SlideShare a Scribd company logo
1 of 31
Polymorphic Attacks on Data-in-
Motion Require a New Security
Approach From Both the Service
Provider and End User
Bill Balmer, May 11, 2016
© 2016 ADVA Optical Networking. All rights reserved. Confidential.2
Scary Slide - Municipal Attacks
• Industries
• 63% of healthcare companies breached last year (RSA 2016)
• 76% of energy utilities breached in past year (Dark Reading
2016)
• Municipal attacks
• Cyber attack NY Dam
• 2013 Bowman Avenue Dam used for flood control
• Unauthorized access to the city’s computer system
• Smart grids
• 2012 – Televent Canada (Schneider Electric)
• Breached firewall
• San Francisco
• 2015 - 40 fiber breaches
• FBI - attackers posed as service provider employees
• The purpose of the breaches has not been determined
© 2016 ADVA Optical Networking. All rights reserved. Confidential.3
Polymorphic Attacks
• Polymorphism means “change the appearance of”
• Mutation engines are bundled with Trojans and other types of malware
• Usually hidden in encrypted payloads
• Constantly mutates to avoid pattern recognition
• Polymorphic attacks are the new standard with DDoS attacks used to
cover the data breach. (North America and EMEA: The Continual
Threat to Digital Brands for 2015)
• Criminals are learning from government projects
like the Stuxnet worm used in Iran nuclear plant and NSA man-in-the-
middle attacks exposure through Snowden
• Rogue nations are hiring CaaS (Criminals-as-a-Service)
© 2016 ADVA Optical Networking. All rights reserved. Confidential.4
The Key to Getting In
• Stealing credentials is the point of most attacks
• Vendors
• Exploit
• Target through HAVAC
• Employees
• Poor password control
• Bribes
• Exploits in security
• IPSec aggressive mode
• Force changes in passwords make users simplify passwords
• Poorly configured servers
• Physical intrusion – man-in-the-middle
• Fiber bending
• Wiring closets
© 2016 ADVA Optical Networking. All rights reserved. Confidential.5
Basic Cryptographic Goals
Confidentiality (privacy) - "Encryption"
Man-in-the-middle cannot understand message
from Alice.
Diffie-Hellman key agreement/exchange is
arbitrated in the background.
Man-in-the-middle could try to manipulate key
exchange to Bob.
Solution: authenticity - “authentication"
Alice and Bob can be sure that they are really
connected.
© 2016 ADVA Optical Networking. All rights reserved. Confidential.6
Man-in-the-Middle Attacks
© 2016 ADVA Optical Networking. All rights reserved. Confidential.7
• Distributed networks instead of
a single entry point
• Complex setup based on
exception rules
• Susceptible to DDoS attacks
overloading the processor
• Becomes a tool for polymorphic
attacks
• Firewalls are becoming the
police tape around a crime
scene – CISO AT&T*
Firewall Limitations
*Carrier Network Security Strategies – Heavy Reading Dec 2 2015
© 2016 ADVA Optical Networking. All rights reserved. Confidential.8
Next Generation Firewalls Will Be Dynamic
© 2016 ADVA Optical Networking. All rights reserved. Confidential.9
Data Analytics
• Number of days before breach is
recognized: Verizon 288 days and
Microsoft 244 days*
• Data analytics can**
• Shorten discovery period
• Help enforce policies
• Through detection
• Reduce staff
• Through automation
*Carrier Network Security Strategies – Heavy Reading Dec 2, 2015
** TechForum Security Conference March 24, 2016
© 2016 ADVA Optical Networking. All rights reserved. Confidential.10
What To Do?
• Amit Yoran, RSA president, said no fancy, expensive product can
guarantee an organization’s safety: “There are no silver bullets in
security.”
• “The shift from volumetric towards application-layer attacks and
from single vector to polymorphic attacks is bound to accelerate –
and service provider defenses need to evolve in line with that.”
• Each layer of transport for data in motion has its own challenges
© 2016 ADVA Optical Networking. All rights reserved. Confidential.11
Encryption Options
Securing Data in Motion
Physical
PHY
Data link
MAC
Network layer
IP/MPLS
Transport layer
TCP, UDP
Application, presentation,
session layer
Bits
Frames
Packets
Segments
Data
1
2
3
4
7
6
5
OSIlayer
IPSec
TLS, SSH
In-flight Encryption
MACsec
© 2016 ADVA Optical Networking. All rights reserved. Confidential.12
Secure Network Infrastructure Model
Security on Every Network Layer
• FSP 3000 family
• Infrastructure encryption
• Optical point to point
• Cloud computing
• Data center connectivity
• Over 200 networks
IPLayer
Ethernet
Layer
Optical
Layer
Physical connectivity
Virtual connectivity
Virtual connectivity
BSI approval
R&D & NVF activities
Solution available
© 2016 ADVA Optical Networking. All rights reserved. Confidential.13
Examples of Fiber Tapping
Joshe Ruppe Security Researcher
Techtarget: Optical network security: Inside a fiber-optic hack
© 2016 ADVA Optical Networking. All rights reserved. Confidential.14
Secure Data Center Interconnection
Innovation for high-performance cloud data center interconnect
Application
Technology
• Highest performance
• Lowest latency
• Maximum security
Benefits
Solution
FSP 3000
© 2016 ADVA Optical Networking. All rights reserved. Confidential.15
Encryption using G.709 / OTH Link Protocol
1 …….…. 14 15 ….… 16 17 ………………………………. 3824 3825 .… 4080
1
2
3
4
Column number
OTU/ODU
overhead
ROW
OPU
overhead
Encryption
FEC
areaEncrypted Payload
OCH Overhead Och payload FEC data
Optical channel frame structure
5TCE link protocol
• Supports
• OTU-2
• OTU-2e
• OTU-2f
AES 256
encrypted
OPU2 payload
Automatic
key exchange
using DH
Key Exchange
© 2016 ADVA Optical Networking. All rights reserved. Confidential.16
Media Transport Network - Solution
Metro
Core
Event site
Event site
Event site
TV studio A TV studio B
Metro
© 2016 ADVA Optical Networking. All rights reserved. Confidential.17
Optical Security Suite
Encryption
Security-hardened software
Physical layer monitoring
Power tracking and intrusion detection
Time-domain reflectometer (OTDR/cable integrity)
Access line monitoring (ALM)
Continuity check messages (CCM)
RADIUS
Secure shell
SNMPv3
AES-256
Authentication
Diffie-Hellman
A complete and integrated solution leveraging advanced technology
122842636
© 2016 ADVA Optical Networking. All rights reserved. Confidential.18
Secure Network Infrastructure Model
Security on Every Network Layer
• FSP 150 family
• 1.75 million deployed
• Infrastructure encryption
• ProNID™
• ProVM™
• Enterprise encryption
• MacSec Plus
• Certes CryptoFlow™ NFV
• Who?
• Service providers
• Local government
• Branch offices – small count
• Cloud providers
IPlayer
Ethernet
layer
Optical
layer
Physical connectivity
Virtual connectivity
Virtual connectivity
BSI approval
R&D & NFV activities
Solution available
© 2016 ADVA Optical Networking. All rights reserved. Confidential.19
• Highest flexibility
• Minimum overhead
• Maximum security
Secure Access in Virtual Networks
Innovation for flexible cloud access in fixed and mobile applications
Application
Technology
Benefits
Solution
FSP 150
© 2016 ADVA Optical Networking. All rights reserved. Confidential.20
IPsec Challenges – Technical Aspects
• Delay is measured
in msec instead of
µsec
Latency
• Up to 50% addi-
tional bandwidth
overhead
Efficiency
• No wire-speed
performance up to
100Gbit/s
Scalability
• Exposed
sender/reciever
Confidentiality
• Only works for
IP traffic
Compatibility
• Issues scale
linearly with links
and endpoints
Complexity
© 2016 ADVA Optical Networking. All rights reserved. Confidential.21
Flexible MACsec Data Encryption and Integrity
• L2 secure connectivity using standard MACsec format with VLAN bypass
• Works with MEF E-Line (EPL and EVPL)
• Supports point-to-point and hub-and-spoke secure connectivity
• Encryption directly at the Ethernet layer – line rate
• State of the art symmetric encryption algorithms: AES 128, AES 256
• Low latency, bandwidth efficiency
• Dynamic and secure key exchange
• Password-authenticated Diffie-Hellman algorithm
• Intrusion proof key storage
ConnectGuardTM Ethernet – flexibility and data security altogether
© 2016 ADVA Optical Networking. All rights reserved. Confidential.22
MACsec+ No Need for SP Switch Decrypt
Site A
LAN
LAN
Site B
© 2016 ADVA Optical Networking. All rights reserved. Confidential.23
XG210C
XG210C
XG210C
Clinic
Regional hospital
Satellite hospital
Regional hospital
Regional hospital
ProVM-C
ProNID-C
Case Study – WellSpan Healthcare
© 2016 ADVA Optical Networking. All rights reserved. Confidential.24
Secure Network Infrastructure Model
Security on Every Network Layer
• Enterprise encryption
• ProVM™
• FSP 150 vSE
• Certes CryptoFlow™
• Layer 3 and 7
• Cloud applications
• Key management
• Who?
• Big box companies
• Branch offices
• Universities
• Local government
IPlayer
Ethernet
layer
Optical
layer
Physical connectivity
Virtual connectivity
Virtual connectivity
BSI approval
R&D & NFV activities
Solution available
© 2016 ADVA Optical Networking. All rights reserved. Confidential.25
Future Proofing Security through Virtualization
• Firewalls – future
• Interactive updates from security centers
• Matching patterns of attacks
• Updates to combat new threats
• Data analytics
• Remote probes
• Live monitoring
• Filters / traps
• Application security
• Micro-segmentation to limit damage
• Policy management
© 2016 ADVA Optical Networking. All rights reserved. Confidential.26
VNF Versus Assured VNF
Example: Encryption








Encryption as VNF
OVS
Storage NetworkCompute
IPsec
Encryption as an assured VNF
OVS
Storage NetworkCompute
Latency
Cost @ 1Gbit/s
Cost @ 10Mbit/s
Resource consumption
© 2016 ADVA Optical Networking. All rights reserved. Confidential.27
A1
A2
Physical test, monitoring, enforcement
L2/L3 low latency, sync, MACSEC
Hardware data plane
The Assured Model
Multicore x86 server
Flexible
L3/4/7
service
creation
Network interface
Compute host
infrastructure
VM-1 VM-2
VNF VNF
VM-2 VM-2
VNF VNF
N1
Hardware
equivalent
OVS
ovs
© 2016 ADVA Optical Networking. All rights reserved. Confidential.28
IP Layer ProVM/Security NFV
© 2016 ADVA Optical Networking. All rights reserved. Confidential.29
IP Layer ProVM/Security NFV
© 2016 ADVA Optical Networking. All rights reserved. Confidential.30
• How we travel
• Get ticket online or at the airport
• Prove who you are
• Go through security checkpoint
• Get into terminal
• Boarding checks
• Do you belong on the flight?
Security Is a Fact of Life
How data should travel
Thank You
IMPORTANT NOTICE
The content of this presentation is strictly confidential. ADVA Optical Networking is the exclusive owner or licensee of the content, material, and information in this
presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited.
The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or
implied. ADVA Optical Networking shall not be responsible for and disclaims any liability for any loss or damages, including without limitation, direct, indirect, incidental,
consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation.
Copyright © for the entire content of this presentation: ADVA Optical Networking.

More Related Content

What's hot

From Waterfall to Agile - Managing Disruptive Change Without Disrupting the B...
From Waterfall to Agile - Managing Disruptive Change Without Disrupting the B...From Waterfall to Agile - Managing Disruptive Change Without Disrupting the B...
From Waterfall to Agile - Managing Disruptive Change Without Disrupting the B...ADVA
 
Oscilloquartz's Acquisition of Time4 Systems
Oscilloquartz's Acquisition of Time4 SystemsOscilloquartz's Acquisition of Time4 Systems
Oscilloquartz's Acquisition of Time4 SystemsADVA
 
Scalable and Secure Connectivity for Seamless Cloud Evolution
Scalable and Secure Connectivity for Seamless Cloud EvolutionScalable and Secure Connectivity for Seamless Cloud Evolution
Scalable and Secure Connectivity for Seamless Cloud EvolutionADVA
 
Mitigating Security Risk in Practical vCPE Solutions
Mitigating Security Risk in Practical vCPE SolutionsMitigating Security Risk in Practical vCPE Solutions
Mitigating Security Risk in Practical vCPE SolutionsADVA
 
How to Quantum-Secure Optical Networks
 How to Quantum-Secure Optical Networks How to Quantum-Secure Optical Networks
How to Quantum-Secure Optical NetworksADVA
 
Drawing Customers North - September, 2016
Drawing Customers North - September, 2016Drawing Customers North - September, 2016
Drawing Customers North - September, 2016ADVA
 
DCI: It's a Brave New World
DCI: It's a Brave New WorldDCI: It's a Brave New World
DCI: It's a Brave New WorldADVA
 
Building a Sustainable Future
Building a Sustainable FutureBuilding a Sustainable Future
Building a Sustainable FutureADVA
 
Introducing the ADVA FSP 150-GE110 Pro Series
Introducing the ADVA FSP 150-GE110 Pro SeriesIntroducing the ADVA FSP 150-GE110 Pro Series
Introducing the ADVA FSP 150-GE110 Pro SeriesADVA
 
Forget the Layers: NFV Is About Dynamism
Forget the Layers: NFV Is About DynamismForget the Layers: NFV Is About Dynamism
Forget the Layers: NFV Is About DynamismADVA
 
ADVA Optical Networking and Arista Networks Joint OOLS Demo
ADVA Optical Networking and Arista Networks Joint OOLS DemoADVA Optical Networking and Arista Networks Joint OOLS Demo
ADVA Optical Networking and Arista Networks Joint OOLS DemoADVA
 
The Poacher and the Gamekeeper: Synchronization Delivery and Assurance
The Poacher and the Gamekeeper: Synchronization Delivery and AssuranceThe Poacher and the Gamekeeper: Synchronization Delivery and Assurance
The Poacher and the Gamekeeper: Synchronization Delivery and AssuranceADVA
 
SDN and Photonics for Dynamic Cloud Connectivity
SDN and Photonics for Dynamic Cloud Connectivity SDN and Photonics for Dynamic Cloud Connectivity
SDN and Photonics for Dynamic Cloud Connectivity ADVA
 
Assuring Superior VNF Performance at the Network Edge
Assuring Superior VNF Performance at the Network EdgeAssuring Superior VNF Performance at the Network Edge
Assuring Superior VNF Performance at the Network EdgeADVA
 
Making NFV-Based Business Services Secure
Making NFV-Based Business Services SecureMaking NFV-Based Business Services Secure
Making NFV-Based Business Services SecureADVA
 
Transforming Packet Networks With Open Optical Transport
Transforming Packet Networks With Open Optical TransportTransforming Packet Networks With Open Optical Transport
Transforming Packet Networks With Open Optical TransportADVA
 
Verizon Selects Ensemble Connector to Deliver VNS uCPE
Verizon Selects Ensemble Connector to Deliver VNS uCPEVerizon Selects Ensemble Connector to Deliver VNS uCPE
Verizon Selects Ensemble Connector to Deliver VNS uCPEADVA
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerADVA
 
Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the...
Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the...Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the...
Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the...ADVA
 
5G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 20165G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 2016Daniel Sproats
 

What's hot (20)

From Waterfall to Agile - Managing Disruptive Change Without Disrupting the B...
From Waterfall to Agile - Managing Disruptive Change Without Disrupting the B...From Waterfall to Agile - Managing Disruptive Change Without Disrupting the B...
From Waterfall to Agile - Managing Disruptive Change Without Disrupting the B...
 
Oscilloquartz's Acquisition of Time4 Systems
Oscilloquartz's Acquisition of Time4 SystemsOscilloquartz's Acquisition of Time4 Systems
Oscilloquartz's Acquisition of Time4 Systems
 
Scalable and Secure Connectivity for Seamless Cloud Evolution
Scalable and Secure Connectivity for Seamless Cloud EvolutionScalable and Secure Connectivity for Seamless Cloud Evolution
Scalable and Secure Connectivity for Seamless Cloud Evolution
 
Mitigating Security Risk in Practical vCPE Solutions
Mitigating Security Risk in Practical vCPE SolutionsMitigating Security Risk in Practical vCPE Solutions
Mitigating Security Risk in Practical vCPE Solutions
 
How to Quantum-Secure Optical Networks
 How to Quantum-Secure Optical Networks How to Quantum-Secure Optical Networks
How to Quantum-Secure Optical Networks
 
Drawing Customers North - September, 2016
Drawing Customers North - September, 2016Drawing Customers North - September, 2016
Drawing Customers North - September, 2016
 
DCI: It's a Brave New World
DCI: It's a Brave New WorldDCI: It's a Brave New World
DCI: It's a Brave New World
 
Building a Sustainable Future
Building a Sustainable FutureBuilding a Sustainable Future
Building a Sustainable Future
 
Introducing the ADVA FSP 150-GE110 Pro Series
Introducing the ADVA FSP 150-GE110 Pro SeriesIntroducing the ADVA FSP 150-GE110 Pro Series
Introducing the ADVA FSP 150-GE110 Pro Series
 
Forget the Layers: NFV Is About Dynamism
Forget the Layers: NFV Is About DynamismForget the Layers: NFV Is About Dynamism
Forget the Layers: NFV Is About Dynamism
 
ADVA Optical Networking and Arista Networks Joint OOLS Demo
ADVA Optical Networking and Arista Networks Joint OOLS DemoADVA Optical Networking and Arista Networks Joint OOLS Demo
ADVA Optical Networking and Arista Networks Joint OOLS Demo
 
The Poacher and the Gamekeeper: Synchronization Delivery and Assurance
The Poacher and the Gamekeeper: Synchronization Delivery and AssuranceThe Poacher and the Gamekeeper: Synchronization Delivery and Assurance
The Poacher and the Gamekeeper: Synchronization Delivery and Assurance
 
SDN and Photonics for Dynamic Cloud Connectivity
SDN and Photonics for Dynamic Cloud Connectivity SDN and Photonics for Dynamic Cloud Connectivity
SDN and Photonics for Dynamic Cloud Connectivity
 
Assuring Superior VNF Performance at the Network Edge
Assuring Superior VNF Performance at the Network EdgeAssuring Superior VNF Performance at the Network Edge
Assuring Superior VNF Performance at the Network Edge
 
Making NFV-Based Business Services Secure
Making NFV-Based Business Services SecureMaking NFV-Based Business Services Secure
Making NFV-Based Business Services Secure
 
Transforming Packet Networks With Open Optical Transport
Transforming Packet Networks With Open Optical TransportTransforming Packet Networks With Open Optical Transport
Transforming Packet Networks With Open Optical Transport
 
Verizon Selects Ensemble Connector to Deliver VNS uCPE
Verizon Selects Ensemble Connector to Deliver VNS uCPEVerizon Selects Ensemble Connector to Deliver VNS uCPE
Verizon Selects Ensemble Connector to Deliver VNS uCPE
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network Layer
 
Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the...
Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the...Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the...
Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the...
 
5G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 20165G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 2016
 

Similar to Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Both the Service Provider and End User

Scalable, Secure, Programmable – Cloud Connectivity for the Future
Scalable, Secure, Programmable – Cloud Connectivity for the FutureScalable, Secure, Programmable – Cloud Connectivity for the Future
Scalable, Secure, Programmable – Cloud Connectivity for the FutureADVA
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...Amazon Web Services
 
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Cisco Russia
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Jiunn-Jer Sun
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayCisco Canada
 
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and CiscoWho Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and CiscoThousandEyes
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Canada
 
Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud ADVA
 
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?Zscaler
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança Cisco do Brasil
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksNTS UK - Part of Capita
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01Sergiy Pitel
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastrukturyPROIDEA
 

Similar to Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Both the Service Provider and End User (20)

Scalable, Secure, Programmable – Cloud Connectivity for the Future
Scalable, Secure, Programmable – Cloud Connectivity for the FutureScalable, Secure, Programmable – Cloud Connectivity for the Future
Scalable, Secure, Programmable – Cloud Connectivity for the Future
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
 
3.2_Securing Microgrids, Substations, and Distributed Autonomous Systems_Lawr...
3.2_Securing Microgrids, Substations, and Distributed Autonomous Systems_Lawr...3.2_Securing Microgrids, Substations, and Distributed Autonomous Systems_Lawr...
3.2_Securing Microgrids, Substations, and Distributed Autonomous Systems_Lawr...
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus Day
 
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and CiscoWho Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
 
Netpluz corp presentation 2020
Netpluz corp presentation 2020Netpluz corp presentation 2020
Netpluz corp presentation 2020
 
ECI - The Elastic Network - winds of change
ECI - The Elastic Network - winds of changeECI - The Elastic Network - winds of change
ECI - The Elastic Network - winds of change
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Accessing remote networks
Accessing remote networksAccessing remote networks
Accessing remote networks
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
 
Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud
 
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager Networks
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
 
Innovation Connected
Innovation ConnectedInnovation Connected
Innovation Connected
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
 

More from ADVA

Industrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clockIndustrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clockADVA
 
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...ADVA
 
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350  SePRC™ optical cesium clockIndustry's longest holdover with the OSA 3350  SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clockADVA
 
Addressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructureAddressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructureADVA
 
Precise and assured timing for enterprise networks
Precise and assured timing for enterprise networksPrecise and assured timing for enterprise networks
Precise and assured timing for enterprise networksADVA
 
Introducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demandIntroducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demandADVA
 
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)ADVA
 
Sync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with softwareSync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with softwareADVA
 
Meet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networkingMeet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networkingADVA
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionADVA
 
Quantum threat: How to protect your optical network
Quantum threat: How to protect your optical networkQuantum threat: How to protect your optical network
Quantum threat: How to protect your optical networkADVA
 
Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...ADVA
 
Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)ADVA
 
Open optical edge connecting mobile access networks
Open optical edge connecting mobile access networksOpen optical edge connecting mobile access networks
Open optical edge connecting mobile access networksADVA
 
Introducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchorIntroducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchorADVA
 
Meet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation deviceMeet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation deviceADVA
 
Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™ADVA
 
10G edge technology for outdoor environments
10G edge technology for outdoor environments10G edge technology for outdoor environments
10G edge technology for outdoor environmentsADVA
 
The quantum age - secure transport networks
The quantum age - secure transport networksThe quantum age - secure transport networks
The quantum age - secure transport networksADVA
 
From leased lines to optical spectrum services
From leased lines to optical spectrum servicesFrom leased lines to optical spectrum services
From leased lines to optical spectrum servicesADVA
 

More from ADVA (20)

Industrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clockIndustrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clock
 
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
 
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350  SePRC™ optical cesium clockIndustry's longest holdover with the OSA 3350  SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
 
Addressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructureAddressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructure
 
Precise and assured timing for enterprise networks
Precise and assured timing for enterprise networksPrecise and assured timing for enterprise networks
Precise and assured timing for enterprise networks
 
Introducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demandIntroducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demand
 
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
 
Sync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with softwareSync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with software
 
Meet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networkingMeet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networking
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryption
 
Quantum threat: How to protect your optical network
Quantum threat: How to protect your optical networkQuantum threat: How to protect your optical network
Quantum threat: How to protect your optical network
 
Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...
 
Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)
 
Open optical edge connecting mobile access networks
Open optical edge connecting mobile access networksOpen optical edge connecting mobile access networks
Open optical edge connecting mobile access networks
 
Introducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchorIntroducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchor
 
Meet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation deviceMeet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation device
 
Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™
 
10G edge technology for outdoor environments
10G edge technology for outdoor environments10G edge technology for outdoor environments
10G edge technology for outdoor environments
 
The quantum age - secure transport networks
The quantum age - secure transport networksThe quantum age - secure transport networks
The quantum age - secure transport networks
 
From leased lines to optical spectrum services
From leased lines to optical spectrum servicesFrom leased lines to optical spectrum services
From leased lines to optical spectrum services
 

Recently uploaded

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Both the Service Provider and End User

  • 1. Polymorphic Attacks on Data-in- Motion Require a New Security Approach From Both the Service Provider and End User Bill Balmer, May 11, 2016
  • 2. © 2016 ADVA Optical Networking. All rights reserved. Confidential.2 Scary Slide - Municipal Attacks • Industries • 63% of healthcare companies breached last year (RSA 2016) • 76% of energy utilities breached in past year (Dark Reading 2016) • Municipal attacks • Cyber attack NY Dam • 2013 Bowman Avenue Dam used for flood control • Unauthorized access to the city’s computer system • Smart grids • 2012 – Televent Canada (Schneider Electric) • Breached firewall • San Francisco • 2015 - 40 fiber breaches • FBI - attackers posed as service provider employees • The purpose of the breaches has not been determined
  • 3. © 2016 ADVA Optical Networking. All rights reserved. Confidential.3 Polymorphic Attacks • Polymorphism means “change the appearance of” • Mutation engines are bundled with Trojans and other types of malware • Usually hidden in encrypted payloads • Constantly mutates to avoid pattern recognition • Polymorphic attacks are the new standard with DDoS attacks used to cover the data breach. (North America and EMEA: The Continual Threat to Digital Brands for 2015) • Criminals are learning from government projects like the Stuxnet worm used in Iran nuclear plant and NSA man-in-the- middle attacks exposure through Snowden • Rogue nations are hiring CaaS (Criminals-as-a-Service)
  • 4. © 2016 ADVA Optical Networking. All rights reserved. Confidential.4 The Key to Getting In • Stealing credentials is the point of most attacks • Vendors • Exploit • Target through HAVAC • Employees • Poor password control • Bribes • Exploits in security • IPSec aggressive mode • Force changes in passwords make users simplify passwords • Poorly configured servers • Physical intrusion – man-in-the-middle • Fiber bending • Wiring closets
  • 5. © 2016 ADVA Optical Networking. All rights reserved. Confidential.5 Basic Cryptographic Goals Confidentiality (privacy) - "Encryption" Man-in-the-middle cannot understand message from Alice. Diffie-Hellman key agreement/exchange is arbitrated in the background. Man-in-the-middle could try to manipulate key exchange to Bob. Solution: authenticity - “authentication" Alice and Bob can be sure that they are really connected.
  • 6. © 2016 ADVA Optical Networking. All rights reserved. Confidential.6 Man-in-the-Middle Attacks
  • 7. © 2016 ADVA Optical Networking. All rights reserved. Confidential.7 • Distributed networks instead of a single entry point • Complex setup based on exception rules • Susceptible to DDoS attacks overloading the processor • Becomes a tool for polymorphic attacks • Firewalls are becoming the police tape around a crime scene – CISO AT&T* Firewall Limitations *Carrier Network Security Strategies – Heavy Reading Dec 2 2015
  • 8. © 2016 ADVA Optical Networking. All rights reserved. Confidential.8 Next Generation Firewalls Will Be Dynamic
  • 9. © 2016 ADVA Optical Networking. All rights reserved. Confidential.9 Data Analytics • Number of days before breach is recognized: Verizon 288 days and Microsoft 244 days* • Data analytics can** • Shorten discovery period • Help enforce policies • Through detection • Reduce staff • Through automation *Carrier Network Security Strategies – Heavy Reading Dec 2, 2015 ** TechForum Security Conference March 24, 2016
  • 10. © 2016 ADVA Optical Networking. All rights reserved. Confidential.10 What To Do? • Amit Yoran, RSA president, said no fancy, expensive product can guarantee an organization’s safety: “There are no silver bullets in security.” • “The shift from volumetric towards application-layer attacks and from single vector to polymorphic attacks is bound to accelerate – and service provider defenses need to evolve in line with that.” • Each layer of transport for data in motion has its own challenges
  • 11. © 2016 ADVA Optical Networking. All rights reserved. Confidential.11 Encryption Options Securing Data in Motion Physical PHY Data link MAC Network layer IP/MPLS Transport layer TCP, UDP Application, presentation, session layer Bits Frames Packets Segments Data 1 2 3 4 7 6 5 OSIlayer IPSec TLS, SSH In-flight Encryption MACsec
  • 12. © 2016 ADVA Optical Networking. All rights reserved. Confidential.12 Secure Network Infrastructure Model Security on Every Network Layer • FSP 3000 family • Infrastructure encryption • Optical point to point • Cloud computing • Data center connectivity • Over 200 networks IPLayer Ethernet Layer Optical Layer Physical connectivity Virtual connectivity Virtual connectivity BSI approval R&D & NVF activities Solution available
  • 13. © 2016 ADVA Optical Networking. All rights reserved. Confidential.13 Examples of Fiber Tapping Joshe Ruppe Security Researcher Techtarget: Optical network security: Inside a fiber-optic hack
  • 14. © 2016 ADVA Optical Networking. All rights reserved. Confidential.14 Secure Data Center Interconnection Innovation for high-performance cloud data center interconnect Application Technology • Highest performance • Lowest latency • Maximum security Benefits Solution FSP 3000
  • 15. © 2016 ADVA Optical Networking. All rights reserved. Confidential.15 Encryption using G.709 / OTH Link Protocol 1 …….…. 14 15 ….… 16 17 ………………………………. 3824 3825 .… 4080 1 2 3 4 Column number OTU/ODU overhead ROW OPU overhead Encryption FEC areaEncrypted Payload OCH Overhead Och payload FEC data Optical channel frame structure 5TCE link protocol • Supports • OTU-2 • OTU-2e • OTU-2f AES 256 encrypted OPU2 payload Automatic key exchange using DH Key Exchange
  • 16. © 2016 ADVA Optical Networking. All rights reserved. Confidential.16 Media Transport Network - Solution Metro Core Event site Event site Event site TV studio A TV studio B Metro
  • 17. © 2016 ADVA Optical Networking. All rights reserved. Confidential.17 Optical Security Suite Encryption Security-hardened software Physical layer monitoring Power tracking and intrusion detection Time-domain reflectometer (OTDR/cable integrity) Access line monitoring (ALM) Continuity check messages (CCM) RADIUS Secure shell SNMPv3 AES-256 Authentication Diffie-Hellman A complete and integrated solution leveraging advanced technology 122842636
  • 18. © 2016 ADVA Optical Networking. All rights reserved. Confidential.18 Secure Network Infrastructure Model Security on Every Network Layer • FSP 150 family • 1.75 million deployed • Infrastructure encryption • ProNID™ • ProVM™ • Enterprise encryption • MacSec Plus • Certes CryptoFlow™ NFV • Who? • Service providers • Local government • Branch offices – small count • Cloud providers IPlayer Ethernet layer Optical layer Physical connectivity Virtual connectivity Virtual connectivity BSI approval R&D & NFV activities Solution available
  • 19. © 2016 ADVA Optical Networking. All rights reserved. Confidential.19 • Highest flexibility • Minimum overhead • Maximum security Secure Access in Virtual Networks Innovation for flexible cloud access in fixed and mobile applications Application Technology Benefits Solution FSP 150
  • 20. © 2016 ADVA Optical Networking. All rights reserved. Confidential.20 IPsec Challenges – Technical Aspects • Delay is measured in msec instead of µsec Latency • Up to 50% addi- tional bandwidth overhead Efficiency • No wire-speed performance up to 100Gbit/s Scalability • Exposed sender/reciever Confidentiality • Only works for IP traffic Compatibility • Issues scale linearly with links and endpoints Complexity
  • 21. © 2016 ADVA Optical Networking. All rights reserved. Confidential.21 Flexible MACsec Data Encryption and Integrity • L2 secure connectivity using standard MACsec format with VLAN bypass • Works with MEF E-Line (EPL and EVPL) • Supports point-to-point and hub-and-spoke secure connectivity • Encryption directly at the Ethernet layer – line rate • State of the art symmetric encryption algorithms: AES 128, AES 256 • Low latency, bandwidth efficiency • Dynamic and secure key exchange • Password-authenticated Diffie-Hellman algorithm • Intrusion proof key storage ConnectGuardTM Ethernet – flexibility and data security altogether
  • 22. © 2016 ADVA Optical Networking. All rights reserved. Confidential.22 MACsec+ No Need for SP Switch Decrypt Site A LAN LAN Site B
  • 23. © 2016 ADVA Optical Networking. All rights reserved. Confidential.23 XG210C XG210C XG210C Clinic Regional hospital Satellite hospital Regional hospital Regional hospital ProVM-C ProNID-C Case Study – WellSpan Healthcare
  • 24. © 2016 ADVA Optical Networking. All rights reserved. Confidential.24 Secure Network Infrastructure Model Security on Every Network Layer • Enterprise encryption • ProVM™ • FSP 150 vSE • Certes CryptoFlow™ • Layer 3 and 7 • Cloud applications • Key management • Who? • Big box companies • Branch offices • Universities • Local government IPlayer Ethernet layer Optical layer Physical connectivity Virtual connectivity Virtual connectivity BSI approval R&D & NFV activities Solution available
  • 25. © 2016 ADVA Optical Networking. All rights reserved. Confidential.25 Future Proofing Security through Virtualization • Firewalls – future • Interactive updates from security centers • Matching patterns of attacks • Updates to combat new threats • Data analytics • Remote probes • Live monitoring • Filters / traps • Application security • Micro-segmentation to limit damage • Policy management
  • 26. © 2016 ADVA Optical Networking. All rights reserved. Confidential.26 VNF Versus Assured VNF Example: Encryption         Encryption as VNF OVS Storage NetworkCompute IPsec Encryption as an assured VNF OVS Storage NetworkCompute Latency Cost @ 1Gbit/s Cost @ 10Mbit/s Resource consumption
  • 27. © 2016 ADVA Optical Networking. All rights reserved. Confidential.27 A1 A2 Physical test, monitoring, enforcement L2/L3 low latency, sync, MACSEC Hardware data plane The Assured Model Multicore x86 server Flexible L3/4/7 service creation Network interface Compute host infrastructure VM-1 VM-2 VNF VNF VM-2 VM-2 VNF VNF N1 Hardware equivalent OVS ovs
  • 28. © 2016 ADVA Optical Networking. All rights reserved. Confidential.28 IP Layer ProVM/Security NFV
  • 29. © 2016 ADVA Optical Networking. All rights reserved. Confidential.29 IP Layer ProVM/Security NFV
  • 30. © 2016 ADVA Optical Networking. All rights reserved. Confidential.30 • How we travel • Get ticket online or at the airport • Prove who you are • Go through security checkpoint • Get into terminal • Boarding checks • Do you belong on the flight? Security Is a Fact of Life How data should travel
  • 31. Thank You IMPORTANT NOTICE The content of this presentation is strictly confidential. ADVA Optical Networking is the exclusive owner or licensee of the content, material, and information in this presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited. The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or implied. ADVA Optical Networking shall not be responsible for and disclaims any liability for any loss or damages, including without limitation, direct, indirect, incidental, consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation. Copyright © for the entire content of this presentation: ADVA Optical Networking.

Editor's Notes

  1. The following OTU/ODU overhead bytes are used for the dynamic key exchange in our ADVA AES256 encryption solution: 10TCE-PCN-16GU+AES100G: GCC2 5TCE-PC(T)N-10G+AES10G: GCC1/2
  2. Security-Hardened Software: RADIUS support for secure and centralized user access management Secure Shell protocol (SSH) for encrypted network management communication SNMPv3 as latest available SNMP version providing inherent security mechanisms for network management communication Cable Diagnostics or Cable Integrity Check on RJ-45 Copper Ports of the FSP 150 product family
  3. MACsec+ extends MACsec to support end-to-end secure connectivity in a MACsec unaware network. Secure the EVC payload while leaving the transport VLANs in the clear
  4. OVOpen vSwitch (OVS) Addresses one of the big questions of decentralized platforms: IS-IOR – Is similar to the OVS, but operates in hardware, requiring no hypervisor involvement since the intel technology takes advantage of the PCI-e data plane and can recognize the Data Packet and place it directly into the appropriate VM’s memory. DMA – Direct Memory Access. ProVM will allow the Service Provider to not only test the network but also test between the VNFs. This will great aid in trouble shooting problems with service chaining. Over the next several years NFV deployments are going to be new to the Service Providers. Detailed analysis well help not only save cost but build better operation procedures for deployment and troubleshooting. A single truck roll for an unidentified fault will cost more than the difference between a ProVM and a COTS platform.