Kevin Sharp Customer Engagement Manager Janet, Public Access & The Cloud.

Slides:



Advertisements
Similar presentations
Secure Internet Solutions Geoff Huston Chief Scientist, Internet Telstra.
Advertisements

GNSO goals Bruce Tonkin Chair, GNSO Council Sao Paulo, 4 Dec 2006.
U M T S F o r u m © UMTS 2002 UMTS Security aspects UMTS Forum ICTG Chair Bosco Fernandes Siemens AG
Workshop on Telecommunications for Disaster Relief, February 2003, Geneva Dag Nielsen & Catherine Mulligan Ericsson Response WLAN in Disaster and.
1 MEF Reference Presentation December 2012 Carrier Ethernet Delivery of Cloud Services.
© JANET(UK) 2011 Running a Public Communications Service Andrew Cormack Chief Regulatory Adviser, Janet
John Littledale Service Lead Network Services Group Janet(UK) East Scotland.
Copyright JANET(UK) JANET txt & JANET 3G. Copyright JANET(UK) Simple, intuitive, web-based messaging Secure online address book Individual.
Commissioning Development Programme Building choice of high quality support for commissioners Commissioning Support Services Tests for Business Intelligence,
IP EDGE DEVICES A solution for the Internet Migration Patrick Cocquet, 6WIND CEO, IPv6 Forum VP Dubai IPv6 Forum Summit – February 2001.
A National Wireless Network for HEI Glenn Wearen Terena TF-Mobility Meeting Dec’08.
Net Neutrality, What Else? Wim Nauwelaerts Partner Hunton & Williams.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Introducing VPNs.
HEAnet Wireless Strategy. Brief Investigate nationally ubiquitous wireless access to the HEAnet network for all HEAnet clients. Identify all potential.
Security Firewall Firewall design principle. Firewall Characteristics.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Provider Opportunities for Enterprise MPLS APRICOT 2006, Perth Matt.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Net Neutrality Questions. What if? Customer Lamps for Less Luxurious Lumination Telephone Company Welcome to lamps [click] [dial tone] Welcome to Luxurious.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
Data Security in Local Networks using Distributed Firewalls
Interconnection and Regulation of IP-Networks Ass. Sven Tschoepe, LL.M 15/5/04 ITS 15th Biennial Conference Berlin, Germany September, Internationalisation.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Internet Protocol Security (IPSec)
Text and data mining for non-commercial research: the UK’s planned exception to copyright UK Government 22 April 2013, Brussels.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Igroup Legacy Applications and the Hybrid Cloud Hugh Valentine Head of Business Development Cloud Point James Lowery igroup Marketing.
Smart Service Delivery in Challenging Times Shared services – what does it mean for you? Alan Higgins Chair, CIEH Council Director, Environmental Health.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Internal Auditing and Outsourcing
1 “Summary results of the comparative survey on the transposition of Directive 2009/81” Col. Paolo LIZZA IT MoD SGD-DNA Rome, 12 july 2011”
Jordan Wissel Eric Lewis Sarah Basile. Introduction This presentation will analyze: Overview/History Implementation Advantages/Disadvantages Security.
StorTech Security Regulatory compliance provides the business foundation for security Organisations need to tackle all security challenges from a business.
Technical Policy and Standards Andy Gorton – Senior Architect: Institutional Networks.
Building Blocks for a Successful Public- Private Partnerships Presented by Igor Abramov Counsel & Co-chair, Eurasia and Russia Practice Group, Heenan Blaikie.
Policies for Peering and Internet Exchanges AFIX Technical Workshop Session 8.
©2015 EarthLink. All rights reserved Cloud Express ™ Optimize Your Business & Cloud Networks.
Module 8: Planning and Troubleshooting IPSec. Overview Understanding Default Policy Rules Planning an IPSec Deployment Troubleshooting IPSec Communications.
PPP Legal & Regulatory Framework. PPP Policy In July 2008 GOK approved the PPP policy directive through which: PPPs are identified as a method for investing.
Expanding Access to Canadian Derivatives Clearing.
E-Science Security Roadmap Grid Security Task Force From original presentation by Howard Chivers, University of York Brief content:  Seek feedback on.
Benefits and Value of an IXP The IXP Value Proposition.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
CSRP: Post-bind Submission (PbS) On-line Submission Portal High Level Design July 2015.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
ROMANIA NATIONAL NATURAL GAS REGULATORY AUTHORITY Public Service Obligations in Romanian Gas Sector Ligia Medrea General Manager – Authorizing, Licensing,
What is SWGfL? A not-for-profit charity owned and directed by the 15 member LAs An organisation that deals exclusively with education and public sector.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Deployment Planning Services
Hybrid Cloud Web Filtering Platform
ARI’S Services Contract Research & Consulting Engaging with industry
European preparations for the WCIT
VIRTUALIZATION & CLOUD COMPUTING
Integrated Management System and Certification
Deployment Planning Services
Product Datasheet AppSense DataNow 4.1
Paul Woods Chair, MITIGATION: Ensuring we procure cloud services taking into account of the risks involved Paul Woods Chair, ISNorthEast.
Vendor Management and Software Asset Management
Internet Interconnection
Secure and Private Event-Photo Sharing Made Scalable and Reliable Thanks to Microsoft Azure “With Microsoft we found a good partner we trust, and with.
Virtual Private Network
Operationalizing Export Certification and Regionalization Programmes
Mika Lodge 2-3 October, 2013 Ministry of Commerce Trade and Industry
CEng progression through the IOM3
Presentation transcript:

Kevin Sharp Customer Engagement Manager Janet, Public Access & The Cloud

In the course of reviewing BCE guidlelines it became clear that there was an interest in finding a mechanism to allow customers to offer public access to the Internet via Janet. Currently Janet is classified as a private network and therefore is exempt from some legislation that affects networks that allow public access (in particular to retain data about use of the network, to report to regulators on resilience and security and, in future, to deal in prescribed ways with misuse by our users and their equipment). Background

What & Why Public Access? Anything that requires internet access outside the scope of “standard” provision (including eduroam)

The project took three phases: Requirements Gathering – 98% of respondents indicated a requirement in this area,. – The key factor is they trust/expect Janet to go through due process to identify the best solution and deliver it in the most cost effective manner. Identification of potential solutions – Regulatory compliance – Janet owned & operated “public access infrastructure” – A market solution Implementation – Policy amendment – The Cloud chosen as a non-exclusive partner Identifying a solution

1.The point-to-point tunnel must be established from the Janet customer’s premises to an Internet Access Provider (e.g a commercial ISP) with whom the customer has an agreement; 2.The tunnel must be encrypted between its endpoints, so that no traffic from members of the public is carried on the Janet IP service 3.Users of the service must be authenticated, either by the Janet customer or its partner Internet Access Provider; 4.Traffic from members of the public, when routed to the public Internet, must be identified as originating from the partner Internet Access Provider, not from Janet or the customer; 5.The customer and Internet Access Provider are responsible for compliance with any relevant laws and policies applying to public Internet access, for example on logging and filtering. Regulatory Compliance

Solution Design

Adheres to technical & regulatory requirements. Uses existing Janet infrastructure – Flexibility to scale up/down bandwidth requirements in line with need – Simple configuration / network management – Recognised Janet availability/reliability Using an approved Janet partner removes the need for procurement/tender Cost savings - no circuit costs, no tender / procurement overhead, reduced management overhead, reduced on-going support overhead. Benefits of using a Janet solution

Over 50 enquiries 5 universities signed up 4 more imminent Oxford and Cambridge under negotiation Other providers now interested and starting negotiations Current situation:-

Janet Kevin Sharp Customer Engagement Manager Tel: Mob: The Cloud Rod Howell Internal Account Management M: +44 (0) T: +44 (0) | Further information