Technology With Vision September 18, 2002 Hillside, NJ Chaim E. Fried Sr. Network Architect, Firewall integration.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
The Enterprise Guide to Video Conferencing Created using iThoughts [...] [...]
Business Solutions Network Security Solutions Gateway Security
Prepared By Naieem Khan & Ummiya Rahman Presentation On.
Enabling IPv6 in Corporate Intranet Networks
TANDBERG Video Communication Server March TANDBERG Video Communication Server Background  SIP is the future protocol of video communication and.
MVTS & PortaBilling Integration between MVTS (Mera VoIP Transit Softswitch) and PortaBilling100 Vancouver, BC July 2004 Porta Software
Guide to Network Defense and Countermeasures Second Edition
The NAT/Firewall Problem! And the benefits of our cure… Prepared for:Summer VON Europe 2003 SIP Forum By: Karl Erik Ståhl President Intertex Data AB Chairman.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
DSL Access Architectures and Protocols. xDSL Architecture.
Presented by Serge Kpan LTEC Network Systems Administration 1.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Implementation and Evaluation of a Performance Enhancing Proxy for Wireless TCP Scenarios and Architecture.
CS682 – Network Management and Security Session 7.
View IP camera over NAT network CVPP/CVPL Configuration Internet Surveillance Cam Viewer Plus Copyright © PLANET Technology Corporation.
Do you have employees that need to use laptops or tablet devices to access business critical applications from offsite locations? Do.
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
Design Elements for Perimeter Security UNIT-10. Firewall and Router  The firewall and the router are two of the most common perimeter security components.
DataHub ® OPC Tunneller Overview and Demo.  Cogent Real-Time Systems  Established in 1994  Wholly owned subsidiary of Skkynet Cloud Systems  Key stats.
Appliance Firewalls A Technology Review By: Brent Huston T h e B l a c k H a t B r i e f i n g s July 7-8, 1999 Las Vegas.
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
Host Mobility for IP Networks CSCI 6704 Group Presentation presented by Ye Liang, ChongZhi Wang, XueHai Wang March 13, 2004.
Alabama Supercomputer Authority A partnership of … and.
Chapter 3 : Distributed Data Processing Business Data Communications, 4e.
Presents H.323 Forum Glowpoint- A Service provider approach to Video conferencing Presented by Chaim Fried Wire One Technologies.
AARNet Copyright 2011 Network Operations AARNet Enterprise Unified Communications Bill Efthimiou APAN SIP-H323 working group 24 August 2011.
Quintum Confidential and Proprietary 1 Quintum Technologies, Inc. Session Border Controller and VoIP Devices Behind Firewalls Tim Thornton, CTO.
How computer’s are linked together.
SANS Technology Institute GDWP Presentation 1 GIAC Enterprises Network Deployment Phase 1: The Perimeter Rodney Caudle, Jay Radcliffe, and Jim Voorhees.
Page 1 of 9 NFS Vendors Conference October 25, 2000 PC Solutions to Network File Systems.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
UNI Manager Project Proposal to OpenDaylight
FireProof. The Challenge Firewall - the challenge Network security devices Critical gateway to your network Constant service The Challenge.
IP Security. P R E S E N T E D B Y ::: Semester : 8 ::: Year : 2009 Naeem Riaz Maria Shakeel Aqsa Nizam.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
NETWORKING COMPONENTS BY: TRAVIS MARSHALL. HUBS A hub is a device within a network that has multiple Ethernet ports that devices can plug into. The hub.
Unleashing the Power of IP Communications™ Calling Across The Boundaries Mike Burkett, VP Products September 2002.
Technology With Vision IMTC –H323 Forum May 14-16, 2002 Geneva, Switzerland Chaim E. Fried.
Profit from a practical IP Billing Solution Suresh Balasubramanian Senior Product Manager Macrovision.
verifone HQtm Estate Management Solution
Network Access Control
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 1 Bomgar Privileged Access Management.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 7 VPN Fundamentals.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Planning a Network Upgrade Working at a Small-to-Medium Business or.
©2014 Cleo. All rights reserved. Company confidential. Managing Chaos: Andy Moir Director, Product Marketing 2 Data Movement in 2015.
Unleashing Mobile Broadband WiPipe Central MANAGED SERVICES Secure, Manage, & Maintain the Edge of the 3G/4G Network.
أمن وحماية المعلومات المحاضرة الثانية إعداد/عبدالرحمن محجوب حمد.
Oracle SOA Cloud Integration Project
Methods to overcome corporate firewall restrictions
IPv6 Deployment: Business Cases and Development Options
Network Security Analysis Name : Waleed Al-Rumaih ID :
NETW 208 RANK The power of possibility/netw208rank.com
2002 IPv6 技術巡迴研討會 IPv6 Mobility
D-Link Router Customer Care Number. A D-link router is a basic necessity these days with so much technology around us in offices or homes. We can connect.
NETW 208 Enthusiastic Studysnaptutorial.com
Tailor slide to customer industry/pain points
IS4680 Security Auditing for Compliance
Professional Network Services
AT&T Firewall Battlecard
Presentation transcript:

Technology With Vision September 18, 2002 Hillside, NJ Chaim E. Fried Sr. Network Architect, Firewall integration

A Service Provider Approach: The Key Concerns: –Vendor Agnostic –Ease of Provisioning –Ease of Use –Cost of Implementation –Billing –May not break enhanced services(far-end camera control, T.120)

Available Options: Firewall Aware application Protocol Aware Firewall Tunneling Solutions

Which have we implemented? All of them!!

What kind of Customers do we have and what are they asking for? One endpoint, no data- Concerned about who may be calling into their system, no data to protect. Many Endpoints, no data- Again, concerned about who may have access to their endpoint configurations and ability to terminate calls. Integrated DATA LAN, many endpoint- Concerned about protecting valuable data, as well as above mentioned issues.

Dedicated Video/ No DATA customers: SINGLE END-POINT: –Firewall aware applications works well for simplest most predictable environments –H.323 aware Firewalls Works well in scenarios where service provider may control customer firewall –Tunneling Solutions Works well in strictest security setting, where service provider may not access firewalls

Dedicated Video/ No DATA customers Multiple END-POINT: –Firewall aware applications works well for simplest most predictable environments Multiple sessions may not fare wall on your routers Confusing configurations. –H.323 aware Firewalls Works well in scenarios where service provider may control customer firewall –Tunneling Solutions Works well in strictest security setting, where service provider may not access firewalls

Integrated LAN Customers Data security is key concern: –Firewall aware applications works well for simplest most predictable environments –Application aware Firewall Criticality of device in network architecture makes it difficult to support –Tunneling Solution Security concern with service provider managed server in customer DMZ. May increase call latency due to the expense of putting a terminating proxy at EVERY service provider pop.

What do our customers think? Customers using firewall aware application solutions, likely don’t even know that it’s there Customers on the Tunneling solution view it as an in-house Gatekeeper BOTTOM LINE: IT’S TRANSPARENT!