner locations solution available Number: 100-1000 physical connectivity Main locations & Data Centers BSI approval Number: 10-100 14

Thanks www.advaoptical.com IMPORTANT NOTICE The content of this presentation is strictly confidential. ADVA Optical Networking is the exclusive owner or licensee of the content, material, and information in this presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited. The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or implied. ADVA Optical Networking shall not be responsible for and disclaims any liability for any loss or damages, including without limitation, direct, indirect, incidental, consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation. Copyright for the entire content of this presentation: ADVA Optical Networking.