Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

Cloud computing security related works in ITU-T SG17
Xavier Verhaeghe Vice President Oracle Security Solutions
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
A Federated Approach to Systems Management Todd Nugent Mike Huffstatler Sr. Product Specialist Systems Engineer.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Security Controls – What Works
Chapter 21 Successfully Implementing The Information System
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
Federal Student Aid Technical Architecture Initiatives Sandy England
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
Understanding Active Directory
Chapter 15 The Third Component: Powerful Networks.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
Clinic Security and Policy Enforcement in Windows Server 2008.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
Lessons Learned in Smart Grid Cyber Security
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
© Copyright 2006 CyberRAVE LLC. All rights reserved. Confidential Information. Please do not distribute or reproduce without permission. 1 CyberRAVE The.
Dell Connected Security Solutions Simplify & unify.
Remote Access Virtual Environment (RAVE) A VPN Knowledge Grid Joseph A. Sprute, Founder 33 Westbury Dr. Bella Vista, Arkansas Office.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Remote Access Virtual Environment™ (RAVE) © Copyright 2003 CyberRAVE™ LLC. All rights reserved. A Knowledge Grid Coordinated Public & Private Network Contact.
Roadmap to Maturity FISMA and ISO 2700x. Technical Controls Data IntegritySDLC & Change Management Operations Management Authentication, Authorization.
PKI Forum Business Panel March 6, 2000 Dr. Ray Wagner Sr. Director, Technology Research.
Engineering Essential Characteristics Security Engineering Process Overview.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
NETWORK INFRASTRUCTURE SECURITY Domain 5. Computer Security “in short, the average computer is about as secure as a wet paper bag, and it is one of the.
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Richard Gurdak International Development Blue Ridge Networks Service Providers and Lawful Intercept.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Non-Confidential Copyright © 2006 CyberRAVE LLC. All Rights Reserved. CyberRAVE January 24, 2006 Strategic Approach to Developing Corporate Data Insurance.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Information Technology Sector
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
IS4680 Security Auditing for Compliance
Virtual Private Network
How to Mitigate the Consequences What are the Countermeasures?
Cyber Risk & Cyber Insurance - Overview
IT Management Services Infrastructure Services
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Chapter 21 Successfully Implementing The Information System
The state of digital supplier risk management: In partners we trust
Presentation transcript:

Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security for Online Communities of Interest

Copyright © 2006 CyberRAVE LLC. All rights reserved. 2 Goal The goal is to architect, build and manage a Virtual Private Network (VPN) Service Grid for Users and Groups who demand secure & private access to high value Web services and utilities using trusted governance practices for online communities.

Copyright © 2006 CyberRAVE LLC. All rights reserved. 3 Problem Internet access to personal, public and private resources using digital media devices poses substantial risk to assets and reputation without proper protections that are expensive and difficult to administer.

Copyright © 2006 CyberRAVE LLC. All rights reserved. 4 Solution A VPN Service Grid simplifies the task of complying with global standards dealing with information security and user privacy. It integrates easily with existing technology investments using a layered approach that optimizes service availability and business performance. And, it safeguards digital assets that need risk coverage, while creating advertiser incentives.

Copyright © 2006 CyberRAVE LLC. All rights reserved. 5 Business Model

Copyright © 2006 CyberRAVE LLC. All rights reserved. 6 Features Managed Classes of Services Policy / Reputation Framework Highly Secure Integrated Mediation / Resolution System Vertically / Horizontally Extensible

Copyright © 2006 CyberRAVE LLC. All rights reserved. 7 Fixed-to-Mobile Framework Certified Secure Controls –Security: Technical, Procedural –Policy: Roles, Rules –Traffic Management: Intranet, Extranet –Enforcement: Human, Computer –Advertising: Location Based, Policy Driven –Actuarial: Information Physics, Data Lifecycle –Validation: Audit, Remediation, Resolution

Copyright © 2006 CyberRAVE LLC. All rights reserved. 8 Products & Services VPN Service Grid –Products Managed Network: Encrypted, Prioritized, Transparent Wireless Interface: Real Time Voice Navigation Resource Discovery: Service Directory Traffic Validation: Assess, Authorize, Monitor, Report, Certify Policy Instruments: Human / Computer Interface Insurance Coverage: QoS, Identity, Integrity, Jurisdiction –Services Mediation: Connection, Transaction, Conflict Resolution Certificate Authority: 3 rd Party Verification Advertising: Location Services, User Group Preferences Support: Systems, Training, Contact

Copyright © 2006 CyberRAVE LLC. All rights reserved. 9 Marketing Regulated Industries –Data Host Providers –Web / Communication Service Providers –Institutions Value Added Resellers –Security Vendors –System Integrators –Application Developers –Manufacturers –Consultants –Industry Groups –Insurers Service Providers Resellers End UsersEnterprise

Copyright © 2006 CyberRAVE LLC. All rights reserved. 10 Core Competencies Community Development –Infrastructure –Process Alignment –Service Delivery Traffic Management –Surveillance –Routing –QoS Advanced Reporting –Performance –Service Classification –Business Intelligence Enforcement, Mediation –Compliance –Resource Discovery –Exception Handling Building and Managing Secure Virtual Communities

Copyright © 2006 CyberRAVE LLC. All rights reserved. 11 Subordinate Competencies Advertising Communications Training Systems Integration Certification Auditing Risk Coverage Supporting Business

Copyright © 2006 CyberRAVE LLC. All rights reserved. 12 Interconnection Services Profile: User, Group, Class of Service –Policy: Who, What, Where, When, Why, How –Permission: Authorization, Authentication, Accounting –Compliance: Basic, Intermediate, Advanced Navigation: Cognitive, Federated, Interoperable –Enforcement: Bottom-Up, Top-Down –Intranet: Mesh, Web Services, Fixed-to-Mobile Controls: QoS, Identity, Data Integrity, Jurisdiction –Accounting: Traffic, Requests, Exceptions, Remediation –Transparency: Certification, Auditing, Forensics

Copyright © 2006 CyberRAVE LLC. All rights reserved. 13 Certification Policy Facilities Network Hardware Software User / Group Standards Processes Compliance Generally Accepted Accounting Principals

Copyright © 2006 CyberRAVE LLC. All rights reserved. 14 Data Asset Risk Coverage QoS: Prioritization, Bandwidth, Traffic Mgmt Identity: Theft, Transaction, Reputation Integrity: Breach, Misuse, Loss, Recovery Jurisdiction: Compliance, Claims Basic Intermediate Advanced Classes of Service

Copyright © 2006 CyberRAVE LLC. All rights reserved. 15 Thank You CyberRAVE LLC Joseph A. Sprute, President 33 Westbury Dr. Bella Vista, Arkansas USA

Copyright © 2006 CyberRAVE LLC. All rights reserved. 16 Notes

Copyright © 2006 CyberRAVE LLC. All rights reserved. 17 Description Provide a set of enabling utilities and services to support more robust connections between providers and users of Web services. –Programmatically couple data access control with network risk management and reputation services. –Manage access to directory services for communities of interest. –Associate compliance standards and environmental measurements with insurance coverage for “Certified Secure” providers. –Manage the trust relationship between advertisers and user groups. –Foster a business culture that mitigates threats and vulnerabilities to data networks.

Copyright © 2006 CyberRAVE LLC. All rights reserved. 18 Architecture –MPLS VPN –Web Services Hub –End-to-End Global Service Backbone –Flexible Topology –Common Naming –QoS / Reliability –Mesh / Grid (any-to-any)

Copyright © 2006 CyberRAVE LLC. All rights reserved. 19 Mediation & Resolution Services Fixed-to-Mobile –Digital Media Device: Voice Navigation –Resource Gateway: Utility / Service Discovery –Secure Routing & Handling: Data Transport –Certified Secure: Member Organizations –Interconnection: Monitoring & Reporting

Copyright © 2006 CyberRAVE LLC. All rights reserved. 20 Data Asset Protections Environment –Facilities –Hardware –Software Intellectual Property –Data –Information –Knowledge Reputation –Personal –Group –Public

Copyright © 2006 CyberRAVE LLC. All rights reserved. 21 Value Chain Advertising: Location Services, Profile Intelligence: Resource Discovery, Voice Navigation Insurance: Certified Secure Controls Customer Support: Communications, Contact, Training Online Community: Identity, Integrity, Reputation, Transaction, Experience

Copyright © 2006 CyberRAVE LLC. All rights reserved. 22 Communities Communities are formed through the confluence of Trusted resources that support common desires associated with life, liberty and the pursuit of happiness.

Copyright © 2006 CyberRAVE LLC. All rights reserved. 23 Implementation Connect the following interests: –Physical infrastructure with mediation and resolution service –Mediation and resolution service with risk coverage –Risk coverage with interest groups –Interest groups with advertising