SlideShare a Scribd company logo
1 of 50
Download to read offline
Global-WAN®
Swiss Data Haven
The Neutral Global Network
Built on Post-Quantum Security
for “The Internet of Things”
global-wan.ch
This document is aimed at helping people to understand the Global-WAN technology. Further
information regarding the internals of TWD Industries AG's technology are available under a
proper NDA, to selected partners.
2 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
3 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
4 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
5 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
6 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
7 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
8 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
9 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
10 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
11 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
12 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
The Problem
“Nations have no friends,
only interests”
John Kornblum
US Ambassador in Germany (2014)
13 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
US Vendors' Dilemma
“How do you protect
what you want to exploit?”
Scott Charney,
VP Trustworthy Computing, Microsoft
14 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
US Strategists' Dilemma
“The Internet is the most transformative
innovation since Gutenberg and the printing
press, yet we're treating it as a war zone.”
Jason Healey
The Atlantic Council (US think-tank)
15 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
The Solution
“To restore trust, there's no substitute to
offering the real thing:
forever unbreakable trusted security.”
TWD Industries AG, 2007
16 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Global-WAN
Purpose & Distinctive Value
Unique, By-Design
17 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
“Securing Phone, Fax, Radio, Video Conferencing,
Web applications, unified communications, etc.
with Forever-Unbreakable Trusted Encryption”.
For * Individuals (consulting, politics, lawyers)
* Enterprises (board, partners, R&D, branch)
* Governments (Army, Police, energy grid,
embassies, trading, etc.).
18 | Copyright © 2014 TWD Industries AG. All rights reserved.
PURPOSE
Global-WAN
19 | Copyright © 2014 TWD Industries AG. All rights reserved.
EASE OF USE
20 | Copyright © 2014 TWD Industries AG. All rights reserved.
Plug & Play and:
- Compatible with all HARDWARE
- Compatible with all SOFTWARE
- Compatible with all Operating Systems
(IBM, ORACLE, Apple, Microsoft, Linux...)
Global-WAN
Global-WAN
21 | Copyright © 2014 TWD Industries AG. All rights reserved.
FOREVER SAFE
22 | Copyright © 2014 TWD Industries AG. All rights reserved.
Security designed to last:
- Proven as unbreakable forever (post-quantum)
- Hides communication endpoints (where, who)
- Hides application and user metadata
Complete security: no “what, who, when, where”.
Global-WAN
Global-WAN
Business Development
Investment Opportunities
23 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
To accelerate its Development,
TWD Industries AG invites
International Investors
24 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
“With the right acts of digital sabotage,
attack aircraft will be grounded,
infrastructure disrupted and
communications severed, reducing the
enemy to a state of raging, pre-modern
impotence.”
The Economist
25 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
26 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
“There's a market failure in cyber-security,
made worse by the trouble firms have in
getting reliable information about the
threats they face.”
The Economist, “Vulnerabilities - Zero-day
game - Wielding a controversial cyber-weapon.”
27 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
28 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
“To avoid lurid headlines about car
crashing, insulin overdoses and houses
burning, tech firms will surely have to
embrace higher [security] standards.”
The Economist
"The Internet of things (to be hacked)"
29 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
30 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
INVEST GLOBALLY
In Emerging Markets and Established Markets:
● USA (“the NSA has destroyed trust”)
● EUROPE (badly needs resilience, growth)
● AFRICA (new infrastructure, sovereignty)
● ASIA (needs to foster independence)
● LATIN-AMERICA (won't trust the USA)
31 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
INVEST IN NATIONS
Securing the CRITICAL INFRASTRUCTURE:
● Security (Army, Police, Finance, etc.)
● Assets (Water Supply, Airports, etc.)
● Energy (Pipelines, Nuclear Plants, etc.)
● Networks (Internet, GSM, 3G/4G, etc.)
● E-Admin (e-Votes, e-Medical, e-Fiscal)
32 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
INVEST IN PATENTS
Let Global-WAN
licence its
patents and
micro-chips
to secure all
these devices.
33 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
Architecture & Components
Designed From Scratch
(can't trust existing products)
34 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
SOFTWARE COMPONENTS
G-WAN: A Server That Can be Trusted
Designed To Build A Secure Platform:
● Less Code, Less Bugs, Higher Efficiency
● New Technologies (Parsing, Memory, etc.)
● No Vulnerability Found Since 2009 Launch
Needed a Safe Server to release Secure Services.
35 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
Lorenz-Waterwheel
Designed to Scale
From [1-∞] CPU Cores.
Lock-Free, Wait-Free,
Multi-Threaded and
Event-Based.
36 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
Connections
MULTICORE SCALABILITY
37 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
MULTICORE SCALABILITY
UBIQUITOUS PLATFORM
G-WAN: Lightweight (200 KB) App. Server
Designed To Run Everywhere:
● Smartphones (Low-Consumption, Low-Latency)
● Embedded (Control At The Lowest Level)
● Servers (Web, SaaS, PaaS, Clouds)
With Scripts In 17 Programming Languages:
(asm, C/C++, C#, Java, Scala, Go, Javascript, Lua, Perl...)
38 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
VERSATILE PLATFORM
G-WAN: An Universal Stack
Open to Third-Parties:
● Applications (C/C++, C#, Java, Obj-C, Perl)
● Middleware (HTTP/S, asynchronous scripts)
● Database (Key-Value, SQLite, ORACLE)
● Infrastructure (DNS, Email, Proxy, VPN, etc.)
39 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
ZERO CONFIGURATION
G-WAN: An Unobstrusive Stack
Why Configuration Files Are Bad:
● Confusing, User Errors, Buggy, Version Incompatibilities
● Mostly Redundant with existing File System Information
● Inadequate: Adaptive Options Are Much Safer / Efficient
Safer, Faster, Simpler, No User Lock-In, No Planned
Obsolescence, Able to Run on Unattended Systems.
40 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
ORACLE OPEN-WORLD
41 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
ORACLE OPEN-WORLD
42 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
Making The Impossible Become Routine
●
G-WAN Accelerating ORACLE NoSQL
●
In A Social Gaming Demo Of 100 Millions Bots
●
All Moving In Real-Time (Heading, Speed, etc.)
●
Queried by 45,000 Persons Joining The Game
●
And Achieving A Whooping 1.2 Billion of TPS
●
...On A Mere 6-Core Desktop Machine!
The Global-WAN Project
Development
Schedule
43 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
44 | Copyright © 2014 TWD Industries AG. All rights reserved.
Reaching The Harvesting Phase
3 years 2 years 5 plus years
 Integration still dominating
 Exploitation gains speed
 Consolidation of
development processes is
key
 Minimize team churn and
grow it only slowly
 Focus on integration
 Only very few clients
 Gain experience in
automation
 Build a strong team
 Integration becomes less
important
 Exploitation takes lead and
grows significantly
 Quality becomes key topic
 Long term employees
perform best
Information
Integration
Information
Exploitation
1) Ramp-up phase,
2008
2) Consolidation
phase
3) Harvesting
phase, 2014
Global-WAN
Productivity Standards
Favourably Comparing With The Next Best:
45 | Copyright © 2014 TWD Industries AG. All rights reserved.
Server Birth Files Blank Comment Code Total
Nginx 2002 256 35,131 4,308 94,369 133,808
G-WAN 2009 171 11,198 42,706 56,766 110,670
G-WAN was written in less than half the time, and offers many
more features in half the code of Nginx. Further, G-WAN's source
code has 10x more comments than Nginx's code.
Source Code
Lines
Global-WAN
Why TrustLeap?
The Need For Global-WAN
on both
Server and Client Sides
46 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
Unbreakable Security
● Future-Proof (Post-QUANTUM)
● Mathematically Proven (Can Be Trusted By All)
● Independent From Computing Power Used To Break It
● No More Need To Enlarge Encryption Keys
● No More Need To Change Encryption Algorithms
● Also Unbreakable Two & Three-Factor Authentication
● No Central Key Repository Needed (But Can Be Used)
● Mobiles / Embedded: Very Low Overhead (CPU / RAM)
47 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
The Value Of Trust
Applications
● Corporate Asset Protection (Patents, Talks, Databases)
● Public Asset Protection (e-Votes, Medical Records, Legal)
● International Negotiations (United Nations, Contracts)
● Transaction / Archiving Certifications (Indisputable)
● Defence (Impenetrable Communications, Drones, etc.)
● Chips Would Be Ideally Used (Tampering, I.P. Protection)
● Legitimacy to Impose a Licensing Monopole (Exclusivity)
48 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
Trust Starts With Identity
● Email (Data Protection, Negotiations, Board Talks)
● Routers / Firewalls (How Safe Are Barriers If Broken?)
● Transactions (Trading, Contracts, Non-Repudiation)
● Storage (Confidentiality, Tamper-Proof, Full-Control)
● Defence (Remote Presence / Control, Chain Of Orders)
● I.P. Rights (What Worth Is A Proof That Can Be Spoofed?)
● Legal (Customers / Lawyers / Regulators Security Chain)
49 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
TrustLeap
Worldwide Corporate HQ
TrustLeap
Paradiesli 17
CH-8842 Unteriberg SZ
Switzerland
Phone +41 (0)55 414 20 93
Fax +41 (0)55 414 20 67
Email contact@trustleap.com
www.trustleap.com
About TrustLeap
TrustLeap, the security division of TWD Industries AG, protects digital assets with cryptanalytically unbreakable technology
(safe against unlimited computing power as it is proven mathematically that no key leaks can be exploited). The TrustLeap
secure platform leverages offers of enterprise, cloud, networking, digital media and financial services in global strategic markets.
TrustLeap lets partners and users form dynamic ecosystems where duly accredited strangers can safely trust each-other.
Establishing widespread trust enables organizations to secure their infrastructure, raise the value of their offers and safely
market their digital assets.
TrustLeap
50 | Copyright © 2014 TWD Industries AG. All rights reserved.

More Related Content

What's hot

Vulnerabilities of machine learning infrastructure
Vulnerabilities of machine learning infrastructureVulnerabilities of machine learning infrastructure
Vulnerabilities of machine learning infrastructureSergey Gordeychik
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deckRichard Blech
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesCharalampos Doukas
 
Conclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleConclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleGuardicore
 
SafeNet overview 2014
SafeNet overview 2014SafeNet overview 2014
SafeNet overview 2014Sectricity
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewIEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewPeter Waher
 
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)Lancope, Inc.
 
Stories from the Trainyard!
Stories from the Trainyard!Stories from the Trainyard!
Stories from the Trainyard!Patrick Kelley
 
Netguard product brochure
Netguard product brochureNetguard product brochure
Netguard product brochurecmnewman78
 
Exfiltrating Data through IoT
Exfiltrating Data through IoTExfiltrating Data through IoT
Exfiltrating Data through IoTPriyanka Aash
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9Arvind Tiwary
 
Best Practices of IoT Security in the Cloud
Best Practices of IoT Security in the CloudBest Practices of IoT Security in the Cloud
Best Practices of IoT Security in the CloudAmazon Web Services
 
A 2018 practical guide to hacking RFID/NFC
A 2018 practical guide to hacking RFID/NFCA 2018 practical guide to hacking RFID/NFC
A 2018 practical guide to hacking RFID/NFCSlawomir Jasek
 
Fal conunite2019 complete_zero_trust_final
Fal conunite2019 complete_zero_trust_finalFal conunite2019 complete_zero_trust_final
Fal conunite2019 complete_zero_trust_finalBryan Fite
 
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Positive Hack Days
 
SecurEntry by PrehKeyTec
SecurEntry by PrehKeyTecSecurEntry by PrehKeyTec
SecurEntry by PrehKeyTeccshergi
 
IoT End-to-End Security Overview
IoT End-to-End Security OverviewIoT End-to-End Security Overview
IoT End-to-End Security OverviewAmazon Web Services
 

What's hot (20)

Making Network Security Relevant
Making Network Security RelevantMaking Network Security Relevant
Making Network Security Relevant
 
Vulnerabilities of machine learning infrastructure
Vulnerabilities of machine learning infrastructureVulnerabilities of machine learning infrastructure
Vulnerabilities of machine learning infrastructure
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deck
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health Devices
 
Conclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleConclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at Scale
 
SafeNet overview 2014
SafeNet overview 2014SafeNet overview 2014
SafeNet overview 2014
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewIEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
 
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
 
Stories from the Trainyard!
Stories from the Trainyard!Stories from the Trainyard!
Stories from the Trainyard!
 
Netguard product brochure
Netguard product brochureNetguard product brochure
Netguard product brochure
 
Exfiltrating Data through IoT
Exfiltrating Data through IoTExfiltrating Data through IoT
Exfiltrating Data through IoT
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
 
Best Practices of IoT Security in the Cloud
Best Practices of IoT Security in the CloudBest Practices of IoT Security in the Cloud
Best Practices of IoT Security in the Cloud
 
CDE Marketplace: SQR Systems
CDE Marketplace: SQR SystemsCDE Marketplace: SQR Systems
CDE Marketplace: SQR Systems
 
A 2018 practical guide to hacking RFID/NFC
A 2018 practical guide to hacking RFID/NFCA 2018 practical guide to hacking RFID/NFC
A 2018 practical guide to hacking RFID/NFC
 
Fal conunite2019 complete_zero_trust_final
Fal conunite2019 complete_zero_trust_finalFal conunite2019 complete_zero_trust_final
Fal conunite2019 complete_zero_trust_final
 
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
 
SecurEntry by PrehKeyTec
SecurEntry by PrehKeyTecSecurEntry by PrehKeyTec
SecurEntry by PrehKeyTec
 
IoT End-to-End Security Overview
IoT End-to-End Security OverviewIoT End-to-End Security Overview
IoT End-to-End Security Overview
 

Viewers also liked

Large-scale real-time analytics for everyone
Large-scale real-time analytics for everyoneLarge-scale real-time analytics for everyone
Large-scale real-time analytics for everyonePavel Kalaidin
 
The Allen AI Science Challenge
The Allen AI Science ChallengeThe Allen AI Science Challenge
The Allen AI Science ChallengePavel Kalaidin
 
Обработка данных в RTB: быстро, дешево и на 98% точно
Обработка данных в RTB:  быстро, дешево и на 98% точноОбработка данных в RTB:  быстро, дешево и на 98% точно
Обработка данных в RTB: быстро, дешево и на 98% точноPavel Kalaidin
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayCisco Canada
 
Internet
InternetInternet
Internetbbilja
 
Prezentacija o internetu
Prezentacija o internetuPrezentacija o internetu
Prezentacija o internetuOS Cegar Nis
 

Viewers also liked (12)

Global wan prez-ru.mini
Global wan prez-ru.miniGlobal wan prez-ru.mini
Global wan prez-ru.mini
 
Large-scale real-time analytics for everyone
Large-scale real-time analytics for everyoneLarge-scale real-time analytics for everyone
Large-scale real-time analytics for everyone
 
The Allen AI Science Challenge
The Allen AI Science ChallengeThe Allen AI Science Challenge
The Allen AI Science Challenge
 
Data Mining in RTB
Data Mining in RTBData Mining in RTB
Data Mining in RTB
 
Обработка данных в RTB: быстро, дешево и на 98% точно
Обработка данных в RTB:  быстро, дешево и на 98% точноОбработка данных в RTB:  быстро, дешево и на 98% точно
Обработка данных в RTB: быстро, дешево и на 98% точно
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus Day
 
Racunarske mreze
Racunarske mrezeRacunarske mreze
Racunarske mreze
 
Internet
InternetInternet
Internet
 
2 racunarske mreze
2 racunarske mreze2 racunarske mreze
2 racunarske mreze
 
Prezentacija o internetu
Prezentacija o internetuPrezentacija o internetu
Prezentacija o internetu
 
Računarske mreže
Računarske mrežeRačunarske mreže
Računarske mreže
 
Ppt on internet
Ppt on internetPpt on internet
Ppt on internet
 

Similar to Global-WAN - The Swiss Neutral Data Haven

Lieven Vermaele - SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...
Lieven Vermaele -  SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...Lieven Vermaele -  SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...
Lieven Vermaele - SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...Burton Lee
 
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)IoT613
 
Firewall Webinar
Firewall WebinarFirewall Webinar
Firewall WebinarAT&T
 
WM press release VIP Tower - 122017
WM press release VIP Tower - 122017WM press release VIP Tower - 122017
WM press release VIP Tower - 122017Joel Gil
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?360mnbsu
 
The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)Gerardo Pardo-Castellote
 
Eseminar – Internet delle Cose
Eseminar – Internet delle CoseEseminar – Internet delle Cose
Eseminar – Internet delle CoseInSide Training
 
Developer Day 2014 - 4 - wind river - iot business and technology trends
Developer Day 2014 - 4 - wind river - iot business and technology trendsDeveloper Day 2014 - 4 - wind river - iot business and technology trends
Developer Day 2014 - 4 - wind river - iot business and technology trendsThibault Cantegrel
 
Open Source for Industry 4.0 – Open IoT Summit NA 2018
Open Source for Industry 4.0 – Open IoT Summit NA 2018Open Source for Industry 4.0 – Open IoT Summit NA 2018
Open Source for Industry 4.0 – Open IoT Summit NA 2018Benjamin Cabé
 
Project Grace - Towards a Secure Internet
Project Grace - Towards a Secure InternetProject Grace - Towards a Secure Internet
Project Grace - Towards a Secure Internetinside-BigData.com
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
NUB3D - Company Presentation
NUB3D - Company PresentationNUB3D - Company Presentation
NUB3D - Company PresentationNUB3D
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalA. Phillip Smith
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Digital Bond
 
Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)
Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)
Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)Real-Time Innovations (RTI)
 
Security in Optical Networks - Useless or Necessary?
Security in Optical Networks - Useless or Necessary?Security in Optical Networks - Useless or Necessary?
Security in Optical Networks - Useless or Necessary?ADVA
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Rafael Maranon
 
Transforming enterprise and industry with 5G private networks
Transforming enterprise and industry with 5G private networksTransforming enterprise and industry with 5G private networks
Transforming enterprise and industry with 5G private networksQualcomm Research
 
Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Securityteam-WIBU
 

Similar to Global-WAN - The Swiss Neutral Data Haven (20)

Lieven Vermaele - SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...
Lieven Vermaele -  SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...Lieven Vermaele -  SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...
Lieven Vermaele - SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...
 
Waterfall Wonderware Joint Offering
Waterfall Wonderware Joint OfferingWaterfall Wonderware Joint Offering
Waterfall Wonderware Joint Offering
 
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
 
Firewall Webinar
Firewall WebinarFirewall Webinar
Firewall Webinar
 
WM press release VIP Tower - 122017
WM press release VIP Tower - 122017WM press release VIP Tower - 122017
WM press release VIP Tower - 122017
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
 
The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)
 
Eseminar – Internet delle Cose
Eseminar – Internet delle CoseEseminar – Internet delle Cose
Eseminar – Internet delle Cose
 
Developer Day 2014 - 4 - wind river - iot business and technology trends
Developer Day 2014 - 4 - wind river - iot business and technology trendsDeveloper Day 2014 - 4 - wind river - iot business and technology trends
Developer Day 2014 - 4 - wind river - iot business and technology trends
 
Open Source for Industry 4.0 – Open IoT Summit NA 2018
Open Source for Industry 4.0 – Open IoT Summit NA 2018Open Source for Industry 4.0 – Open IoT Summit NA 2018
Open Source for Industry 4.0 – Open IoT Summit NA 2018
 
Project Grace - Towards a Secure Internet
Project Grace - Towards a Secure InternetProject Grace - Towards a Secure Internet
Project Grace - Towards a Secure Internet
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
NUB3D - Company Presentation
NUB3D - Company PresentationNUB3D - Company Presentation
NUB3D - Company Presentation
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security
 
Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)
Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)
Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)
 
Security in Optical Networks - Useless or Necessary?
Security in Optical Networks - Useless or Necessary?Security in Optical Networks - Useless or Necessary?
Security in Optical Networks - Useless or Necessary?
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
 
Transforming enterprise and industry with 5G private networks
Transforming enterprise and industry with 5G private networksTransforming enterprise and industry with 5G private networks
Transforming enterprise and industry with 5G private networks
 
Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Security
 

Recently uploaded

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 

Recently uploaded (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Global-WAN - The Swiss Neutral Data Haven

  • 1. Global-WAN® Swiss Data Haven The Neutral Global Network Built on Post-Quantum Security for “The Internet of Things” global-wan.ch
  • 2. This document is aimed at helping people to understand the Global-WAN technology. Further information regarding the internals of TWD Industries AG's technology are available under a proper NDA, to selected partners. 2 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 3. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 3 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 4. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 4 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 5. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 5 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 6. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 6 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 7. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 7 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 8. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 8 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 9. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 9 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 10. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 10 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 11. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 11 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 12. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 12 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 13. The Problem “Nations have no friends, only interests” John Kornblum US Ambassador in Germany (2014) 13 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 14. US Vendors' Dilemma “How do you protect what you want to exploit?” Scott Charney, VP Trustworthy Computing, Microsoft 14 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 15. US Strategists' Dilemma “The Internet is the most transformative innovation since Gutenberg and the printing press, yet we're treating it as a war zone.” Jason Healey The Atlantic Council (US think-tank) 15 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 16. The Solution “To restore trust, there's no substitute to offering the real thing: forever unbreakable trusted security.” TWD Industries AG, 2007 16 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 17. Global-WAN Purpose & Distinctive Value Unique, By-Design 17 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 18. “Securing Phone, Fax, Radio, Video Conferencing, Web applications, unified communications, etc. with Forever-Unbreakable Trusted Encryption”. For * Individuals (consulting, politics, lawyers) * Enterprises (board, partners, R&D, branch) * Governments (Army, Police, energy grid, embassies, trading, etc.). 18 | Copyright © 2014 TWD Industries AG. All rights reserved. PURPOSE Global-WAN
  • 19. 19 | Copyright © 2014 TWD Industries AG. All rights reserved.
  • 20. EASE OF USE 20 | Copyright © 2014 TWD Industries AG. All rights reserved. Plug & Play and: - Compatible with all HARDWARE - Compatible with all SOFTWARE - Compatible with all Operating Systems (IBM, ORACLE, Apple, Microsoft, Linux...) Global-WAN
  • 21. Global-WAN 21 | Copyright © 2014 TWD Industries AG. All rights reserved.
  • 22. FOREVER SAFE 22 | Copyright © 2014 TWD Industries AG. All rights reserved. Security designed to last: - Proven as unbreakable forever (post-quantum) - Hides communication endpoints (where, who) - Hides application and user metadata Complete security: no “what, who, when, where”. Global-WAN
  • 23. Global-WAN Business Development Investment Opportunities 23 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 24. To accelerate its Development, TWD Industries AG invites International Investors 24 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 25. “With the right acts of digital sabotage, attack aircraft will be grounded, infrastructure disrupted and communications severed, reducing the enemy to a state of raging, pre-modern impotence.” The Economist 25 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 26. 26 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 27. “There's a market failure in cyber-security, made worse by the trouble firms have in getting reliable information about the threats they face.” The Economist, “Vulnerabilities - Zero-day game - Wielding a controversial cyber-weapon.” 27 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 28. 28 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 29. “To avoid lurid headlines about car crashing, insulin overdoses and houses burning, tech firms will surely have to embrace higher [security] standards.” The Economist "The Internet of things (to be hacked)" 29 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 30. 30 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 31. INVEST GLOBALLY In Emerging Markets and Established Markets: ● USA (“the NSA has destroyed trust”) ● EUROPE (badly needs resilience, growth) ● AFRICA (new infrastructure, sovereignty) ● ASIA (needs to foster independence) ● LATIN-AMERICA (won't trust the USA) 31 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 32. INVEST IN NATIONS Securing the CRITICAL INFRASTRUCTURE: ● Security (Army, Police, Finance, etc.) ● Assets (Water Supply, Airports, etc.) ● Energy (Pipelines, Nuclear Plants, etc.) ● Networks (Internet, GSM, 3G/4G, etc.) ● E-Admin (e-Votes, e-Medical, e-Fiscal) 32 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 33. INVEST IN PATENTS Let Global-WAN licence its patents and micro-chips to secure all these devices. 33 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 34. Architecture & Components Designed From Scratch (can't trust existing products) 34 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 35. SOFTWARE COMPONENTS G-WAN: A Server That Can be Trusted Designed To Build A Secure Platform: ● Less Code, Less Bugs, Higher Efficiency ● New Technologies (Parsing, Memory, etc.) ● No Vulnerability Found Since 2009 Launch Needed a Safe Server to release Secure Services. 35 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 36. Lorenz-Waterwheel Designed to Scale From [1-∞] CPU Cores. Lock-Free, Wait-Free, Multi-Threaded and Event-Based. 36 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN Connections MULTICORE SCALABILITY
  • 37. 37 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN MULTICORE SCALABILITY
  • 38. UBIQUITOUS PLATFORM G-WAN: Lightweight (200 KB) App. Server Designed To Run Everywhere: ● Smartphones (Low-Consumption, Low-Latency) ● Embedded (Control At The Lowest Level) ● Servers (Web, SaaS, PaaS, Clouds) With Scripts In 17 Programming Languages: (asm, C/C++, C#, Java, Scala, Go, Javascript, Lua, Perl...) 38 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 39. VERSATILE PLATFORM G-WAN: An Universal Stack Open to Third-Parties: ● Applications (C/C++, C#, Java, Obj-C, Perl) ● Middleware (HTTP/S, asynchronous scripts) ● Database (Key-Value, SQLite, ORACLE) ● Infrastructure (DNS, Email, Proxy, VPN, etc.) 39 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 40. ZERO CONFIGURATION G-WAN: An Unobstrusive Stack Why Configuration Files Are Bad: ● Confusing, User Errors, Buggy, Version Incompatibilities ● Mostly Redundant with existing File System Information ● Inadequate: Adaptive Options Are Much Safer / Efficient Safer, Faster, Simpler, No User Lock-In, No Planned Obsolescence, Able to Run on Unattended Systems. 40 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 41. ORACLE OPEN-WORLD 41 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 42. ORACLE OPEN-WORLD 42 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN Making The Impossible Become Routine ● G-WAN Accelerating ORACLE NoSQL ● In A Social Gaming Demo Of 100 Millions Bots ● All Moving In Real-Time (Heading, Speed, etc.) ● Queried by 45,000 Persons Joining The Game ● And Achieving A Whooping 1.2 Billion of TPS ● ...On A Mere 6-Core Desktop Machine!
  • 43. The Global-WAN Project Development Schedule 43 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 44. 44 | Copyright © 2014 TWD Industries AG. All rights reserved. Reaching The Harvesting Phase 3 years 2 years 5 plus years  Integration still dominating  Exploitation gains speed  Consolidation of development processes is key  Minimize team churn and grow it only slowly  Focus on integration  Only very few clients  Gain experience in automation  Build a strong team  Integration becomes less important  Exploitation takes lead and grows significantly  Quality becomes key topic  Long term employees perform best Information Integration Information Exploitation 1) Ramp-up phase, 2008 2) Consolidation phase 3) Harvesting phase, 2014 Global-WAN
  • 45. Productivity Standards Favourably Comparing With The Next Best: 45 | Copyright © 2014 TWD Industries AG. All rights reserved. Server Birth Files Blank Comment Code Total Nginx 2002 256 35,131 4,308 94,369 133,808 G-WAN 2009 171 11,198 42,706 56,766 110,670 G-WAN was written in less than half the time, and offers many more features in half the code of Nginx. Further, G-WAN's source code has 10x more comments than Nginx's code. Source Code Lines Global-WAN
  • 46. Why TrustLeap? The Need For Global-WAN on both Server and Client Sides 46 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 47. Unbreakable Security ● Future-Proof (Post-QUANTUM) ● Mathematically Proven (Can Be Trusted By All) ● Independent From Computing Power Used To Break It ● No More Need To Enlarge Encryption Keys ● No More Need To Change Encryption Algorithms ● Also Unbreakable Two & Three-Factor Authentication ● No Central Key Repository Needed (But Can Be Used) ● Mobiles / Embedded: Very Low Overhead (CPU / RAM) 47 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 48. The Value Of Trust Applications ● Corporate Asset Protection (Patents, Talks, Databases) ● Public Asset Protection (e-Votes, Medical Records, Legal) ● International Negotiations (United Nations, Contracts) ● Transaction / Archiving Certifications (Indisputable) ● Defence (Impenetrable Communications, Drones, etc.) ● Chips Would Be Ideally Used (Tampering, I.P. Protection) ● Legitimacy to Impose a Licensing Monopole (Exclusivity) 48 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 49. Trust Starts With Identity ● Email (Data Protection, Negotiations, Board Talks) ● Routers / Firewalls (How Safe Are Barriers If Broken?) ● Transactions (Trading, Contracts, Non-Repudiation) ● Storage (Confidentiality, Tamper-Proof, Full-Control) ● Defence (Remote Presence / Control, Chain Of Orders) ● I.P. Rights (What Worth Is A Proof That Can Be Spoofed?) ● Legal (Customers / Lawyers / Regulators Security Chain) 49 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 50. TrustLeap Worldwide Corporate HQ TrustLeap Paradiesli 17 CH-8842 Unteriberg SZ Switzerland Phone +41 (0)55 414 20 93 Fax +41 (0)55 414 20 67 Email contact@trustleap.com www.trustleap.com About TrustLeap TrustLeap, the security division of TWD Industries AG, protects digital assets with cryptanalytically unbreakable technology (safe against unlimited computing power as it is proven mathematically that no key leaks can be exploited). The TrustLeap secure platform leverages offers of enterprise, cloud, networking, digital media and financial services in global strategic markets. TrustLeap lets partners and users form dynamic ecosystems where duly accredited strangers can safely trust each-other. Establishing widespread trust enables organizations to secure their infrastructure, raise the value of their offers and safely market their digital assets. TrustLeap 50 | Copyright © 2014 TWD Industries AG. All rights reserved.