Next Generation Network Security using Software-Defined Networking

Slides:



Advertisements
Similar presentations
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
Advertisements

1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
1 Denial of Service in Sensor Networks Authors: Anthony D. Wood, John A. Stankovic Presented by: Aiyaz Amin Paniwala.
Advanced 5G Network Infrastructure for the Future Internet From IoT to U-HDTV, ubiquity Restless Pressure on bandwidth, spectrum crunch Complex traffic.
Assignment 3 LTEC 4550 Cason Parker. Network Hub A Network Hub is a device that connects other devices together using Ethernet cables. Hubs are unintelligent.
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
8.
Trusted End Host Monitors for Securing Cloud Datacenters Alan Shieh †‡ Srikanth Kandula ‡ Albert Greenberg ‡ †‡
Company Founding Customer Wins Series B Investment Scaling The Business $$$ Silver Tail Systems - Key Milestones.
Nick Wainwright HP Labs / Effectsplus project. The report of a consultation of the Future Internet Assembly – a cross disciplinary assembly of researchers.
Didzis Balodis, CISSP, Head of IT Security and Infrastructure at SQUALIO Using the Cloud - practical security implications.
Addition to Networking.  There is no unique and standard definition out there  Cloud Computing is a general term used to describe a new class of network.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Chapter 13 Organizing Information System Resources MIS Department Centralization and Decentralization Outsourcing Computer Facilities and Services.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 IPSec or SSL VPN? Decision Criteria.
CloudEthernet Forum OVERVIEW December 2 nd, 2014.
Mobile Databases: a Selection of Open Issues and Research Directions Authors: Rachid Guerraoui et al. Sources: SIGMOD Record, 33(2), pp.78-83, 2004 Adviser:
PolyServe Matrix Server™ Redefining the Way Servers Talk to Storage Carter George VP, Corporate Development PolyServe.
© 2010 VMware Inc. All rights reserved From Datacenter to Device: Security in the Enterprise 2012 and Beyond Dr. Stephen Herrod, CTO February 27, 2012.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Deploying XenApp and XenDesktop with BIG-IP Brent Imhoff – Field Systems Engineer Gary Zaleski – Solutions Architect Michael Koyfman – Solutions Architect.
Cloud Computing By: Carley Paxton. What is Cloud Computing? CloudCloud computing is the next stage in the Internet's evolution, providing the means through.
Bohatei: Flexible and Elastic DDoS Defense
 Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). 
For Testbeds TM. Secure, multi-tenant cloud orchestration platform –Turnkey platform for delivering IaaS clouds –Hypervisor agnostic –Massively scalable,
What is the cloud ? IT as a service Cloud allows access to services without user technical knowledge or control of supporting infrastructure Best described.
1 MIKE MARCELLIN VP PRODUCT MARKETING. THE NEW NETWORK ENABLES CLOUD SERVICES, SECURITY, MOBILITY AND CONTENT DELIVERY NETWORKS.
Introduction to Databases
Client/Server Model: A Business View The different Client/server implementations differ according to: 1.Where the processing for the presentation of information.
ORGANIZING IT SERVICES AND PERSONNEL (PART 1) Lecture 7.
Network Security: Intro and Overview
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Copyright © 2014 Juniper Networks, Inc. 1 Juniper Unite Cloud-Enabled Enterprise Juniper’s Innovation in Enterprise Networks.
Introduction to Security Dr. John P. Abraham Professor UTPA.
 Full scale audit of all their current network environment  Examination of the current security policy and physical security  Full scale audits will.
Internet of Things. Creating Our Future Together.
1 Cloud-Native Data Warehousing Bob Muglia. 2 Scenarios with affinity for cloud Gartner 2016 Predictions: By 2018, six billion connected things will be.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
GIS IN THE CLOUD Cloud computing furnishes scalable GIS technology that is maintained off premises and delivered on demand as services via the Internet.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
DDoS Protection
SDN & NFV Driving Additional Value into Managed Services.
Journey to the HyperConverged Agile Infrastructure
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
Virtual Private Networks
Virtual Private Networks (VPN)
Barracuda Web Security Flex
Barracuda Firewall The Next-Generation Firewall for Everyone
AT&T Premises-Based Firewall Enhanced SBS Solution
Bringing Harmony To the Multi-Cloud Era
op5 Monitor - Scalable Monitoring
Real-time protection for web sites and web apps against ATTACKS
Best Practices for Securing Hybrid Clouds
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Software Defined Networking Market to grow at 54% CAGR from 2017 to 2024:
CIO G-6 Signal Conference
High Intelligent Network (Smart Pipe)
EIS Fast-track Revision Om Trivedi Enterprise Information Systems
Check Point Connectra NGX R60
A single identity for the modern user
VPN: Virtual Private Network
In House or Cloud Based ERP Implementation
RESCUE System Deliverables
Web services introduction, application and its future
One-slide Research Overview
ENoLL Community and Vision
Chapter-6 Access Network Design.
Find the Perimeter.
Dong Xuan*, Sriram Chellappan*, Xun Wang* and Shengquan Wang+
CNaaS Extending the NREN through Campusnetwork as a Service David Heed
Web portals-B2B-B2C-B2E TRAVELOPRO
Presentation transcript:

Next Generation Network Security using Software-Defined Networking

State of Network Security Fixed-function hardware at network perimeter Intranet Internet

Traditional Network Security is Broken! Attacks growing in scale, diversity, and sophistication! Internet Intranet Current trajectory is impractical  Cost, management complexity, user pain

Our vision: “Software-Defined” network security Flexible , in-depth, progammable defenses! Network Orchestration Layer Admin High level security policy intents Programmable centralized management Flexible “software” network appliances Fixed-function hardware at network perimeter Intranet Internet

Key Technical Challenges Management complexity Scalability Resource management Resilient to “smart” attackers

Two concrete use cases Precise Security Instrumentation for Enterprise Networks Flexible and Elastic DDoS Defense as a Network Service