Reliable VPN Solutions IN IOT Environments

Slides:



Advertisements
Similar presentations
Implementing Tableau Server in an Enterprise Environment
Advertisements

All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Remote Networking Architectures
Hotspot Express Product Presentation. Agenda 1.Product Perspective 2.Managed Services 3.Conclusion.
Public Key Infrastructure Ammar Hasayen ….
ASA 5505 SSL VPN Joe Cicero Northeast Wisconsin Technical College.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Extending user controlled security domain.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Sitefinity Partner Program
VPN Security Policy By: Fred Cicilioni. VPN, or Virtual Private Network, is a protocol that allows remote access, allowing the user to connect to all.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Lieberman Software Random Password Manager & Two-Factor Authentication.
Module 8: Managing Terminal Services. Overview Use and manage Terminal Services RemoteApp programs Use and manage Terminal Services Gateway Optimize and.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
SharePoint in the Education Space Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Module 3: Planning Administrative Access. Overview Determining the Appropriate Administrative Model Designing Administrative Group Strategies Planning.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Vodafone Business Cloud
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Digital Identity and My Data as Business Enablers 1 My Pekka Turpeinen, Business Architect.
Avtec Inc Virtualization - Securely Moving to the Cloud.
Corporate Presentation. 2 Who is AEP Networks? “Trusted Security Everywhere” AEP Networks provides trusted security everywhere and secures data and voice.
CLOUDENTIFY.
Unit 3 Virtualization.
Basharat Institute of Higher Education
Virtual Private Networks
Chapter 1: Exploring the Network
Virtual Private Networks (VPN)
Smart Retail Digital Store.
ICENI SERVICES The future of customer experience.
Information Security Professionals
Implementing Network Access Protection
Radius, LDAP, Radius used in Authenticating Users
Power BI Security Best Practices
How Smart Networks are Changing Corporate Networks
Virtual Private Networks (VPN)
CS691 M2009 Semester Project PHILIP HUYNH
IS4550 Security Policies and Implementation
Unit 27: Network Operating Systems
Identity Processor Secures IoT Systems
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Introduction to z/OS Security Lesson 4: There’s more to it than RACF
CS691 M2009 Semester Project PHILIP HUYNH
Server-to-Client Remote Access and DirectAccess
Understanding Cisco Router Security
Goals Introduce the Windows Server 2003 family of operating systems
Virtual Private Network
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Final Conference in Paris WP6 – Protection Profiles Specification
Platform Architecture
Big Data and IoT FTG-07.
Agenda Create certificates for the GlobalProtect Portal, internal gateway, and external gateway. Attach certificates to a SSL-TLS Service Profile. Configure.
Open Automation Software
560+ people dedicated to innovation across 5 R&D labs
We secure the communication
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
Topic 12: Virtual Private Networks
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Global One Communications
worlds largest IT service provider
Presentation transcript:

Reliable VPN Solutions IN IOT Environments JULIAN WEINBERGER | +1 (650) 316 6273 | www.ncp-e.com

SECURE COMMUNICATION IN IOT ENVIRONMENTS GROWTH OF IOT ENVIRONMENTS IOT MARKET FORECASTS VARY; ALL PREDICT ENORMOUS GROWTH POTENTIAL. PREDICTIONS FOR 2020 RANGE FROM 12 TO 50 BILLION, UP FROM 1 BILLION IN 2010

SECURE COMMUNICATION IN IOT ENVIRONMENTS IMPLEMENTATION APPROACHES FOR VPN AND IOT VPN provided by a carrier via 3G/4G LTE VPN provided by a router via WiFi/HotSpot VPN Software No additional hardware/services required Traffic encrypted on the device

SECURE COMMUNICATION IN IOT ENVIRONMENTS VPN Connections Connection type depends on the machine application Automatic, or always on e.g, surveillance camera Connection on demand, via command line or API e.g., credit card swipe at POS terminal Gateway VPN Management

SECURE COMMUNICATION IN IOT ENVIRONMENTS Authenticating the connection In the absence of human interaction, a machine needs to perform authentication steps to establish a VPN connection. Username / Password Soft certificates Smartcards Hardware / Machine certificates TPM

SECURE COMMUNICATION IN IOT ENVIRONMENTS Authentication methods at a glance

SECURE COMMUNICATION IN IOT ENVIRONMENTS Authentication methods Username / Password Commonly stored in VPN Client on the machine Credentials can be information e.g. the hostname Soft Certificates User certificates stored on local device Every machine has one certificate, which may not be unique to it

SECURE COMMUNICATION IN IOT ENVIRONMENTS Authentication methods Smartcards Physical external smartcard for authentication User certificate on external chip Adds another level of security Basis for two-factor-authentication Machine hardware certificates User/soft certificates relies on machine fingerprint to bind to unique machine Can not be used with any other machine

SECURE COMMUNICATION IN IOT ENVIRONMENTS Authentication methods TPM (Trusted Platform Module) Smartcard build into machine, soldered onto motherboard Adds another level of security Basis for two-factor-authentication

SECURE COMMUNICATION IN IOT ENVIRONMENTS Managing the Vpn Client Full control, everywhere at any time Rollout of software, configurations and authentication information Configuration and software updates VPN Management Authentication management Gateway VPN Management

SECURE COMMUNICATION IN IOT ENVIRONMENTS VPN Central Management - the Single Point of Administration Endpoint Policy USER directory Certification Authority (CA) Software deployment VPN Gateway RADIUS Server

SECURE COMMUNICATION IN IOT ENVIRONMENTS Summary VPN has been the basis for securing IoT environments for some time Automatic, always-on vs. connection on demand is based on application type Consider resources, flexibility and security when selecting authentication method(s) Look for solutions that enable automatic rollout of VPN configurations, certificates and updates

Fleet Management – Connected Cars Scenario Fleet Management – Connected Cars Operational information for 10,000 vehicles NCP Secure Client IIoT Gateway IIoT Management Data Center Onboard Unit with IIoT Remote Gateway lan Wifi

Ticket Vending Machine Scenario Tramway-Information system Information directly on info displays and ticket vending machines IIoT Gateway IIoT Management Data Center IIoT Remote Gateway Info display IIoT Remote Gateway Ticket Vending Machine lan 3G/4G wifi

Secure IN-Store digital display for product promotion Scenario Secure IN-Store digital display for product promotion Digtial signage at grocery stores or pharmacies Grocery store, medical Pracitce, Pharmacy… IIoT Gateway IIoT Management Content Data Center Service Technician Content Management System lan 3G/4G wifi

SECURE COMMUNICATION IN IOT ENVIRONMENTS About NCP engineering – Network Communication Products 30 YEARS REMOTE ACCESS – SECURE COMMUNICATION EXPERTISE Nuremberg - Germany headquarters founded 1986 100 % privately owned San francisco - California established 2010 Clearwater - Florida established 2015 global support team global network of sales partner international OEM partnerships worldwide more than 30,000 customers

Thank you For your Attention JULIAN WEINBERGER | +1 (650) 316 6273 | www.ncp-e.com