Corporate Presentation. 2 Who is AEP Networks? “Trusted Security Everywhere” AEP Networks provides trusted security everywhere and secures data and voice.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Ljubomir Ivaniš CPU d.o.o.
The System Center Family Microsoft. Mobile Device Manager 2008.
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Braintree Communications ISDN: A strategic network solution for retail business.
Authentication choices! Vincent van Kooten: Business Sales Manager Benelux Distributed by -
A SOLUTION: 2X REMOTE APPLICATION SERVER. 2X REMOTE APPLICATION SERVER.
Citrix Partner Update The Citrix Delivery Centre.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
Public Key Infrastructure Ammar Hasayen ….
CPE5021 Advanced Network Security ---Network Security and Performance--- Lecture 9 CPE5021 Advanced Network Security ---Network Security and Performance---
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Terminal Services in Windows Server ® 2008 Infrastructure Planning and Design.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Chapter 1: Hierarchical Network Design
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Joseph Ferracin Director IT Security Solutions Managing Security.
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
SafeNet Protects Data at Rest
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
·
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Information systems and management in business Chapter 2 Electronic Business and Business Mobility.
Introducing: Chengdu’s Industrial Cloud Huawei & GDS Services Industrial Cloud Solution for SMEs Author/ID: Zhao Zhijuan/ Dept: Industry Solutions.
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
HCNA-Security Huawei Certified Network Associate Security (HCNA-Security) validates the basics of network security knowledge and skills to support the.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Clouding with Microsoft Azure
Virtual Private Networks
SDN & NFV Driving Additional Value into Managed Services.
Nexbase Invites You To Our Special Products
UNIFED COMMUNICATIONS MANAGEMENT
Unit 3 Virtualization.
Reliable VPN Solutions IN IOT Environments
Virtual Private Networks (VPN)
Barracuda Web Security Flex
Discovering Computers 2010: Living in a Digital World Chapter 14
Module 2: Configure Network Intrusion Detection and Prevention
Logo here Module 8 Implementing and managing Azure networking 1.
Forefront Security ISA
How Smart Networks are Changing Corporate Networks
Virtual Private Networks (VPN)
Veeam Backup Repository
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
SonicWALL Access Security Legacy & Current Themes
Your Business Opportunity
IS4550 Security Policies and Implementation
Unit 27: Network Operating Systems
Mitel Network – SIP Trunking Discussion
Goals Introduce the Windows Server 2003 family of operating systems
Check Point Connectra NGX R60
Virtual Private Network
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
IS4680 Security Auditing for Compliance
Increase and Improve your PC management with Windows Intune
Internet Engineering Course
Topic 12: Virtual Private Networks
Global One Communications
Applying CIM to SD-WAN Weiqiang Cheng, Feng Yang(CMCC)
Presentation transcript:

Corporate Presentation

2 Who is AEP Networks? “Trusted Security Everywhere” AEP Networks provides trusted security everywhere and secures data and voice communication regardless of device, environment or location. Delivering proven security architectures to more than 5,000 organisations all over the world including governments, enterprises and carriers.

3 AEP Networks Evolution Founded in Ireland. Secured funding. ASIC SSL product R&D Founded in Ireland. Secured funding. ASIC SSL product R&D Acquired Netilla Networks - leading US SSL VPN vendor Acquired Netilla Networks - leading US SSL VPN vendor Acquired Baltimore Technologies. Launched network security appliance strategy 200% turnover growth in secure site-to- site product family 65% year- on-year revenue growth Acquired Vados Systems Ltd Acquired Vados Systems Ltd 100% year-on- year EBITDA growth, 20% revenue growth Issued three patents in secure application access Established US corporate headquarters. Product development focus

Secure Application Access Secure Application Access 4 Product Portfolio Overview 44 Products Solutions Remote access Series E Remote access Series E Features Secure policy framework Endpoint verification Cache cleaning Network security Application firewall Manage diverse virtual architectures Enhanced grade Site-to-site and remote access Scalable management Ease of deployment and maintenance FIPS Level 4 Keys positively erased before stolen Proprietary OS – hacker/virus proof Based on truly random numbers Highly scalable Flexible communications platform Legacy protocol conversion Deployable capabilities Automatic configuration Secure Communications Optimised Performance Engine (SCOPE) Secure Communications Optimised Performance Engine (SCOPE) Enhanced Grade Network Encryption Enhanced Grade Network Encryption Key Security and Management Key Security and Management Connectivity solutions Series V Connectivity solutions Series V SecComm HSM Series K CloudProtect Key management portal Appliance Series A Appliance Series A Government Grade Secure Application Access Net Management System Trusted Security Everywhere Support and professional services

5 Secure Application Access AEP Provides “A Secure Application Access gateway that allows corporates to secure access to their application servers and VDI deployments as well as MSPs to secure access to the Cloud services.” Benefits Advanced security application access policy framework Security endpoint verification cache cleaning network security application firewall Manage diverse architectures Citrix, VMWare, Microsoft Terminal Services, Unix, Mainframe

6 AEP Provides “A centrally managed, enhanced grade, site to site and remote access IPSEC hardware encryption solution.” Benefits Enhanced grade Site-to-site and remote access Scalable management Ease of deployment Enhanced Network Grade Encryption Certifications CESG: Enhanced and Baseline Grade DIPCOG (UK MOD) EU Council Security Committee CISPS OCCAR (NATO Restricted)

7 Enhanced Network Grade Encryption: Typical Application Branch Office Public Internet/Private MPLS Data Centre Unencrypted traffic HQ Encrypted traffic ED100M ED20M Branch Office ED20M Branch Office ED20M Branch Office ED100M Remote worker Remote Remote worker Remote Remote worker Remote AEP Net Management System HSM Mgmt ED20M

8 Enhanced Network Grade Encryption ecosystem Corporate infrastructure Internet connections Series E Net Management System Series E Net Concentrator AEP Net Remote Enhanced Network Grade Encryption Net CA HSM Requirements Secure remote access on tour Reliable communications (remote-> UK) Ease-of-use Portable solution Solution AEP Enhanced Network Encryption Laptop/Netbook Benefits Reliable, secure communications Portable communications solution Case Study: The Prime Minister’s Office

9 AEP Provides “A range of HSM based products that provide a FIPS level 4 validated (not certified) secure tamper reactive environment in which to generate, store and use excellent quality keys.” Benefits FIPS Level 4 – tamper reactive Keys positively erased before stolen Hacker/virus proof (proprietary OS) Based on truly random numbers Highly scalable (to 16 devices) High availability Certifications FIPS Level 4 Common criteria CESG Assisted Products Scheme Key Security and Management

10 Series K ecosystem Certificate authority or validation authority equipment DNS Servers Series K Hardware Security Module Load balancer 98% of credit card transactions in Scandinavia processed using AEP solutions at national clearing bank. Many online gaming companies use AEP Key Storage and Security products to digitally sign software to ensure software integrity in order to comply with US regulations. A significant number of online music purchases are digitally signed using AEP Key Storage and Security products. Use cases Key Security and Management

11 Leading Hardware Security Module (HSM) for protecting sensitive applications Market drivers Communication interception Document falsification Internet infrastructure attack Increased regulation and compliance needs Target markets Government Finance Telecoms PKI applications Content providers (e.g. music, software) Electronic gaming machines Domain Name Security Extensions Key Security and Management

12 AEP Provides A high performance communications platform that facilitates modular multi-bearer voice and data distribution in a fixed or deployable solution. Benefits Flexible communications platform (e.g. BGAN, GRPS, Satellite, WAN, etc) Legacy protocol conversation (e.g. X.25) Deployable capabilities Fast deployment through automatic configuration Secure Communications

13 SCOPE ecosystem Communications devices (e.g. satellite, GPRS) Communication devices Vehicles SCOPE high performance communications platform Secure Communications The army use AEP Secure Communications to provide logistics support in theatre around the world. Over 1000 ships use AEP Secure Communications Products to provide ship-to-shore voice, data and fax communications. Use cases

Personal communications Communicate from anywhere Use 3 rd party network connections Communication securely from public internet connection 14 SCOPE: Deployable Communications Anywhere, anytime, any network remote access for field-based communications High threat deployment - TEMPEST SIGINT environments Enhanced Grade Network Encryption Multi-bearer router – 3G, GPRS, ISDN, xDLS, leased line, BGAN Optional data compression for low speed links Assured to SDIP-27 Level A TEMPEST (NATO Zone 0) Office communications Enable group communications Voice, fax and data Secure encrypted access to central resources

Secure Application Access Secure Application Access 15 Summary 15 Products Solutions Remote access Series E Remote access Series E Features Secure policy framework Endpoint verification Cache cleaning Network security Application firewall Manage diverse virtual architectures Enhanced grade Site-to-site and remote access Scalable management Ease of deployment and maintenance FIPS Level 4 Keys positively erased before stolen Proprietary OS – hacker/virus proof Based on truly random numbers Highly scalable Flexible communications platform Legacy protocol conversion Deployable capabilities Automatic configuration Secure Communications Optimised Performance Engine (SCOPE) Secure Communications Optimised Performance Engine (SCOPE) Enhanced Grade Network Encryption Enhanced Grade Network Encryption Key Security and Management Key Security and Management Connectivity solutions Series V Connectivity solutions Series V SecComm HSM Series K CloudProtect Key management portal Appliance Series A Appliance Series A Government Grade Secure Application Access Net Management System Trusted Security Everywhere Support and professional services

Thank you