Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.

ADVA ConnectGuard™

Our ConnectGuard™ solution has been specifically engineered to deliver the most robust network security available. It’s time to embrace a new era of data protection.

  • Identifiez-vous pour voir les commentaires

ADVA ConnectGuard™

  1. 1. April, 2015 ADVA ConnectGuard A New Era of Data Protection
  2. 2. © 2015 ADVA Optical Networking. All rights reserved. Confidential.2 Security Remains a Major Concern
  3. 3. © 2015 ADVA Optical Networking. All rights reserved. Confidential.3 ADVA ConnectGuard Tamper Protection Encryption KeyManagement Security Management Optical Ethernet Diffie-Hellmann Random Numbers AES-256 Certification Approval Vulnerability Management FSP 3000 FSP150
  4. 4. © 2015 ADVA Optical Networking. All rights reserved. Confidential.4 Encryption Options Defense in Depth: Encryption Physical PHY Data Link MAC Network Layer IP/MPLS Transport Layer TCP, UDP Application, Presentation, Session Layer Bits Frames Packets Segments Data 1 2 3 4 7 6 5 OSILayer IPSec TLS, SSH In-flight Encryption MACsec
  5. 5. © 2015 ADVA Optical Networking. All rights reserved. Confidential.5 ConnectGuard Security Solutions LAN SAN Cluster LAN SAN Cluster LANHQ LAN Main Office 100Gbit/sBandwidth10Mbit/s 1G - 10G 10G - 10G nx 100G nx 100G 10G - 100G 1G - 10G Branch B LANBranch A LAN Main Office LAN 10M - 1G 10M - 1G 10M - 1G Dark Fiber
  6. 6. © 2015 ADVA Optical Networking. All rights reserved. Confidential.6 ADVA ConnectGuard Portfolio FSP 3000 ADVA ConnectGuard Optical FSP 150-GE110Pro Series ADVA ConnectGuard Ethernet Maximizing cybersecurity by implementing a complete framework
  7. 7. © 2015 ADVA Optical Networking. All rights reserved. Confidential.7 Data Security Beyond Encryption Maximizing cybersecurity by implementing a complete framework • Strong AES-256 • Minimum overhead and latency • Hardware-based, true-random source Advanced Encryption Architecture • Two distinctive sets of keys • Fast encryption key rotation intervals • Centralized key management Efficient Key Management • Protection against physical tampering • Immediate erasing of critical security information • Manipulation-proof Robust Tamper Detection • Vulnerability management processes • Security-relevant reporting • Timely corrections Vulnerability Management
  8. 8. Thank You mritter@advaoptical.com IMPORTANT NOTICE The content of this presentation is strictly confidential. ADVA Optical Networking is the exclusive owner or licensee of the content, material, and information in this presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited. The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or implied. ADVA Optical Networking shall not be responsible for and disclaims any liability for any loss or damages, including without limitation, direct, indirect, incidental, consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation. Copyright © for the entire content of this presentation: ADVA Optical Networking.

×