SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
ubique
TECHNOLOGIES
©UBIQUETechnologiesGmbH www.ubique-technologies.de
Astableonlineaccessistantamountforthecaptainandcrew,notonlyforretrievalofcurrentdata,butalsoasa
communicationchannelwithhomeandforrecreationalactivities.Ifprivatelaptopsorsmartdevicesareconnectedtothe
ship’snetwork,keyonboardsystemscouldbeaffected.Privatebrowsingortheuseofbandwidth-intensiveapplications
suchasmultimediastreamingorvideochatscanexhaustsatellitelinksquickly,causingcoststoskyrocket.
InfrastructureSecurityandCostcontrol
SecureSolutionsforasecurebusiness
ThemanipulationorfailureofanITorcommunicationsnetworkonboardcanhavefatalconsequences,fromcostlydelays
tomanipulationofon-boardsystemsorcargosoftwaretohazardsfortheshipandcrew.
AdistinguishedCyberSecurityspecialistsince2011,UBIQUE Technologiesoffersworldwideprotectionfordigital
infrastructuresagainstmanipulation,infiltrationandIT-relatedmalfunctions.WithCyberSecurityCommandCenters,
mannedaroundtheclockinitsowndatacentersinGermany,UBIQUETechnologiesstandsfortheimmediatedefense
againstdigitalattacksaswellastargetedinitiationofappropriatecountermeasurestoprotectdigitalandphysicalvalues.
TToday’sshipsusemoreinformationtechnologythanamedium-sizedcompany.Inaddition,thedemandsonseaworthy
hardwaresystemsaremuchhigherthanfornormalhardwaresystems:roughseas,highhumidityandlimitedspacerequire
robustandreliableinfrastructuresystems.Atthesametime,thepotentialrisksandassociatedcostsofafunctionalfailure
oftheonboardITsystembyfarexceedwhatsystemsdesignedfornormalusearecapableofhandling.
DesigninganIT-Protectionsystem tailoredtotheneedsofmoderncommercialshippingrequiresthatsuchfactorsas
acquisitionacquisitionandoperatingcosts,globalavailabilityofpartsandaglobalservicestructurebeconsideredaswellasthefeasi-
bilityofconnectionquality,bandwidthandtheoverallcostsofoperatingthetechnologiesusedineachcase.
©UBIQUETechnologiesGmbH www.ubique-technologies.de
Thefirststepstobetakeninordertoincreasenetworksecurityonboardaretocreateseparatenetworksfortheintra-and
inter-shipcommunicationsandcrewusageaswellasintegratingvarioussecurityfiltersinthedatastream.
Theseparationofindividualnetworksectorsservestosimplifynetworkmanagementandimplementcostcontroloftheser-
vicesprovided,aswellasgreatlyenhancingsecurity.
Thetoken-basedInternetaccesssystem enablescompliancewithlegalprivacyrequirementsandprotectsthenetwork
operator,inthiscasetheshipowners,fromliabilityclaimsbyindividualcrewmemberswithoutthenecessityofrestricting
internetusage.TheDualControlprinciplefacilitateslegallycompliantstorageofstoredlogdatawhichcanlaterbeanaly-
zed,ifrequired.
Accesscontrolalsoallowsapersonalorgroup-basedbandwidthallocationandcanprioritizeorblockinternetorapplication
accessonthebasisofoperationalplans.
Thecontentfilteremployedprotectsagainsttheunlawfuluseoftheinternetconnectionbycrewmembersandcanbe
tailoredtomeetthelegalrequirementsofthevariousportsofcallorcountriesatanytime.Atthesametime,downloads
containingmalwareorotherhazardouscontentsarecaughtanddisabled.
GeneraluseofaFleetBroadband(FBB)connectionismoreexpensivethanthecostofasatellitelink(VSAT)link.Incase
ofaVSATconnectionfailure,onlytheoperationalandsecurity-relatedservices,vitaltotheship’soperation,shouldbe
transferredtotheFBBsothattheyremainavailable.
AlthoughAlthoughnon-criticalservices,suchassurfingtheinternet,arenownolongeravailabletothecrew,thesefunctionscanstill
beusedbygroupsofspecificallydefinedcrewmembersontheFBB.Inaddition,personalizedinternetandapplication
accesscanbelimited,eitherconnection-dependentorbyvolumeortime,extendingthesystem’scapabilitiestoensureop-
timumcostcontrol.
Theallocationofdefinedbandwidths,eitherfixedorpercentage-wise,fordefinedapplications,links,individualsorgroups
provideseachwiththeoptimalavailabilityofimportantsystemsandinformationsources.
Networkseparation/Networkdivision
Accesscontrol
InternetFilter
ServiceorientedFailover
InfrastructureSecurityandCostcontrol
©UBIQUETechnologiesGmbH www.ubique-technologies.de
State-of-the-artencryptiontechnologiesareusedtoprotectwirelessnetworks(Wi-Fi);however,itisonlyamatteroftime
beforeanintrusionintoaWLANissuccessful.Thatiswhywehaveaddedanactiveandtamper-freenetworkaccess
control(NAC)tooursecuritysystem.
This additionallayerofprotection continuously scans allnetwork activity withoutburdening the network itself.
Shouldanattackergainillegalaccesstoanetworksegment,hewillbeidentifiedwithinmillisecondsandany
communicationbetweentheattacker’ssystemandtheinternalsystemisprevented.
JustJustasthefirewallitselfincludesallthenecessaryprotectivefunctionstopreventagainstcontaminationovertheIP,the
NACnotonlyscansallinternalnetworktraffictounknownsystems,butalsochecksfornetworkcommunicationinconsis-
tenciesaswellasmonitoringallconnectedsystemsforvulnerabilities.
Thesystemrecordsallsecuritybreachestoatamper-proofdatabasewhichispassedontothecontrolroomwhereitcan
bepursuedfurtherincompliancereportsandprocess-drivenworkflows,asnecessary.
ApplicationContainmentprovidesanotherimportantlayerofsecurityforhighlysensitiveapplications.Acontainerized
applicationrunswithinacontainerapplicationandeveryapplicationinterfaceismonitored.
Thisprotectstheapplicationitselfaswellasalldatainputagainstmanipulationandanyunlawfuldatatap.Evenkeystrokes
themselvesare encrypted before being passed on to the protected application within the containerapplication.
Containerizationmakesitpossiblenotonlytorunsafeapplicationsinuncertainenvironments,buttoalsoexecuteunsecu-
redapplicationsinsecureenvironments.
NetworkAccessControl
VulnerabilityManagementandReporting
ApplicationContainment
InfrastructureSecurityandCostcontrol
©UBIQUETechnologiesGmbH www.ubique-technologies.de
Theadministratingemployeesareauthenticatedthroughatokensystem.Thecentralmanagementinterfaceallowsthem
accessonlytothefunctionsforwhichtheyhavebeenauthorized.Thisenablesagranularimplementationoftheseparation
offunctionsbetweenthevariousadministrativetasks.
Inordertominimizethebandwidthloadasmuchaspossible,thetransmissionofloginformationandreportscanbe
granularlygranularlycontrolledandtimed.Thetransmissionitselfcanbeswitchedfromthecurrentpushmethod,wheretheindividual
applicationsautomaticallypasstheirinformationtoheadquarters,tothepullmethod,wherethecentrallogandreporting
serveractivelyretrievestheapplianceinformation.
Thisalsoappliestochangesinrules.Thesystem rulechangescaneitherbeexecuteddirectlyorthroughthecentral
controlcenter.Theyarethensynchronizedagainsteachotherandonbothsides–inthedatacenterandontheindividual
applianceonboard–sothatuniformrulesareavailable.
ThisThismakesitpossibletosetuprulescentrallyand,aftercentralclearance,pushthem totheconnectedapplianceson
boardandactivatethem.
Accesscontrolandseparationoffunctions
PullundPush
Responsibilityforthemanagementoftheprotectionsystemisallocatedtoacentrallocation,
eithertheheadquartersoftheshippingcompany,orUBIQUETechnologies’datacenterinGermany,
Centrallymanaged,optimalSecurity
©UBIQUETechnologiesGmbH www.ubique-technologies.de
Incaseitbecomesnecessarytoexchangetheentiresystem,thecentralofficecan„refuel“thereplacementdevices
remotelyandguideacrewmemberduringtheimplementation.Theglobaluseofthesesystemsensuresthatexchange
systemscanbeprocuredandbroughtonboardfrommostnearbyports.
Wehighlyrecommendtheuseofacluster,inwhich2identicaldevicesacttogether,asthefailureofonesystemcanbe
compensatedbythesecondsystemuntilthereplacementbecomesavailable.
UsageUsageReportsserveasproofofsystemusagebyindividuals,systemsandapplicationsandshowtheentiredatatransfer
history.Asidefromtheresultingplanningsecurity,itispossibletodrawconclusionsandalsodoaforensicevaluationof
thesystem’ssecurity.
Usetheexistingreporttemplatesortheoptionofdefiningyourownreports,togeneratecompliancereportsonsystemse-
curity,configurationandusageinjustminutes.
.
Systemexchange
UsageandComplianceReports
Centrallymanaged,optimalSecurity
©UBIQUETechnologiesGmbH www.ubique-technologies.de
Often,inadditiontorequiringusernameandpassword,applicationandsystem accesscanbelimitedtoasingle,
accessingIPaddresswhichfurtherreinforcessystemprotection.
UBIQUETechnologies‘centralVPN-Fixed-IPServicemakestheuseofafixedIPintheauthenticationprocesspossible,
withoutlosingtheconvenienceofwidespreadorevenmobileaccesses.
EmployeesandserviceproviderscansetuptheirVPNinourdatacenterasusual,fromheadquartersorontheroad,using
theirlaptops,andcanaccessthesystemstobeadministeredthroughthat.
EmployeeEmployeeaccessissecuredthroughtheuseofatokensystem.Thepasswordsusedtologinareclearlydefinedand
updatedina30-60secondcycle.
Eachemployeeentershisusername,knownonlytohimself,andthepasswordprovidedviaahardorsofttoken,togain
accesstothecentralaccesspointwherehethenauthenticateshisidentity.
CentrallysecuredaccesseswithfixedIPaddresses
©UBIQUETechnologiesGmbH www.ubique-technologies.de
WiththeintroductionofVoIP,theproblem ofachievingtap-proofcommunicationschannelswasoftentransferredtothe
VoIPtelecommunicationssystembeingused.Widespreadimplementationofthispracticehasgeneratedincreasedattacks
onthevulnerabilitieswithintheprotocolitself,inparticular,targetingtheclientsystemsinuse.
WithAdhocVoIP-Encryption,wemaketheencryptionofvoicecommunicationpossibleinanend-to-endprocessandby
removingtheunknownvariableintheoperatingsystem,whetheritisalaptoporapersonalcomputer,fromtheequation.
InInordertominimizethetarget,thesystem encryptsthevoicepacketbeforeitleavestheclientcomputeranddecrypts
incomingvoicepacketsafterthesehaveleftthePCusedtosendthem.Thisprocessismadepossiblethroughtheuseof
aspecialUSB hardwaresystem inwhichahardware-basedencryptionisemployedwhichallowsasecureand
certificate-basedauthenticationofthecommunicationspartner.
UsingacommerciallyavailableUSBheadsetorasimpleUSBdeskphonesystemissufficient.
AdhocVoIP-Encryption
EncryptedVoiceCommunication
©UBIQUETechnologiesGmbH www.ubique-technologies.de
FleetinternatVoIP-Encryption
Forfleetinternalencryptedvoicecommunicationweuseanencryptingappliancethatcanbeplacedinorganizations
headquarterandneedstogetconnectedinfrontoftheexitingPBX.
AsanoptionPBXandVoIP-Encryption-AppiancecanbeplacedinoneofourGermanDatacenter.
AfteractivationoftheserviceencryptedVoIP-Callswillbeavailablebetweenthecorporatesheadquarter,vesselsand
singlepersons.Ineverycasewegrantthatinfrontoftheconnectiontheuseddeviceswillgetauthenticatedandthatalso
thehandshake-infrontoftheestablishingofancommunicationchannel–willbeinitiallycrypted.
Fortheusageofthisserviceeverysmartdevice,PCorFortheusageofthisserviceeverysmartdevice,PCorVoIP-enableddevicecangetused.
EncryptedVoiceCommunication
©UBIQUETechnologiesGmbH www.ubique-technologies.de
EncryptedEmailCommunication&DataTransfer
Currentencryptionmethodsforemailcommunicationareusuallybasedononeoftwostandards:PGPorS/Mime.These
standardsaredesignedtoensuresecureend-to-endencryptionandwhenproperlyapplied,bothstandardsmeetthe
highestsafetyrequirements.
Unfortunately,bothmethodsrequirethattheclientsystemsusedarecleanandfreeofspywareormalwaresuchas
RootkitsorTrojans.Basedonourexperiencesandthoseofourparentcompany,wemustalwaysassumethatnosystem
istrustworthy.
TheThesystem weprovideforthesecureexchangeofemailmessagesisthereforebasedonadedicatedcommunications
server,wherepartnerscanexchangesecurecommunicationsandtheencryptedinformationisuploadedtotheindividual
emailclientonlyifneeded.
Inaddition,thesystemprovidedissupportedbyboththePGPundS/Mimestandards.
EncryptedEmailCommunication
©UBIQUETechnologiesGmbH www.ubique-technologies.de
TECHNOLOGIES
ubique
AdistinguishedCyberSecurityspecialistsince2011,UBIQUETechnologiesoffersworldwideprotectionfordigital
infrastructuresagainstmanipulation,infiltrationandIT-relatedmalfunctions.WithCyberSecurityCommand
Centers,mannedaroundtheclockinitsowndatacentersinGermany,UBIQUETechnologiesstandsfortheimme-
diatedefenseagainstdigitalattacksaswellastargetedinitiationofappropriatecountermeasurestoprotectdigital
andphysicalvalues.
UBIQUETechnologiesGmbH
ChristianNowitzki,Geschäftsführer
UBIQUETechnologiesGmbH
Economic success is created through entrepreneurial
thinkingandaction.Appropriateriskmanagementensures
successaswellasmakingeconomicriskspredictable.
Becausewespecializeintheprotectionofdigitalinfra-
structures,wecanensurethesecurityofyourcompanyand
theprotectionofyourinformationandassets.
UBIQUETechnologiesGmbH
Mühlstraße50
63762Großostheim
Germany
Telefon:+49(6093)3699990
www.ubique-technologies.dekontakt@ubique-technologies.de
ubique
TECHNOLOGIES
securesolutionsforasecurebusiness

Contenu connexe

Tendances

Proyecto Final (IoT, Cloud Computing, Domotica)
Proyecto Final (IoT, Cloud Computing, Domotica)Proyecto Final (IoT, Cloud Computing, Domotica)
Proyecto Final (IoT, Cloud Computing, Domotica)GabrielaNicole4
 
Presentacion final inf103
Presentacion final   inf103Presentacion final   inf103
Presentacion final inf103FabiolaTorres61
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agendaCopperberg
 
Reinhard Posch
Reinhard PoschReinhard Posch
Reinhard PoschTecnimap
 
Living In a World of Data Exploitation - CPDP 2017
Living In a World of Data Exploitation - CPDP 2017Living In a World of Data Exploitation - CPDP 2017
Living In a World of Data Exploitation - CPDP 2017Frederike Kaltheuner
 
Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell GoodmanCloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell Goodmanjonneiditz
 

Tendances (7)

AASTMT Case Study
AASTMT Case StudyAASTMT Case Study
AASTMT Case Study
 
Proyecto Final (IoT, Cloud Computing, Domotica)
Proyecto Final (IoT, Cloud Computing, Domotica)Proyecto Final (IoT, Cloud Computing, Domotica)
Proyecto Final (IoT, Cloud Computing, Domotica)
 
Presentacion final inf103
Presentacion final   inf103Presentacion final   inf103
Presentacion final inf103
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agenda
 
Reinhard Posch
Reinhard PoschReinhard Posch
Reinhard Posch
 
Living In a World of Data Exploitation - CPDP 2017
Living In a World of Data Exploitation - CPDP 2017Living In a World of Data Exploitation - CPDP 2017
Living In a World of Data Exploitation - CPDP 2017
 
Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell GoodmanCloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell Goodman
 

En vedette

Power point on linux commands,appache,php,mysql,html,css,web 2.0
Power point on linux commands,appache,php,mysql,html,css,web 2.0Power point on linux commands,appache,php,mysql,html,css,web 2.0
Power point on linux commands,appache,php,mysql,html,css,web 2.0venkatakrishnan k
 
Overcoming challenges relating to operational implementation
Overcoming challenges relating to operational implementationOvercoming challenges relating to operational implementation
Overcoming challenges relating to operational implementationsaamali
 
Tablets: Evolving from Personal to Business By Elaine B. Coleman, Desirée Dav...
Tablets: Evolving from Personal to Business By Elaine B. Coleman, Desirée Dav...Tablets: Evolving from Personal to Business By Elaine B. Coleman, Desirée Dav...
Tablets: Evolving from Personal to Business By Elaine B. Coleman, Desirée Dav...ElainebColeman
 
Final Nacional Premio EmprendedorXXI 2009
Final Nacional Premio EmprendedorXXI 2009Final Nacional Premio EmprendedorXXI 2009
Final Nacional Premio EmprendedorXXI 2009Caixa Capital Risc
 
EPSILON'S ENTERPRISE CONNECT SERVICES: TURNING PAIN POINTS INTO PROFITABILITY
EPSILON'S ENTERPRISE CONNECT SERVICES: TURNING PAIN POINTS INTO PROFITABILITYEPSILON'S ENTERPRISE CONNECT SERVICES: TURNING PAIN POINTS INTO PROFITABILITY
EPSILON'S ENTERPRISE CONNECT SERVICES: TURNING PAIN POINTS INTO PROFITABILITYGeraldine Tan
 
Tweets und Aktienkurse? Wertvolle Erkenntnisse durch Data Blending gewinnen
Tweets und Aktienkurse? Wertvolle Erkenntnisse durch Data Blending gewinnenTweets und Aktienkurse? Wertvolle Erkenntnisse durch Data Blending gewinnen
Tweets und Aktienkurse? Wertvolle Erkenntnisse durch Data Blending gewinnenit-novum
 
28noviembre1970
28noviembre197028noviembre1970
28noviembre1970VESCELIA
 
Programa dia de_la_persona_emprendedora_2011_aragon
Programa dia de_la_persona_emprendedora_2011_aragonPrograma dia de_la_persona_emprendedora_2011_aragon
Programa dia de_la_persona_emprendedora_2011_aragonCarmen Urbano
 
Rauchgasentstickung | weyer spezial
Rauchgasentstickung | weyer spezialRauchgasentstickung | weyer spezial
Rauchgasentstickung | weyer spezialweyer gruppe
 
Aplicacion de nuevas tecnologias Internet
Aplicacion de nuevas tecnologias Internet Aplicacion de nuevas tecnologias Internet
Aplicacion de nuevas tecnologias Internet Jhair2012
 
Plantilla con-normas-icontec (4)
Plantilla con-normas-icontec (4)Plantilla con-normas-icontec (4)
Plantilla con-normas-icontec (4)Juan Ossa
 
I Sistemi di scambio non monetari
I Sistemi di scambio non monetariI Sistemi di scambio non monetari
I Sistemi di scambio non monetariIFLab
 
Functional analysis aiesec in spain 1213
Functional analysis aiesec  in spain 1213Functional analysis aiesec  in spain 1213
Functional analysis aiesec in spain 1213Jeesoo
 
Spirent TestCenter Virtual on OracleVM
Spirent TestCenter Virtual on OracleVMSpirent TestCenter Virtual on OracleVM
Spirent TestCenter Virtual on OracleVMMalathi Malla
 
Parques Nacionales de Canarias
Parques Nacionales de CanariasParques Nacionales de Canarias
Parques Nacionales de Canariasalbahm
 
Hidrogeología básica de la Península de Yucatán
Hidrogeología básica de la Península de YucatánHidrogeología básica de la Península de Yucatán
Hidrogeología básica de la Península de YucatánEmiliano Monroy Ríos
 

En vedette (20)

Algoritmos
AlgoritmosAlgoritmos
Algoritmos
 
Power point on linux commands,appache,php,mysql,html,css,web 2.0
Power point on linux commands,appache,php,mysql,html,css,web 2.0Power point on linux commands,appache,php,mysql,html,css,web 2.0
Power point on linux commands,appache,php,mysql,html,css,web 2.0
 
Overcoming challenges relating to operational implementation
Overcoming challenges relating to operational implementationOvercoming challenges relating to operational implementation
Overcoming challenges relating to operational implementation
 
Tablets: Evolving from Personal to Business By Elaine B. Coleman, Desirée Dav...
Tablets: Evolving from Personal to Business By Elaine B. Coleman, Desirée Dav...Tablets: Evolving from Personal to Business By Elaine B. Coleman, Desirée Dav...
Tablets: Evolving from Personal to Business By Elaine B. Coleman, Desirée Dav...
 
Final Nacional Premio EmprendedorXXI 2009
Final Nacional Premio EmprendedorXXI 2009Final Nacional Premio EmprendedorXXI 2009
Final Nacional Premio EmprendedorXXI 2009
 
EPSILON'S ENTERPRISE CONNECT SERVICES: TURNING PAIN POINTS INTO PROFITABILITY
EPSILON'S ENTERPRISE CONNECT SERVICES: TURNING PAIN POINTS INTO PROFITABILITYEPSILON'S ENTERPRISE CONNECT SERVICES: TURNING PAIN POINTS INTO PROFITABILITY
EPSILON'S ENTERPRISE CONNECT SERVICES: TURNING PAIN POINTS INTO PROFITABILITY
 
Programa Conjunto: Justicia, Seguridad, Comunidad y Desarrollo Económico
Programa Conjunto: Justicia, Seguridad, Comunidad y Desarrollo EconómicoPrograma Conjunto: Justicia, Seguridad, Comunidad y Desarrollo Económico
Programa Conjunto: Justicia, Seguridad, Comunidad y Desarrollo Económico
 
Tweets und Aktienkurse? Wertvolle Erkenntnisse durch Data Blending gewinnen
Tweets und Aktienkurse? Wertvolle Erkenntnisse durch Data Blending gewinnenTweets und Aktienkurse? Wertvolle Erkenntnisse durch Data Blending gewinnen
Tweets und Aktienkurse? Wertvolle Erkenntnisse durch Data Blending gewinnen
 
Dossier Avalon Red
Dossier Avalon RedDossier Avalon Red
Dossier Avalon Red
 
28noviembre1970
28noviembre197028noviembre1970
28noviembre1970
 
Programa dia de_la_persona_emprendedora_2011_aragon
Programa dia de_la_persona_emprendedora_2011_aragonPrograma dia de_la_persona_emprendedora_2011_aragon
Programa dia de_la_persona_emprendedora_2011_aragon
 
Rauchgasentstickung | weyer spezial
Rauchgasentstickung | weyer spezialRauchgasentstickung | weyer spezial
Rauchgasentstickung | weyer spezial
 
Aplicacion de nuevas tecnologias Internet
Aplicacion de nuevas tecnologias Internet Aplicacion de nuevas tecnologias Internet
Aplicacion de nuevas tecnologias Internet
 
Drum Cafe
Drum CafeDrum Cafe
Drum Cafe
 
Plantilla con-normas-icontec (4)
Plantilla con-normas-icontec (4)Plantilla con-normas-icontec (4)
Plantilla con-normas-icontec (4)
 
I Sistemi di scambio non monetari
I Sistemi di scambio non monetariI Sistemi di scambio non monetari
I Sistemi di scambio non monetari
 
Functional analysis aiesec in spain 1213
Functional analysis aiesec  in spain 1213Functional analysis aiesec  in spain 1213
Functional analysis aiesec in spain 1213
 
Spirent TestCenter Virtual on OracleVM
Spirent TestCenter Virtual on OracleVMSpirent TestCenter Virtual on OracleVM
Spirent TestCenter Virtual on OracleVM
 
Parques Nacionales de Canarias
Parques Nacionales de CanariasParques Nacionales de Canarias
Parques Nacionales de Canarias
 
Hidrogeología básica de la Península de Yucatán
Hidrogeología básica de la Península de YucatánHidrogeología básica de la Península de Yucatán
Hidrogeología básica de la Península de Yucatán
 

Similaire à Managed-Defence-on-Vessels_en

Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotesStudying
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture Symantec
 
Massive Data Collection
Massive Data CollectionMassive Data Collection
Massive Data CollectionLeandro Agro'
 
CABA Whitepaper - Cybersecurity in Smart Buildings
CABA Whitepaper - Cybersecurity in Smart BuildingsCABA Whitepaper - Cybersecurity in Smart Buildings
CABA Whitepaper - Cybersecurity in Smart BuildingsIron Mountain
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
presentation-2022.pptx
presentation-2022.pptxpresentation-2022.pptx
presentation-2022.pptxAhmedSharshar6
 
Securing 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and VirtualizationSecuring 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and VirtualizationDr. Edwin Hernandez
 
IoT digest. March 2018
IoT digest. March 2018IoT digest. March 2018
IoT digest. March 2018ElifTech
 
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMSecurity Gen
 
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMSecurity Gen
 
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMSecurity Gen
 
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and FirewallGuardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and FirewallSecurityGen1
 
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...Nabil Bouzerna
 
WmScammell--CDX-Chi-D1-p1
 WmScammell--CDX-Chi-D1-p1 WmScammell--CDX-Chi-D1-p1
WmScammell--CDX-Chi-D1-p1William Scammell
 
21 Innovative IoT Products To Watch at Hannover Messe 2017
21 Innovative IoT Products To Watch at Hannover Messe 201721 Innovative IoT Products To Watch at Hannover Messe 2017
21 Innovative IoT Products To Watch at Hannover Messe 2017Kudzai Manditereza
 

Similaire à Managed-Defence-on-Vessels_en (20)

Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotes
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture
 
Massive Data Collection
Massive Data CollectionMassive Data Collection
Massive Data Collection
 
Leandro Agrò
Leandro AgròLeandro Agrò
Leandro Agrò
 
Insecure mag-19
Insecure mag-19Insecure mag-19
Insecure mag-19
 
CABA Whitepaper - Cybersecurity in Smart Buildings
CABA Whitepaper - Cybersecurity in Smart BuildingsCABA Whitepaper - Cybersecurity in Smart Buildings
CABA Whitepaper - Cybersecurity in Smart Buildings
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
presentation-2022.pptx
presentation-2022.pptxpresentation-2022.pptx
presentation-2022.pptx
 
Securing 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and VirtualizationSecuring 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and Virtualization
 
DVCOM
DVCOMDVCOM
DVCOM
 
DVCOM
DVCOMDVCOM
DVCOM
 
IoT digest. March 2018
IoT digest. March 2018IoT digest. March 2018
IoT digest. March 2018
 
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
 
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
 
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
 
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and FirewallGuardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
 
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
 
WmScammell--CDX-Chi-D1-p1
 WmScammell--CDX-Chi-D1-p1 WmScammell--CDX-Chi-D1-p1
WmScammell--CDX-Chi-D1-p1
 
21 Innovative IoT Products To Watch at Hannover Messe 2017
21 Innovative IoT Products To Watch at Hannover Messe 201721 Innovative IoT Products To Watch at Hannover Messe 2017
21 Innovative IoT Products To Watch at Hannover Messe 2017
 
Bretagne at Mobile World Congress 2015
Bretagne at Mobile World Congress 2015Bretagne at Mobile World Congress 2015
Bretagne at Mobile World Congress 2015
 

Managed-Defence-on-Vessels_en