High-Performance Applications in a Secure Environment Michael Tepedino.

Slides:



Advertisements
Similar presentations
Business Solutions Network Security Solutions Gateway Security
Advertisements

Prepared By Naieem Khan & Ummiya Rahman Presentation On.
Enabling IPv6 in Corporate Intranet Networks
1 Configuring Virtual Private Networks for Remote Clients and Networks.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Network Security Overview Tales from the trenches.
Presenter: Vikash Nath MCP, CCNA, MCTS. On-Premise Private Cloud Public Cloud Hybrid Cloud.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Network and WiFi By: Clara-Hannah S., Amelia H., and Margot d’I.
Load-Balance/Route Policy Advanced Routing. Outline How does it Work – When matching criteria, send via the route What does it Do – 2 real usage examples.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Joseph Ferracin Director IT Security Solutions Managing Security.
Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7.
Security in High Performance Networks A Practical View Tony Cataldo 5/19/04.
Chapter 6 Overview Max Tottenham. Communication methods 6.1 Data transmission : - Serial vs Parallel vs Async Bit rate/Baud rate Bandwidth / Latency Parity.
Module 4: Designing Routing and Switching Requirements.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Using the Intranet for Knowledge Management ISM 6021 By: Diana DeFazio - Carro.
VPN Security Policy By: Fred Cicilioni. VPN, or Virtual Private Network, is a protocol that allows remote access, allowing the user to connect to all.
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
Module 8: Managing Terminal Services. Overview Use and manage Terminal Services RemoteApp programs Use and manage Terminal Services Gateway Optimize and.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Providing Teleworker Services
Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications.
Routers Operate in a Mesh –Many possible alternative routes between two stations Only One of Many Possible Alternative Routes Packet.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
HalFILE 2.1 Network Protection & Disaster Recovery.
Module 1 Introduction to Designing a Microsoft® Exchange Server 2010 Deployment.
Exam Questions 8.A large company with 200 employees uses a local area network (LAN) which includes all the computers in its head office. Describe the.
Local issues Auditing Log Review Physical protection Disaster Recovery Backup Schedules Off-site storage SECURITY.
Introduction to Computers Lesson 8B. home Ways to Connect to the Internet Direct connection Remote terminal connection Gateway connection LAN Modem High-speed.
Virtual Private Networks Manraj Sekhon. What is a VPN?
Networks The Big Picture. Three Great Leaps of Civilization.
GGF 17 - May, 11th 2006 FI-RG: Firewall Issues Overview Document update and discussion The “Firewall Issues Overview” document.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Chapter 7. Identifying Assets and Activities to Be Protected
Networking in the Enterprise
Introduction to Telecommunication
Virtual Private Networks
Considerations for operating MS SQL in the cloud, in production, DR, or hybrid scenarios. By Nick Rubtsov.
Securing the Network Perimeter with ISA 2004
Start a Conference Call
Introduction to Computers
Providing Teleworker Services
How Global MPLS Service Brings World Altogether?
Designing Routing and Switching Architectures. Howard C. Berkowitz
Anatomy of a Wireless LAN – Part I
Park A Call Meeting Notes (2/21/17 09:23) ok
IS4680 Security Auditing for Compliance
Virtual Private Network
Firewalls Routers, Switches, Hubs VPNs
Professional Network Services
Providing Teleworker Services
Providing Teleworker Services
Factors that influence network choice
Ron Carovano Manager, Business Development F5 Networks
By Seferash B Asfa Wossen Strayer University 3rd December 2003
Cloud Security AWS as an example.
Cloud Security AWS as an example.
Providing Teleworker Services
Chapter 8 – Data switching and routing
Presentation transcript:

High-Performance Applications in a Secure Environment Michael Tepedino

Why are we here? Large Amounts of Bandwidth Large Amounts of Bandwidth University Partnerships University Partnerships Sharing Lessons & Knowledge Sharing Lessons & Knowledge Being Ready for the Next Big Thing Being Ready for the Next Big Thing Moving Technology into Production Faster Moving Technology into Production Faster

Hurdles for High Performance Applications Networks Networks High Latency High Latency High Bandwidth High Bandwidth Public Accessibility Public Accessibility TCP TCP Security / Encryption Security / Encryption Data Speeds Data Speeds

The Corporate Perspective Looking for the common ground – Not Looking to Push the Newest Technology Looking for the common ground – Not Looking to Push the Newest Technology Global Differences – MAN’s, LAN’s & WAN’s Global Differences – MAN’s, LAN’s & WAN’s Applications – Run the Business Applications – Run the Business SECURITY – SECURITY – SECURITY SECURITY – SECURITY – SECURITY How do We Apply Lessons Learned How do We Apply Lessons Learned

Why Have a Secure Environment? Intellectual Property Intellectual Property Hackers Hackers DoS DoS Viruses Viruses Disaster Recovery Disaster Recovery Secured Communications Secured Communications

How do we decide what to secure? Corporate Policies Corporate Policies Specific Tunnels for Internal Research Test vs. External Tests with Partners Specific Tunnels for Internal Research Test vs. External Tests with Partners What is the Data Being Used For What is the Data Being Used For

Securing the Network VPN Tunnels VPN Tunnels Internet2 Public Access Internet2 Public Access Multiple sites Multiple sites Firewalls Firewalls Hardware Hardware Things to watch for Things to watch for Monitoring Monitoring Being Proactive Being Proactive

VPN Tunnels Secure vs. Open Ended Secure vs. Open Ended Latency Latency Protocol Dependent Protocol Dependent Design is Very Important ! Design is Very Important !

Public Internet2 Access Convenience? Convenience? True Life Testing True Life Testing A Very Real Scenario Needed A Very Real Scenario Needed

Firewalls Hardware Hardware How to Choose How to Choose Differences Differences Things to Watch for Things to Watch for Avoidance is the Best Solution Avoidance is the Best Solution

Thank You