Innovation Towards a next generation secure internet Private Application Ecosystems Sanjay Deshpande CEO and Chief Innovation Officer Center.

Slides:



Advertisements
Similar presentations
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
Advertisements

 What Is Desktop Virtualization?  How Does Application Virtualization Help?  How does V3 Systems help?  Getting Started AGENDA.
Enabling IPv6 in Corporate Intranet Networks
SPEKE S imple Password-authenticated Exponential Key Exchange Robert Mol Phoenix Technologies.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
SCRUB: Secure Computing Research for Users’ Benefit David Wagner 1.
© 2014 VMware Inc. All rights reserved. Entwicke ln Sie Ihre Desktop Infrastruktur für die mobile Welt Klaus Kremser, Manager, System Engineering, VMware.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Telecommunications and Networks Business value of networks Network components Chapter 6 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies,
Andrew Schroeder Networking Aspects of Cloud Computing.
Top 10 Strategic Technology Trends for 2013 A Channel Partners Slide Show … as highlighted at.
OWASP Mobile Top 10 Why They Matter and What We Can Do
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Intranet, Extranet, Firewall. Intranet and Extranet.
BUSINESS B1 Information Security.
© 2010 VMware Inc. All rights reserved From Datacenter to Device: Security in the Enterprise 2012 and Beyond Dr. Stephen Herrod, CTO February 27, 2012.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Internet Banking 3.0 Towards a National Secure (and private) Internet infrastructure for Online Banking.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Explain the purpose of an operating system
·
University Health Care Computer Systems Fellows, Residents, & Interns.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
CLOUD COMPUTING. What is cloud computing ? History Virtualization Cloud Computing hardware Cloud Computing services Cloud Architecture Advantages & Disadvantages.
Cloud Computing is a Nebulous Subject Or how I learned to love VDF on Amazon.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
ZIMBRA ROADMAP. Contains proprietary and confidential information owned by Synacor, Inc. © / 2015 Synacor, Inc. Deliver an advanced, feature rich collaboration.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Published by Flat World Knowledge, Inc. © 2014 by Flat World Knowledge, Inc. All rights reserved. Your use of this work is subject to the License Agreement.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Huawei Enterprise AnyOffice BYOD Solution
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Lucidchart Extends Collaborative, Cross-Platform Diagramming Solution for Individuals, SMBs, and Enterprises with New Microsoft Office 365 Add-Ins OFFICE.
IT Security Awareness Day October 19, 2016
The time to address enterprise mobility is now
Do you know who your employees are sharing their credentials with
Top 10 Strategic Technology Trends for 2013
Virtual Private Networks
Customized Solutions to your needs
Make Your Management and Board Meetings More Effective and Paperless with Microsoft Office 365, SharePoint, and the Pervasent Board Papers App Partner.
Virtual Private Networks (VPN)
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
BOMGAR REMOTE SUPPORT Karl Lankford
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Top 10 Strategic Technology Trends for 2013
Protecting your data with Azure AD
Unit 8 Network Security.
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

Innovation Towards a next generation secure internet Private Application Ecosystems Sanjay Deshpande CEO and Chief Innovation Officer Center

So whats wrong with the Internet!! (Nothing???) Its almost free! Anyone can use it (no permissions required for accessing it!) Its available and pervasive (almost everywhere now) Anyone can create any website, put any content, on any server, with any IP address with absolutely NO GOVERNMENT CONTROL! Its freedom and democracy at its best!

The Inter-network A US Defense (DARPA) initiative that was commercialized and adopted (blindly) by the mainstream enterprises Source: Wikipedia

4 © Copyright 2010 UNIKEN Inc. All rights reserved

The Trust (?) Model Hardware [PC/Mobile/Tablets] Operating Systems Browsers [APP-Viewers] DNS [Server Location] Certification Authority Ecosystem [Server Identity] TCP/IP {or UDP} [Data Transport] User Identity [Login/Password/ OTP/Biometric]

Service and User Categorization on the Internet Services that DO NOT require security and privacy/secrecy Users who do not care for privacy or security Services that require security and privacy Users who CARE about Privacy and Secrecy

The current Internet Application Model is Broken. Period. No matter what you do on top of it, it will remain vulnerable to attacks if it is used for services that it was never designed for!

THE FUNDAMENTAL PROBLEM The current internet/intranet (TCP/IP or UDP) based client-server application model does not provide a trusted ecosystem for authenticated communication between the client and server (or Application to Application authentication and secrecy)

IS IT TIME TO RELOOK AT THE BASIC COMPUTING TECHNOLOGIES THAT CAN CATER TO SPECIFIC NEEDS ARISING OUT OF HIGH SECURITY COMPUTING APPLICATIONS? DO WE NEED A RADICALLY NEW APPROACH TO CREATE A NEXT GENERATION HIGH-SECURITY COMPUTING INFRASTUCTURE?

What if there was a way to create a Private Application Ecosystem which enabled hi-touch and ubiquitous user experience across devices over a massively scalable Private Communication Channels/Circuits with End-to-End Military Grade Security?

REL-ID ECO: A SECURE PRIVATE APPLICATION ECOSYSTEM

The REL-ID ECO - Secure Private Application Ecosystem - is a closed ecosystem wherein the applications (services), enterprise data, devices and underlying communication within this ecosystem are completely private, secure and not accessible (or even visible) to the outside world. Only authorized users, applications and devices can have access to this Private Application Ecosystem. The REL-ID ECO - Secure Private Application Ecosystem - is a closed ecosystem wherein the applications (services), enterprise data, devices and underlying communication within this ecosystem are completely private, secure and not accessible (or even visible) to the outside world. Only authorized users, applications and devices can have access to this Private Application Ecosystem. [Note: This break-through technology has been developed and patented, over several years of R&D in the UNIKEN INNOVATION CENTER].

Private Application Ecosystem

Private Communication Circuit

App-Viewer Desktop/Laptop APPS/Widgets Enterprise HTML5 Quick Apps

HYBRID APP TECHNOLOGY Tablets/Smart Phones Device Binding 2-Factor Authentication Containerization Always On Mutual Authentication MITM Proof Encrypted Channels Location Based Services

DATE | TIME | 0030HRS Special Purpose Secure Enterprise Computing Appliance Biometric Authentication (optional) Additional Smart Card Authentication (optional)

Memory device with an invisible secure space. Secure data storage. With the rise in security threats related to theft of critical enterprise information the need for a high-performance portable secure memory device is quite evident. Unikens innovation center has developed a secure memory device which ensures that sensitive high-value data and applications are protected. REL-ID SECURE PORTABLE MEMORY DEVICE

INDIA PRIVATE (SECURE) INTERNET! A CLOSED PRIVATE APPLICATION ECOSYSTEM FOR CRITICAL NATIONAL ASSETS AND ENTERPRISES

MEET US AT THE UNIKEN BOOTH IF YOU WANT TO KNOW MORE, OR EVEN IF YOU DISAGREE WITH US! IN EITHER CASE WE WOULD LIKE TO TALK TO YOU. THANK YOU!

Secure Private Application Ecosystem Container Secure App-Viewer Mutually-Authenticated, Encrypted & Tunneled Pipe Secure Data Store Device Signature Device 3 rd Party Apps OS 2FA/3FA RELIDGATERELIDGATE RELIDGATERELIDGATE REL-ID ECO PLATFORM REL-ID ECO PLATFORM Enterprise Application Data Center Enterprise Application Data Center Desktops/Laptops/Tablets/SmartPhones [Windows, iOS, Android, MacOS, Linux] Command Center Private Communication Channel/Circuit [Internet/Intranet]

REL-ID Private Communication Channel (R-PCC) Mutually Authenticated Communication Handshake (MITM Proof) Encrypted Communication (optional), High-Speed and Concurrent Horizontally Scalable (Millions of End-Points) Assets behind R-PCC are not visible to the Internet and hence protected from various attacks Requires zero admin privileges on end-user devices Is created ON-DEMAND Is agnostic to the underlying NETWORK (Internet or Intranet) RPCC Agent can be embedded in any third party application stack (both software and firmware) Network Application REL-ID PCC Agent R-PCC (REL-ID Mutually Authenticated and Encrypted Channel) Internet or Intranet

Secure Private Communication Circuit/Channel (Internet and Intranet) RELID GATERELID GATE RELID GATERELID GATE Massively Scalable Secure Private Communication Circuit/Channel Applications/Services on this channel are NOT visible and accessible outside of this channel/circuit The end-users could be customers, employees and partners The devices could be laptops/desktops, mobile phones, tablets This enables a closed, controlled, highly secure private ecosystem Massively Scalable Secure Private Communication Circuit/Channel Applications/Services on this channel are NOT visible and accessible outside of this channel/circuit The end-users could be customers, employees and partners The devices could be laptops/desktops, mobile phones, tablets This enables a closed, controlled, highly secure private ecosystem Enterprise Services Third Party Services Third Party Services REL-ID ECO PLATFORM REL-ID ECO PLATFORM Command Center Device

REL-ID GATE App Management Identity Management Device Management Authentication (2FA/3FA) Access Management R-PCC* Over Intranet R-PCC* Over Internet Secure Channel Enterprise Web-Apps [ Virtual Image ] Enterprise Mobile Apps 3 rd Party Web-Apps [Virtual Image] 3 rd Party Mobile Apps Command Center Secure Channel Employee Partner Customer REL-ID Widget (Secure Client App Container) Mobile Phones, Tablets, Desktops and Laptops *R-PCC: REL-ID Private Communication Channel (Encrypted) THE REL-ID ECO TM Internet Private Data Center