SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
April, 2015
ADVA ConnectGuard
A New Era of Data Protection
© 2015 ADVA Optical Networking. All rights reserved. Confidential.2
Security Remains a Major Concern
© 2015 ADVA Optical Networking. All rights reserved. Confidential.3
ADVA ConnectGuard
Tamper Protection
Encryption
KeyManagement
Security Management
Optical
Ethernet
Diffie-Hellmann
Random Numbers
AES-256
Certification
Approval
Vulnerability Management
FSP 3000
FSP150
© 2015 ADVA Optical Networking. All rights reserved. Confidential.4
Encryption Options
Defense in Depth: Encryption
Physical
PHY
Data Link
MAC
Network Layer
IP/MPLS
Transport Layer
TCP, UDP
Application, Presentation,
Session Layer
Bits
Frames
Packets
Segments
Data
1
2
3
4
7
6
5
OSILayer
IPSec
TLS, SSH
In-flight Encryption
MACsec
© 2015 ADVA Optical Networking. All rights reserved. Confidential.5
ConnectGuard Security Solutions
LAN
SAN
Cluster
LAN
SAN
Cluster
LANHQ
LAN Main Office
100Gbit/sBandwidth10Mbit/s
1G - 10G
10G - 10G
nx 100G nx 100G
10G - 100G
1G - 10G
Branch B
LANBranch A
LAN Main Office LAN
10M - 1G 10M - 1G
10M - 1G
Dark Fiber
© 2015 ADVA Optical Networking. All rights reserved. Confidential.6
ADVA ConnectGuard Portfolio
FSP 3000
ADVA ConnectGuard Optical
FSP 150-GE110Pro Series
ADVA ConnectGuard Ethernet
Maximizing cybersecurity by implementing a complete framework
© 2015 ADVA Optical Networking. All rights reserved. Confidential.7
Data Security Beyond Encryption
Maximizing cybersecurity by implementing a complete framework
• Strong AES-256
• Minimum overhead
and latency
• Hardware-based,
true-random source
Advanced Encryption
Architecture
• Two distinctive sets
of keys
• Fast encryption key
rotation intervals
• Centralized key
management
Efficient
Key Management
• Protection against
physical tampering
• Immediate erasing
of critical security
information
• Manipulation-proof
Robust
Tamper Detection
• Vulnerability
management
processes
• Security-relevant
reporting
• Timely corrections
Vulnerability
Management
Thank You
mritter@advaoptical.com
IMPORTANT NOTICE
The content of this presentation is strictly confidential. ADVA Optical Networking is the exclusive owner or licensee of the content, material, and information in this
presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited.
The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or
implied. ADVA Optical Networking shall not be responsible for and disclaims any liability for any loss or damages, including without limitation, direct, indirect, incidental,
consequential and special damages,
alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation.
Copyright © for the entire content of this presentation: ADVA Optical Networking.

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

NETCONF Call Home
NETCONF Call Home NETCONF Call Home
NETCONF Call Home
 
How to Quantum-Secure Optical Networks
 How to Quantum-Secure Optical Networks How to Quantum-Secure Optical Networks
How to Quantum-Secure Optical Networks
 
White Box Optics: Will It Kill or Encourage Innovation?
White Box Optics: Will It Kill or Encourage Innovation?White Box Optics: Will It Kill or Encourage Innovation?
White Box Optics: Will It Kill or Encourage Innovation?
 
Performance Assurance for Cloud Applications
Performance Assurance for Cloud ApplicationsPerformance Assurance for Cloud Applications
Performance Assurance for Cloud Applications
 
Direct Detect Optical Layer for Ultimate DCI Flexibility
Direct Detect Optical Layer for Ultimate DCI FlexibilityDirect Detect Optical Layer for Ultimate DCI Flexibility
Direct Detect Optical Layer for Ultimate DCI Flexibility
 
5G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 20165G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 2016
 
ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...
 
A new benchmark for timing success - OSA 5412 and 5422 access grandmasters
A new benchmark for timing success - OSA 5412 and 5422 access grandmasters A new benchmark for timing success - OSA 5412 and 5422 access grandmasters
A new benchmark for timing success - OSA 5412 and 5422 access grandmasters
 
ADVA ALM: Advanced Link Monitoring Technology for Ultimate Fiber Assurance
ADVA ALM: Advanced Link Monitoring Technology for Ultimate Fiber AssuranceADVA ALM: Advanced Link Monitoring Technology for Ultimate Fiber Assurance
ADVA ALM: Advanced Link Monitoring Technology for Ultimate Fiber Assurance
 
Introducing the ADVA MicroMux™
Introducing the ADVA MicroMux™Introducing the ADVA MicroMux™
Introducing the ADVA MicroMux™
 
Transforming Packet Networks With Open Optical Transport
Transforming Packet Networks With Open Optical TransportTransforming Packet Networks With Open Optical Transport
Transforming Packet Networks With Open Optical Transport
 
FSP 150 ProVMe (P2.4): The Easy Route to Edge NFV
FSP 150 ProVMe (P2.4): The Easy Route to Edge NFVFSP 150 ProVMe (P2.4): The Easy Route to Edge NFV
FSP 150 ProVMe (P2.4): The Easy Route to Edge NFV
 
The New NFV Powerhouse
The New NFV Powerhouse The New NFV Powerhouse
The New NFV Powerhouse
 
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...
 
Real-Time 200Gbit/s PAM4 Transmission Over 80km SSMF Using Quantum-Dot Laser ...
Real-Time 200Gbit/s PAM4 Transmission Over 80km SSMF Using Quantum-Dot Laser ...Real-Time 200Gbit/s PAM4 Transmission Over 80km SSMF Using Quantum-Dot Laser ...
Real-Time 200Gbit/s PAM4 Transmission Over 80km SSMF Using Quantum-Dot Laser ...
 
Drawing Customers North - September, 2016
Drawing Customers North - September, 2016Drawing Customers North - September, 2016
Drawing Customers North - September, 2016
 
Network Functions Virtualization – Our Strategy
Network Functions Virtualization – Our StrategyNetwork Functions Virtualization – Our Strategy
Network Functions Virtualization – Our Strategy
 
Making NFV Easy
Making NFV EasyMaking NFV Easy
Making NFV Easy
 
Transforming optical networking with AI
Transforming optical networking with AITransforming optical networking with AI
Transforming optical networking with AI
 
Phase Delivery Over PTP Unaware Networks
Phase Delivery Over PTP Unaware NetworksPhase Delivery Over PTP Unaware Networks
Phase Delivery Over PTP Unaware Networks
 

Andere mochten auch

dwdm
 dwdm dwdm
dwdm
g d
 
DWDM Presentation
DWDM PresentationDWDM Presentation
DWDM Presentation
ayodejieasy
 
IV WTON 2015 - Strategies for Future Flexible Optical Transceivers
IV WTON 2015 - Strategies for Future Flexible Optical TransceiversIV WTON 2015 - Strategies for Future Flexible Optical Transceivers
IV WTON 2015 - Strategies for Future Flexible Optical Transceivers
CPqD
 
Datacryptor Ethernet Layer 2 Rel 4.5
Datacryptor Ethernet Layer 2 Rel 4.5Datacryptor Ethernet Layer 2 Rel 4.5
Datacryptor Ethernet Layer 2 Rel 4.5
Eugene Sushchenko
 

Andere mochten auch (19)

Introducing the Future of Data Center Interconnect Networks
Introducing the Future of Data Center Interconnect NetworksIntroducing the Future of Data Center Interconnect Networks
Introducing the Future of Data Center Interconnect Networks
 
Michigan Collaboration Summit - Washtenaw Community College
Michigan Collaboration Summit - Washtenaw Community CollegeMichigan Collaboration Summit - Washtenaw Community College
Michigan Collaboration Summit - Washtenaw Community College
 
dwdm
 dwdm dwdm
dwdm
 
DWDM Presentation
DWDM PresentationDWDM Presentation
DWDM Presentation
 
Secure, High Performance Transport Networks Based on WDM Technology
Secure, High Performance Transport Networks Based on WDM TechnologySecure, High Performance Transport Networks Based on WDM Technology
Secure, High Performance Transport Networks Based on WDM Technology
 
IV WTON 2015 - Strategies for Future Flexible Optical Transceivers
IV WTON 2015 - Strategies for Future Flexible Optical TransceiversIV WTON 2015 - Strategies for Future Flexible Optical Transceivers
IV WTON 2015 - Strategies for Future Flexible Optical Transceivers
 
ADVA Optical Networking and Arista Networks in an Open Multi-Vendor DCI Demon...
ADVA Optical Networking and Arista Networks in an Open Multi-Vendor DCI Demon...ADVA Optical Networking and Arista Networks in an Open Multi-Vendor DCI Demon...
ADVA Optical Networking and Arista Networks in an Open Multi-Vendor DCI Demon...
 
ADVA Optical Networking and Arista Networks Joint OOLS Demo
ADVA Optical Networking and Arista Networks Joint OOLS DemoADVA Optical Networking and Arista Networks Joint OOLS Demo
ADVA Optical Networking and Arista Networks Joint OOLS Demo
 
In-Service Monitoring of PTP Performance
In-Service Monitoring of PTP PerformanceIn-Service Monitoring of PTP Performance
In-Service Monitoring of PTP Performance
 
Transport Solutions
Transport SolutionsTransport Solutions
Transport Solutions
 
Understanding senetas layer 2 encryption
Understanding senetas layer 2 encryptionUnderstanding senetas layer 2 encryption
Understanding senetas layer 2 encryption
 
Datacryptor Ethernet Layer 2 Rel 4.5
Datacryptor Ethernet Layer 2 Rel 4.5Datacryptor Ethernet Layer 2 Rel 4.5
Datacryptor Ethernet Layer 2 Rel 4.5
 
Introducing the FSP 3000 Access Link Monitoring Solution
Introducing the FSP 3000 Access Link Monitoring SolutionIntroducing the FSP 3000 Access Link Monitoring Solution
Introducing the FSP 3000 Access Link Monitoring Solution
 
Strategies to architecting ultra-efficient data centers
Strategies to architecting ultra-efficient data centersStrategies to architecting ultra-efficient data centers
Strategies to architecting ultra-efficient data centers
 
Pragmatic Approaches for Sync Delivery in Finance Markets
Pragmatic Approaches for Sync Delivery in Finance MarketsPragmatic Approaches for Sync Delivery in Finance Markets
Pragmatic Approaches for Sync Delivery in Finance Markets
 
OFC 2014: Impact of Traffic and Network on OTN Switching Benefits
OFC 2014: Impact of Traffic and Network on OTN Switching BenefitsOFC 2014: Impact of Traffic and Network on OTN Switching Benefits
OFC 2014: Impact of Traffic and Network on OTN Switching Benefits
 
Guide otn ang
Guide otn angGuide otn ang
Guide otn ang
 
Next Generation OTN
Next Generation OTNNext Generation OTN
Next Generation OTN
 
Introduction to Optical Backbone Networks
Introduction to Optical Backbone NetworksIntroduction to Optical Backbone Networks
Introduction to Optical Backbone Networks
 

Ähnlich wie ADVA ConnectGuard™

Securing your telco cloud
Securing your telco cloud Securing your telco cloud
Securing your telco cloud
OPNFV
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
Castleforce
 
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01
RoutecoMarketing
 

Ähnlich wie ADVA ConnectGuard™ (20)

Securing your telco cloud
Securing your telco cloud Securing your telco cloud
Securing your telco cloud
 
Secure Optical Connectivity Solutions for High-Capacity Data Centers
Secure Optical Connectivity Solutions for High-Capacity Data CentersSecure Optical Connectivity Solutions for High-Capacity Data Centers
Secure Optical Connectivity Solutions for High-Capacity Data Centers
 
Scalable, Secure, Programmable – Cloud Connectivity for the Future
Scalable, Secure, Programmable – Cloud Connectivity for the FutureScalable, Secure, Programmable – Cloud Connectivity for the Future
Scalable, Secure, Programmable – Cloud Connectivity for the Future
 
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chain
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security Architecture
 
Protegendo sua rede
Protegendo sua redeProtegendo sua rede
Protegendo sua rede
 
Presentación - Cisco ASA with FirePOWER Services
Presentación -  Cisco ASA with FirePOWER ServicesPresentación -  Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER Services
 
100G Metro Encryption
100G Metro Encryption100G Metro Encryption
100G Metro Encryption
 
Protegendo a nova geração de redes
Protegendo a nova geração de redes Protegendo a nova geração de redes
Protegendo a nova geração de redes
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudEngineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Closing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
Closing the Loop on Web Application Vulnerabilities - John Dilley, AkamaiClosing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
Closing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
 
CHECK POINT 5100 NEXT GENERATION SECURITY GATEWAY FOR THE SMALL ENTERPRISE AN...
CHECK POINT 5100 NEXT GENERATION SECURITY GATEWAY FOR THE SMALL ENTERPRISE AN...CHECK POINT 5100 NEXT GENERATION SECURITY GATEWAY FOR THE SMALL ENTERPRISE AN...
CHECK POINT 5100 NEXT GENERATION SECURITY GATEWAY FOR THE SMALL ENTERPRISE AN...
 
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...
 

Mehr von ADVA

Mehr von ADVA (20)

Industrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clockIndustrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clock
 
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
 
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350  SePRC™ optical cesium clockIndustry's longest holdover with the OSA 3350  SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
 
Addressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructureAddressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructure
 
Precise and assured timing for enterprise networks
Precise and assured timing for enterprise networksPrecise and assured timing for enterprise networks
Precise and assured timing for enterprise networks
 
Introducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demandIntroducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demand
 
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
 
Sync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with softwareSync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with software
 
Meet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networkingMeet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networking
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryption
 
Quantum threat: How to protect your optical network
Quantum threat: How to protect your optical networkQuantum threat: How to protect your optical network
Quantum threat: How to protect your optical network
 
Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...
 
Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)
 
Open optical edge connecting mobile access networks
Open optical edge connecting mobile access networksOpen optical edge connecting mobile access networks
Open optical edge connecting mobile access networks
 
Introducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchorIntroducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchor
 
Meet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation deviceMeet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation device
 
Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™
 
10G edge technology for outdoor environments
10G edge technology for outdoor environments10G edge technology for outdoor environments
10G edge technology for outdoor environments
 
The quantum age - secure transport networks
The quantum age - secure transport networksThe quantum age - secure transport networks
The quantum age - secure transport networks
 
From leased lines to optical spectrum services
From leased lines to optical spectrum servicesFrom leased lines to optical spectrum services
From leased lines to optical spectrum services
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

ADVA ConnectGuard™

  • 1. April, 2015 ADVA ConnectGuard A New Era of Data Protection
  • 2. © 2015 ADVA Optical Networking. All rights reserved. Confidential.2 Security Remains a Major Concern
  • 3. © 2015 ADVA Optical Networking. All rights reserved. Confidential.3 ADVA ConnectGuard Tamper Protection Encryption KeyManagement Security Management Optical Ethernet Diffie-Hellmann Random Numbers AES-256 Certification Approval Vulnerability Management FSP 3000 FSP150
  • 4. © 2015 ADVA Optical Networking. All rights reserved. Confidential.4 Encryption Options Defense in Depth: Encryption Physical PHY Data Link MAC Network Layer IP/MPLS Transport Layer TCP, UDP Application, Presentation, Session Layer Bits Frames Packets Segments Data 1 2 3 4 7 6 5 OSILayer IPSec TLS, SSH In-flight Encryption MACsec
  • 5. © 2015 ADVA Optical Networking. All rights reserved. Confidential.5 ConnectGuard Security Solutions LAN SAN Cluster LAN SAN Cluster LANHQ LAN Main Office 100Gbit/sBandwidth10Mbit/s 1G - 10G 10G - 10G nx 100G nx 100G 10G - 100G 1G - 10G Branch B LANBranch A LAN Main Office LAN 10M - 1G 10M - 1G 10M - 1G Dark Fiber
  • 6. © 2015 ADVA Optical Networking. All rights reserved. Confidential.6 ADVA ConnectGuard Portfolio FSP 3000 ADVA ConnectGuard Optical FSP 150-GE110Pro Series ADVA ConnectGuard Ethernet Maximizing cybersecurity by implementing a complete framework
  • 7. © 2015 ADVA Optical Networking. All rights reserved. Confidential.7 Data Security Beyond Encryption Maximizing cybersecurity by implementing a complete framework • Strong AES-256 • Minimum overhead and latency • Hardware-based, true-random source Advanced Encryption Architecture • Two distinctive sets of keys • Fast encryption key rotation intervals • Centralized key management Efficient Key Management • Protection against physical tampering • Immediate erasing of critical security information • Manipulation-proof Robust Tamper Detection • Vulnerability management processes • Security-relevant reporting • Timely corrections Vulnerability Management
  • 8. Thank You mritter@advaoptical.com IMPORTANT NOTICE The content of this presentation is strictly confidential. ADVA Optical Networking is the exclusive owner or licensee of the content, material, and information in this presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited. The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or implied. ADVA Optical Networking shall not be responsible for and disclaims any liability for any loss or damages, including without limitation, direct, indirect, incidental, consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation. Copyright © for the entire content of this presentation: ADVA Optical Networking.