SlideShare ist ein Scribd-Unternehmen logo
1 von 13
1
Software Protection Is Becoming Mainstream Yuan Xiang Gu Irdeto, Canada
About Irdeto Founded in 1969 by Ir. Pieter den Toonder 1000 employees, over 500 customers Dual headquarters: Amsterdam and Beijing 25 offices around the world Part of Naspers, multinational media company  10.000 employees USD $3.7B revenue in FY10 Pay TV Solutions (CA, Middleware, Billing) Enable Broadcasters to become “Broadbanders” Content Management & Distribution for Any Screen Security Lifecycle Management for Any DeviceOver 3 billion software instances protected
Un-Trusted Environment Reality  4 Cloud Computing  Environments Un-trusted environments  are everywhere and even becoming more dominated in digital world Persistent Security on  un-trusted environments  is becoming  #1  concern Public Internet Consumer Devices & Home Networks & Internet of Things
New Challenges to Traditional Security 5 White-Box Security Dynamic Security Security of Un-Trusted Environment
Traditional Attacks Black Box Attack Grey Box Attack Man-In-The-Middle Attack (Indirect) Bob Alice Network Software Software Trusted Inside Box 6
White-Box Attacks Man-At-The-End Attack Bob is the Attacker Alice Software 7 Network Software
Just Like Security and Protection in Museum 8 Beijing’s Forbidden City  suffers break-in  Beijing’s Forbidden City  Robbed, May 11, 2011
Static Security vs Dynamic Security Dynamic Security Static Security 	Once static security breaks, the entire security is gone and hard to be restored Once dynamic security breaks, the security can be renewed and restored immediately in a planned way 9
Fundamental to Digital Asset Protection Tampering Analysis Data Flow Transforms Control Flow  Transforms Dynamic Integrity Verification White Box Crypto Stage 1a. Implement Attack Resistance Protect Digital Assets through fundamental enabling software security and services through the lifecycle  Dynamic Code Decryption Dynamic Code  Decryption Core Technology Defenses Stage 2. Monitor & Analyze Hacker Progress Stage 3. Deploy Counter-measures Stage 4. Respond to Attacks Stage 5. Renew Security  Anti-Debug  Stage 1b. Implement Attack Mitigation Software Diversity Software Diversity Attack Automation Attack Distribution Software Renewability Software Renewability Lifecycle  Security Digital AssetProtection  Protected Digital Asset Distributed and Consumed 10
Irdeto Technology Protects Beyond Media 11 Multi-Media ,[object Object]
 Film
 TVGames E-Maps E-Publications ,[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Security & Information Warfare : A global security issue
Cyber Security & Information Warfare  : A global security issueCyber Security & Information Warfare  : A global security issue
Cyber Security & Information Warfare : A global security issueVincent Joassin
 
Internet of things: dispelling common myths
Internet of things: dispelling common myths Internet of things: dispelling common myths
Internet of things: dispelling common myths Vish Nandlall
 
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?IoT Academy
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, EverywhereLINE Corporation
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsKenny Huang Ph.D.
 
Privacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsPrivacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsGerry Elman
 
Cyber Security Research Project Topics
Cyber Security Research Project TopicsCyber Security Research Project Topics
Cyber Security Research Project TopicsMatlab Simulation
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewSteven Russo
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chainaletarw
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't StopSophos
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoTWSO2
 

Was ist angesagt? (20)

Cyber Security in 2018
Cyber Security in 2018Cyber Security in 2018
Cyber Security in 2018
 
Cyber Security & Information Warfare : A global security issue
Cyber Security & Information Warfare  : A global security issueCyber Security & Information Warfare  : A global security issue
Cyber Security & Information Warfare : A global security issue
 
IoT security
IoT securityIoT security
IoT security
 
Internet of things: dispelling common myths
Internet of things: dispelling common myths Internet of things: dispelling common myths
Internet of things: dispelling common myths
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
FRONTIERS IN CRYPTOGRAPHY
FRONTIERS IN CRYPTOGRAPHYFRONTIERS IN CRYPTOGRAPHY
FRONTIERS IN CRYPTOGRAPHY
 
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, Everywhere
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
 
Privacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsPrivacy & Security for the Internet of Things
Privacy & Security for the Internet of Things
 
Cyber Security Research Project Topics
Cyber Security Research Project TopicsCyber Security Research Project Topics
Cyber Security Research Project Topics
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
 

Andere mochten auch

Jerry Park Profile
Jerry Park ProfileJerry Park Profile
Jerry Park ProfileJLPark
 
EASTWEST PR Credentials_China/HK updated Dec 9 2015
EASTWEST PR Credentials_China/HK updated Dec 9 2015EASTWEST PR Credentials_China/HK updated Dec 9 2015
EASTWEST PR Credentials_China/HK updated Dec 9 2015EASTWEST Public Relations
 
EASTWEST PR_China media landscape&CleanTech trends 2016
EASTWEST PR_China media landscape&CleanTech trends 2016EASTWEST PR_China media landscape&CleanTech trends 2016
EASTWEST PR_China media landscape&CleanTech trends 2016EASTWEST Public Relations
 
EASTWEST PR_Media Landscape/CleanTech India trends 2016
EASTWEST PR_Media Landscape/CleanTech India trends 2016EASTWEST PR_Media Landscape/CleanTech India trends 2016
EASTWEST PR_Media Landscape/CleanTech India trends 2016EASTWEST Public Relations
 

Andere mochten auch (6)

Jerry Park Profile
Jerry Park ProfileJerry Park Profile
Jerry Park Profile
 
Fortecstar
FortecstarFortecstar
Fortecstar
 
Communic asia 2011 media consumer survey
Communic asia 2011 media consumer surveyCommunic asia 2011 media consumer survey
Communic asia 2011 media consumer survey
 
EASTWEST PR Credentials_China/HK updated Dec 9 2015
EASTWEST PR Credentials_China/HK updated Dec 9 2015EASTWEST PR Credentials_China/HK updated Dec 9 2015
EASTWEST PR Credentials_China/HK updated Dec 9 2015
 
EASTWEST PR_China media landscape&CleanTech trends 2016
EASTWEST PR_China media landscape&CleanTech trends 2016EASTWEST PR_China media landscape&CleanTech trends 2016
EASTWEST PR_China media landscape&CleanTech trends 2016
 
EASTWEST PR_Media Landscape/CleanTech India trends 2016
EASTWEST PR_Media Landscape/CleanTech India trends 2016EASTWEST PR_Media Landscape/CleanTech India trends 2016
EASTWEST PR_Media Landscape/CleanTech India trends 2016
 

Ähnlich wie Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011

Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Nancy Nimmegeers
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersCrawsec
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx1SI19IS064TEJASS
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfssuser57b3e5
 
Security Challenges and Innovative Solutions for Securing a Complex World
Security Challenges and Innovative Solutions for Securing a Complex WorldSecurity Challenges and Innovative Solutions for Securing a Complex World
Security Challenges and Innovative Solutions for Securing a Complex WorldInfotecsGmbH
 
cyber security services | MasGlobal Services
cyber security services | MasGlobal Servicescyber security services | MasGlobal Services
cyber security services | MasGlobal ServicesMas Global Services
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SIMicrosoft Ideas
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014Anita Lösch
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationHans Klos
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 

Ähnlich wie Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011 (20)

Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
Security Challenges and Innovative Solutions for Securing a Complex World
Security Challenges and Innovative Solutions for Securing a Complex WorldSecurity Challenges and Innovative Solutions for Securing a Complex World
Security Challenges and Innovative Solutions for Securing a Complex World
 
cyber security services | MasGlobal Services
cyber security services | MasGlobal Servicescyber security services | MasGlobal Services
cyber security services | MasGlobal Services
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
NTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New WorldNTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New World
 
Sophos
SophosSophos
Sophos
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure Communication
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 

Mehr von EASTWEST Public Relations

How to engage employees using rewards and social media
How to engage employees using rewards and social mediaHow to engage employees using rewards and social media
How to engage employees using rewards and social mediaEASTWEST Public Relations
 
How to market a chemicals company in China using traditional and digital media.
How to market a chemicals company in China using traditional and digital media.How to market a chemicals company in China using traditional and digital media.
How to market a chemicals company in China using traditional and digital media.EASTWEST Public Relations
 
Impact on women's rights of the Global Gag Rule.
Impact on women's rights of the Global Gag Rule.Impact on women's rights of the Global Gag Rule.
Impact on women's rights of the Global Gag Rule.EASTWEST Public Relations
 
Impact on women's rights of the Global Gag Rule.
Impact on women's rights of the Global Gag Rule.Impact on women's rights of the Global Gag Rule.
Impact on women's rights of the Global Gag Rule.EASTWEST Public Relations
 
EASTWEST Public Relations Group Credentials
EASTWEST Public Relations Group Credentials EASTWEST Public Relations Group Credentials
EASTWEST Public Relations Group Credentials EASTWEST Public Relations
 
Strengthening universities' reputation in the global educational community
Strengthening universities' reputation in the global educational communityStrengthening universities' reputation in the global educational community
Strengthening universities' reputation in the global educational communityEASTWEST Public Relations
 
Morgan cars luxury china 2012 media coverage
Morgan cars   luxury china 2012 media coverageMorgan cars   luxury china 2012 media coverage
Morgan cars luxury china 2012 media coverageEASTWEST Public Relations
 
Digital Journalism In 2012 Survey Infographic
Digital Journalism In 2012 Survey InfographicDigital Journalism In 2012 Survey Infographic
Digital Journalism In 2012 Survey InfographicEASTWEST Public Relations
 
IEEE Standards Association 2012 Media Round Table - EASTWEST PR
IEEE Standards Association 2012 Media Round Table - EASTWEST PRIEEE Standards Association 2012 Media Round Table - EASTWEST PR
IEEE Standards Association 2012 Media Round Table - EASTWEST PREASTWEST Public Relations
 
Entrepreneur Organization Beijing - EO Global marketing awards entry
Entrepreneur Organization Beijing - EO Global marketing awards entryEntrepreneur Organization Beijing - EO Global marketing awards entry
Entrepreneur Organization Beijing - EO Global marketing awards entryEASTWEST Public Relations
 

Mehr von EASTWEST Public Relations (20)

How to engage employees using rewards and social media
How to engage employees using rewards and social mediaHow to engage employees using rewards and social media
How to engage employees using rewards and social media
 
How to market a chemicals company in China using traditional and digital media.
How to market a chemicals company in China using traditional and digital media.How to market a chemicals company in China using traditional and digital media.
How to market a chemicals company in China using traditional and digital media.
 
Impact on women's rights of the Global Gag Rule.
Impact on women's rights of the Global Gag Rule.Impact on women's rights of the Global Gag Rule.
Impact on women's rights of the Global Gag Rule.
 
Impact on women's rights of the Global Gag Rule.
Impact on women's rights of the Global Gag Rule.Impact on women's rights of the Global Gag Rule.
Impact on women's rights of the Global Gag Rule.
 
EASTWEST Public Relations Group Credentials
EASTWEST Public Relations Group Credentials EASTWEST Public Relations Group Credentials
EASTWEST Public Relations Group Credentials
 
EASTWEST PR Social Media Concept
EASTWEST PR Social Media ConceptEASTWEST PR Social Media Concept
EASTWEST PR Social Media Concept
 
Strengthening universities' reputation in the global educational community
Strengthening universities' reputation in the global educational communityStrengthening universities' reputation in the global educational community
Strengthening universities' reputation in the global educational community
 
Promoting Universities in China -
Promoting Universities in China - Promoting Universities in China -
Promoting Universities in China -
 
2013 - Social Media in China
2013 - Social Media in China2013 - Social Media in China
2013 - Social Media in China
 
Morgan cars luxury china 2012 media coverage
Morgan cars   luxury china 2012 media coverageMorgan cars   luxury china 2012 media coverage
Morgan cars luxury china 2012 media coverage
 
Digital Journalism In 2012 Survey Infographic
Digital Journalism In 2012 Survey InfographicDigital Journalism In 2012 Survey Infographic
Digital Journalism In 2012 Survey Infographic
 
IEEE Standards Association 2012 Media Round Table - EASTWEST PR
IEEE Standards Association 2012 Media Round Table - EASTWEST PRIEEE Standards Association 2012 Media Round Table - EASTWEST PR
IEEE Standards Association 2012 Media Round Table - EASTWEST PR
 
Unc chapel hill intern program 2012
Unc chapel hill intern program 2012Unc chapel hill intern program 2012
Unc chapel hill intern program 2012
 
Entrepreneur Organization Beijing - EO Global marketing awards entry
Entrepreneur Organization Beijing - EO Global marketing awards entryEntrepreneur Organization Beijing - EO Global marketing awards entry
Entrepreneur Organization Beijing - EO Global marketing awards entry
 
Why multinationals turn to weibo in china
Why multinationals turn to weibo in chinaWhy multinationals turn to weibo in china
Why multinationals turn to weibo in china
 
Weibo, social media phenomenon in China
Weibo, social media phenomenon in ChinaWeibo, social media phenomenon in China
Weibo, social media phenomenon in China
 
Weibo for b2 b business
Weibo for b2 b business Weibo for b2 b business
Weibo for b2 b business
 
Content marketing and optimization/SEO
Content marketing and optimization/SEOContent marketing and optimization/SEO
Content marketing and optimization/SEO
 
Entrepreneurship in China
Entrepreneurship in ChinaEntrepreneurship in China
Entrepreneurship in China
 
Chinese media & social media
Chinese media & social mediaChinese media & social media
Chinese media & social media
 

Kürzlich hochgeladen

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Kürzlich hochgeladen (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011

  • 1. 1
  • 2. Software Protection Is Becoming Mainstream Yuan Xiang Gu Irdeto, Canada
  • 3. About Irdeto Founded in 1969 by Ir. Pieter den Toonder 1000 employees, over 500 customers Dual headquarters: Amsterdam and Beijing 25 offices around the world Part of Naspers, multinational media company 10.000 employees USD $3.7B revenue in FY10 Pay TV Solutions (CA, Middleware, Billing) Enable Broadcasters to become “Broadbanders” Content Management & Distribution for Any Screen Security Lifecycle Management for Any DeviceOver 3 billion software instances protected
  • 4. Un-Trusted Environment Reality 4 Cloud Computing Environments Un-trusted environments are everywhere and even becoming more dominated in digital world Persistent Security on un-trusted environments is becoming #1 concern Public Internet Consumer Devices & Home Networks & Internet of Things
  • 5. New Challenges to Traditional Security 5 White-Box Security Dynamic Security Security of Un-Trusted Environment
  • 6. Traditional Attacks Black Box Attack Grey Box Attack Man-In-The-Middle Attack (Indirect) Bob Alice Network Software Software Trusted Inside Box 6
  • 7. White-Box Attacks Man-At-The-End Attack Bob is the Attacker Alice Software 7 Network Software
  • 8. Just Like Security and Protection in Museum 8 Beijing’s Forbidden City suffers break-in Beijing’s Forbidden City Robbed, May 11, 2011
  • 9. Static Security vs Dynamic Security Dynamic Security Static Security Once static security breaks, the entire security is gone and hard to be restored Once dynamic security breaks, the security can be renewed and restored immediately in a planned way 9
  • 10. Fundamental to Digital Asset Protection Tampering Analysis Data Flow Transforms Control Flow Transforms Dynamic Integrity Verification White Box Crypto Stage 1a. Implement Attack Resistance Protect Digital Assets through fundamental enabling software security and services through the lifecycle Dynamic Code Decryption Dynamic Code Decryption Core Technology Defenses Stage 2. Monitor & Analyze Hacker Progress Stage 3. Deploy Counter-measures Stage 4. Respond to Attacks Stage 5. Renew Security Anti-Debug Stage 1b. Implement Attack Mitigation Software Diversity Software Diversity Attack Automation Attack Distribution Software Renewability Software Renewability Lifecycle Security Digital AssetProtection Protected Digital Asset Distributed and Consumed 10
  • 11.
  • 13.
  • 14. E-Magazine
  • 15.
  • 16. Scripted App
  • 17. Network AppAny digitalized assets to be protected

Hinweis der Redaktion

  1. Apply our multi layer security to protect the Digital Asset better than any oneApply our Diversity to mitigateApply our renewability to updatesSLM , which is the category that ActiveTrust addresses is: A more dynamic model than traditional security modelsAssumes that the protection can be updated in the fieldAssumes that given enough investment by hackers, a protection solution will be crackedIt is gaining acceptance …Security requirements imposed by Studios mirror thisSome CW customers have partially implemented content protection schemes that reflect thisIt’s readily accepted when presented to prospects, influencers and owners/custodians of DA’sThis is similar to what we do in PAY-TV to protect the business model of our customers, in this case operators. In that case, we use:Smartcard or Cloaked CA, Flexi Flash technology for renewability,And Offer security services to protect our customersIn this case, we apply different technologies and protect different assets and business models but in the same manner.