R 255 G 211 B 8 R 255 G 175 B 0 R 127 G 16 B 162 R 163 G 166 B 173 R 104 G 113 B 122 R 234 G 234 B 234 R 175 G 0 B 51 R 0 G 0 B 0 R 255 G 255 B 255 Supporting.

Slides:



Advertisements
Similar presentations
Polycom Unified Collaboration for IBM Lotus Sametime and IBM Lotus Notes January 2010.
Advertisements

U M T S F o r u m © UMTS 2002 UMTS Security aspects UMTS Forum ICTG Chair Bosco Fernandes Siemens AG
Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
A global Service layer platform for M2M communications
© 2009 Avaya Inc. All rights reserved. Page 1 AT&T Mobile Extension with Avaya one-X Mobile.
1© Nokia Siemens Networks 2011 To change the document information in the footer, press [Alt + F8] and use the „Nokia_Siemens_Networks_–_Change_Document_Information“
F5 Solution for Microsoft Exchange 2010 James Hendergart Business Development Manager Helen Johnson Solution Engineer.
1 Critical Comms Broadband standardization in ETSI TC TCCE Brian Murgatroyd Chairman ETSI TC TCCE.
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
Creating Value Through Innovation The Changing Face of Business Communications Simon Gwatkin VP Strategic Marketing Mitel July 16, 2008.
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
ITKS540 Fall 2008University of Jyväskylä ITKS540 Introduction to mobile technology and business Jani Kurhinen Fall 2008.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
Charles James Director Microsoft Alliance EMEA Polycom Microsoft UC Innovation Partner of the Year.
Discover Analyze User directly connected to SAP system ETL/replication of SAP source data Integrate Report Power Query in Excel Power Pivot, PivotTable.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
CHAPTER 15 & 16 Service Provider VoIP Applications and Services Advanced Enterprise Applications.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Colombo, Sri Lanka, 7-10 April 2009 Multimedia Service Delivery on Next Generation Networks Pradeep De Almeida, Group Chief Technology Officer Dialog Telekom.
Voice & Data Convergence Network Services January 11, 2001.
Defence and Communications Systems EADS Secure Networks The role of TETRA in Homeland Security.PPT /HVi The Role of TETRA in a Holistic Homeland.
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
WSV404 DirectAccess Server (Server 2008 R2) DirectAccess Client (Windows 7) Internet Native IPv6 6to4 Teredo IP-HTTPS Tunnel over IPv4 UDP, HTTPS,
6. Next Generation Networks A. Transition to NGN B
A Combat Support Agency Defense Information Systems Agency Unified Capabilities Requirements (UCR) Overview Joint Interoperability Test Command.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
The generation, storage, and movement of information are central to managing an enterprise’s business processes As a result, businesses must ensure.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 FCC-NTIA Joint Advisory Committee on Communications Capabilities of.
Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted.
Toward customer centric convergence Our experiences Jorge Iván Ramírez Verizon Dominicana Jun 2006.
“Securing IP Multimedia Subsystem (IMS) infrastructures …,” M. Tsagkaropoulos UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless.
19/09/2015 NGN related standardization issues: Service Platform TTA (Korea) GSC-9, Seoul 1 SOURCE: KT TITLE:NGN related standardization issues:
FY2011 Harris Corporation Overview Page 1 Harris Corporation Overview.
Federal Aviation Administration Federal Aviation Administration 1 Presentation to: Name: Date: Federal Aviation Administration AMHS Security Security Sub-Group.
Accompanying notes to presentation What you need to know This presentation is part of the Art of connecting. There are four themes in total, each with.
I n t e g r i t y - S e r v i c e - E x c e l l e n c e Headquarters U.S. Air Force 1 Lt Gen Bill Lord, SAF/CIO A6 Chief of Warfighting Integration and.
16-17 October 2008,Prague1 Information sharing within Czech Armed Forces and Allies, Challenges for mission effectiveness within Czech Armed Forces and.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
John Trinidad Senior Systems Engineer Harris Corporation Rochester, NY (585) The Challenge in Developing an SCA Compliant.
1 FMC: Driving the Transition to IMS Ken Kuenzel VP and Founder Covergence Inc.
1 The Cryptographic Token Key Initialization Protocol (CT-KIP) KEYPROV BOF IETF-67 San Diego November 2006 Andrea Doherty.
Performix Business Services Converging to Unified Messaging With convergence of telephony, computer and multimedia communication becoming a realistic vision,
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Net-Centric Operations & Warfare
Generic Routing Encapsulation GRE  GRE is an OSI Layer 3 tunneling protocol: Encapsulates a wide variety of protocol packet types inside.
An R&D Manager’s Perspective TechExpo October 5, 2004 Presented by: Veena Rawat.
4G 발표자 : 전지훈. What is 4G? (1/3)  The next complete evolution in wireless communications  SBI2K(Systems Beyond IMT 2000)  ITU(International Telecommunication.
Telecommunications, the Internet, and Wireless Technology.
International Telecommunication Union Committed to connecting the world ITU/EBU Workshop Accessibility to Broadcasting and IPTV ACCESS for ALL, 23 – 24.
Jewuan Davis DSN Voice Connection Approval Office 18 May 2006 DSN Connection Approval Process (CAP)
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Adoption of IP in the Next Generation Contact Center Rupesh ChokshiGautham NatarajanDirector, AT&T.
1 “ ” Multiservice networking is emerging as a strategically important issue for enterprise and public service provider infrastructures alike.The proposition.
Colombo, Sri Lanka, 7-10 April 2009 FORUM ON NEXT GENERATION STANDARDIZATION (Colombo, Sri Lanka, 7-10 April 2009) Session Moderator Ghassem Koleyni An.
Microsoft in Defence Michel van der Bel Vice President Microsoft International.
Michael Przytula Senior Solution Architect HP Services, Asia-Pacific & Japan.
Secure Communications—No Compromise Real Time Communications in Emergency Response Planning and Operations Tim Vittetoe VIACK Corporation.
1 The Cryptographic Token Key Initialization Protocol (CT-KIP) KEYPROV WG IETF-68 Prague March 2007 Andrea Doherty.
Enabling Converged Services Changing the Way the World Communicates Jim Dondero Vice-President Global Solutions Marketing CANTO, June 21st.
Fostering worldwide interoperabilityGeneva, July 2009 The Home Network: Where Convergence Takes Hold Tim Jeffries, VP Technology and Business Development,
IMS developments in 3GPP
John Antanaitis Integration & Interoperability Across the Public Service Date: 22 October 2013.
©Richard L. Goldman Public Key Policies for Windows 2000 ©Richard Goldman December 5, 2001.
0 What Does SIP Bring to Your Customer Experience ? Extend VoIP and IP Contact Center values through support of SIP o Media and location independent support.
7. Technological Overview 7.1 Network Structure and Technical Description Ethiopian Telecommunications Corporation, ETC has developed modern information.
INTRODUCTION:- The approaching 4G (fourth generation) mobile communication systems are projected to solve still-remaining problems of 3G (third generation)
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
CORPORATE PROFILE JUNE 2016
DISN Evolution Mr. Charles Osborn
Presentation transcript:

R 255 G 211 B 8 R 255 G 175 B 0 R 127 G 16 B 162 R 163 G 166 B 173 R 104 G 113 B 122 R 234 G 234 B 234 R 175 G 0 B 51 R 0 G 0 B 0 R 255 G 255 B 255 Supporting colors: R 52 G 195 B 51 Primary colors: © Nokia Siemens Networks IP based Information and Communication – How to secure the bits and bytes in the Cyberspace AFCEA TechNet International – "Integrating Cyberspace into the Battlespace“ London, October 2010 Pedro Schmid, Business Development Government Solutions

© Nokia Siemens Networks R 255 G 211 B 8 R 255 G 175 B 0 R 127 G 16 B 162 R 163 G 166 B 173 R 104 G 113 B 122 R 234 G 234 B 234 R 175 G 0 B 51 R 0 G 0 B 0 R 255 G 255 B 255 Supporting colors: R 52 G 195 B 51 Primary colors: ICT* modernization in defense is facing a double-edged sword *) ICT: Information and Communication Technology Ensure advanced information security Provide advanced network enabled capabilities for successful missions of 28 allied NATO nations

© Nokia Siemens Networks R 255 G 211 B 8 R 255 G 175 B 0 R 127 G 16 B 162 R 163 G 166 B 173 R 104 G 113 B 122 R 234 G 234 B 234 R 175 G 0 B 51 R 0 G 0 B 0 R 255 G 255 B 255 Supporting colors: R 52 G 195 B 51 Primary colors: Working with the Department of Defense (DoD) towards a new global AS-SIP* standard *AS-SIP: Assured Services Session Initiation Protocol Defense Information Systems Network – Europe (DISN-E, 66 sites, support ongoing) JITC interoperability testing and certification Defense Information Systems AgencyJoint Interoperability Test Command

© Nokia Siemens Networks R 255 G 211 B 8 R 255 G 175 B 0 R 127 G 16 B 162 R 163 G 166 B 173 R 104 G 113 B 122 R 234 G 234 B 234 R 175 G 0 B 51 R 0 G 0 B 0 R 255 G 255 B 255 Supporting colors: R 52 G 195 B 51 Primary colors: How to connect so many different country-specific networks, devices and locations? CoNNECting NATO

© Nokia Siemens Networks R 255 G 211 B 8 R 255 G 175 B 0 R 127 G 16 B 162 R 163 G 166 B 173 R 104 G 113 B 122 R 234 G 234 B 234 R 175 G 0 B 51 R 0 G 0 B 0 R 255 G 255 B 255 Supporting colors: R 52 G 195 B 51 Primary colors: Mil NGN: True converged and vendor-independent network topology for voice, video and data over IP

© Nokia Siemens Networks R 255 G 211 B 8 R 255 G 175 B 0 R 127 G 16 B 162 R 163 G 166 B 173 R 104 G 113 B 122 R 234 G 234 B 234 R 175 G 0 B 51 R 0 G 0 B 0 R 255 G 255 B 255 Supporting colors: R 52 G 195 B 51 Primary colors: Advanced capabilities for a multitude of special purpose phones, terminals and modules Real-time call prioritization for nominated personnel Full connectivity with allied forces Legacy & IP-based services deployed in parallel From strategic to tactical level Certified interoperability by tough testers Fixed Mobile Convergence Secure mobile broadband via LTE

© Nokia Siemens Networks R 255 G 211 B 8 R 255 G 175 B 0 R 127 G 16 B 162 R 163 G 166 B 173 R 104 G 113 B 122 R 234 G 234 B 234 R 175 G 0 B 51 R 0 G 0 B 0 R 255 G 255 B 255 Supporting colors: R 52 G 195 B 51 Primary colors: When national or international security is at stake, there is no room for failure Nokia Siemens Networks Mil NGN provides highest levels of availability & security across all network layers Threats Attacks Destruction Disclosure Interruption Removal Worms: Stuxnet,…

© Nokia Siemens Networks R 255 G 211 B 8 R 255 G 175 B 0 R 127 G 16 B 162 R 163 G 166 B 173 R 104 G 113 B 122 R 234 G 234 B 234 R 175 G 0 B 51 R 0 G 0 B 0 R 255 G 255 B 255 Supporting colors: R 52 G 195 B 51 Primary colors: Meeting the most stringent security standards and requirements Platform hardening (HW / SW) End-to-endsecurity acrossall layers IPSec SRTP Network management Voice pay load Signaling layer TLS Working with the US Forces Customer specific PKI solutions FIPS (Crypto module / SUN server) Security guidance (STIGs*) Operating systems ( UNIX, Windows) DatabasesApplications & clients *) FIPS:Federal Information Processing Standard PKI:Public Key Infrastructure SRTP:Secure Real-Time Transport Protocol STIGs:Security Technical Implementation Guidelines TLS: Transport Layer Security

© Nokia Siemens Networks R 255 G 211 B 8 R 255 G 175 B 0 R 127 G 16 B 162 R 163 G 166 B 173 R 104 G 113 B 122 R 234 G 234 B 234 R 175 G 0 B 51 R 0 G 0 B 0 R 255 G 255 B 255 Supporting colors: R 52 G 195 B 51 Primary colors: Secure ICT solutions to fulfill your mission Government Solutions Next Generation Network Management Converged Infrastructure solutions Access network solutions Backbone network solutions, e.g. DWDM Deployable solutions State-of-the-art network solutions Enrich existing TETRA networks with secure broadband data Standardization towards everything over LTE to meet governmental needs LTE for government authorities True vendor-independent network topology for voice, video and data Everything-over-IP Assured Services-SIP Unified communication Military Next Generation Networks

R 255 G 211 B 8 R 255 G 175 B 0 R 127 G 16 B 162 R 163 G 166 B 173 R 104 G 113 B 122 R 234 G 234 B 234 R 175 G 0 B 51 R 0 G 0 B 0 R 255 G 255 B 255 Supporting colors: R 52 G 195 B 51 Primary colors: © Nokia Siemens Networks We listen – Let's continue the dialogue to create sound & secure solutions together Pedro Schmid Business Development Government Solutions Mobile: