Richard Gurdak International Development Blue Ridge Networks Service Providers and Lawful Intercept.

Slides:



Advertisements
Similar presentations
Infrastructure Services. Introducing Al-Futtaim Technologies One of the regions leading System Integrators Strong partnerships with leading global ICT.
Advertisements

How to Set Up, Secure and Manage A Network
Water Utility Business Applications. 2 Agenda Industry overview and trends Our application visionary solution Business values Wireless network components.
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
M A Wajid Tanveer Infrastructure M A Wajid Tanveer
Kapitel 6 xDSL W. Schulte1. Kapitel Introduction 6.1 Teleworking 6.2 Comparing Broadband Solutions 6.3 Configuring xDSL 6.4 Summary.
Prepared By Naieem Khan & Ummiya Rahman Presentation On.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Broadband Solutions Connecting Networks.
TELECOM PRODUCT PRESENTATION “WIRELESS WITHOUT BOUNDARIES” RADITEK Terrestrial Networks
Broadband and Wide Area Network Services Carrier Gigabit Ethernet Multi Protocol Label Switching Vs. IP VPNs T-1 & T-3 SIP Trunks Security Network Topology.
ONE PLANET ONE NETWORK A MILLION POSSIBILITIES Barry Joseph Director, Offer and Product Management.
The Old Rules Just Don’t Fit Anymore: A Panel Discussion on the Proposed Revision of the Telecommunications Act of 1996 John Windhausen, Jr., Past President,
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
Products and Services Overview Blue Ridge Networks / Cominfo Systems.
© 2007 Verizon. All Rights Reserved. PTE /07 FCC Workshop Global Broadband Connects the World Jacquelynn Ruff Vice President, International Public.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
National Science Foundation Symposium Ed Thomas Chief, Office of Engineering and Technology Federal Communications Commission.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
6. Next Generation Networks A. Transition to NGN B
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
1  2004 Level 3 Communications, Inc. All Rights Reserved. Kevin J. O'Hara, President & COO Level 3 Communications.
Virtual Private Networks An Economical Option for Broadband Connectivity.
What is broadband Multiple broadband technologies Advantages DSL and DSLAM Types of DSL transmission Services through broadband Cable Modem Internet Access.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Broadband Solutions Connecting Networks.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Monitoring Architecture for Lawful Interception in VoIP Networks Second International Conference on Internet Monitoring and Protection (ICIMP 2007), IEEE.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
WiMAX, meaning Worldwide Interoperability for Microwave Access Emerging technology that provides wireless transmission of data using a variety of transmission.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Sridhar Ramachandran Chief Technology Officer Core Session Controller.
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
CALEA Communications Assistance for Law Enforcement Act Current Campus Perspective of Implementation Issues November 17, 2005 Doug Carlson – New York University.
“ Getting to Know Networks”. What Is a Network? A network is a collection of computers hooked up together, usually by cables or telephone wires, for the.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Providing Teleworker Services
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Simplifying Cloud Connectivity for Your Clients Presenter: Tom SharkeyTom Sharkey December 8,
Chapter 1 The Data Communication Industry The best way to approach data communication The data communication industry Challenge & solution to business-oriented.
Networks The Big Picture. Three Great Leaps of Civilization.
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
Vodafone Business Cloud
Windows Vista Configuration MCTS : Advanced Networking.
Case Study: Cisco VPN Client
Module 2: Configure Network Intrusion Detection and Prevention
Wide Area Network.
WIMAX Presented By JAGADEESH.S 13X41A0546.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 IP Camera Market to surpass.
Chapter 1: WAN Concepts Connecting Networks
IS4550 Security Policies and Implementation
Virtual Private Network (VPN) Market
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Hosted Private Branch Exchange.
Networks Learning Outcome 1
Providing Teleworker Services
Providing Teleworker Services
Providing Teleworker Services
Presentation transcript:

Richard Gurdak International Development Blue Ridge Networks Service Providers and Lawful Intercept

©2008 Blue Ridge Networks. All rights reserved. 2 Business Demands for Computing Authorized access to any data, anywhere, anytime. Networks utilizing more business friendly technologies such as 3G, 4G, WiMaX, Virtual Ethernet Networks and network components which can compute at increasingly faster speeds will exceed the past benefits of computer technology. These technologies produce flexibilities and efficiencies which organizations, both network providers and customers, use to provide more solutions with minimal growth in Network Capital.

©2008 Blue Ridge Networks. All rights reserved. Do More with Less Over the past 20 years the performance of the PC has increased over 600 Fold (from 6 MHz to 4.0 GHz) while energy consumed by the system is largely unchanged. Since the transistor was introduced 40 years ago the size has been reduced by 10 4, power consumption by 10 5 and costs reduced by over

©2008 Blue Ridge Networks. All rights reserved. 4 PC Hard Disc Capacity

©2008 Blue Ridge Networks. All rights reserved. Exponential Growth 5

©2008 Blue Ridge Networks. All rights reserved. 6 Wireless Data Device Price Performance Like getting 3 million miles per gallon.

©2008 Blue Ridge Networks. All rights reserved. 7 Storage Media Price Performance Store the Library of Congress collections for $1,000.

©2008 Blue Ridge Networks. All rights reserved. 8 The Universal Business Network

©2008 Blue Ridge Networks. All rights reserved. 9 Any to Any Now 10,000,000,000 times more valuable!!!

©2008 Blue Ridge Networks. All rights reserved. 10 Network Security and Lawful Intercept Responsibility to meet LI Requirements –Local Communications Provider working with the Law Enforcement Agencies (LEAs) –Complexity increased by technology (Mobile, VoIP, Encryption) –Almost all countries have LI requirements and have adopted global LI requirements and standards developed by the European Telecommunications Standards Institute (ETSI) organization. In the USA, the requirements are governed by the Communications Assistance for Law Enforcement Act (CALEA). European Telecommunications Standards Institute (ETSI)Communications Assistance for Law Enforcement Act (CALEA) Overlay/Service/Network Manufacturers –No LI Requirements, but practical considerations

©2008 Blue Ridge Networks. All rights reserved. 11 Risks associated with LI LI systems may be subverted for illicit purposes. (Greece 2004) Access Point created for gaining private information. Malicious or inadvertent loss of data

©2008 Blue Ridge Networks. All rights reserved. 12 Trust as a foundation Customers (ISPs, Telcos and end users) use Network Products because they trust the product will deliver good service at a competitive price Network Security products add Trust to the expectations. –Obligation of the Network device/service manufacturer is to create the best, most secure, product. Meeting LEA requirements is the responsibility of the Licensed Operator in-country.

©2008 Blue Ridge Networks. All rights reserved. 13 Providing a Secure Product U.S. Security/Encryption companies are subject to U.S. export regulations that limit, to a small degree, where and to whom products can be sent. U.S. law does not require Security/Encryption companies to alter encryption products in any way for export. U.S. law does not limit the use of Security/Encryption products within the U.S. or the use of products by U.S. entities anywhere in the world.

©2008 Blue Ridge Networks. All rights reserved. Blue Ridge By design, our products do not provide any means of divulging a traffic encryption key. Not to Blue Ridge, not to end-users, and therefore not to any government. It is not possible with Blue Ridge VPN products to insert a traffic encryption key either. All traffic keys are dynamically generated using a secure Diffie- Hellman key agreement protocol that creates a unique key for each session. No one has been able to propose a robust way of providing a "key escrow" mechanism that does not introduce significant security vulnerabilities for all parties. There are no "back door" features in our products. 14

©2008 Blue Ridge Networks. All rights reserved. VPN and LI and Blue Ridge It is Blue Ridge’s position that Lawful Intercept of traffic over our products or services would be performed at some point in the network where cleartext traffic is naturally available. Our products, and other VPN/Security products, can be configured to provide a cleartext intercept point but we have never been asked to do so. Even in this event, only the LEA, working via the Local Licensed Provider would be able to perform the intercept. Not Blue Ridge, nor the customer. 15

©2008 Blue Ridge Networks. All rights reserved. 16 Security Products and Services Secure Virtual Ethernet Service –Cost effective private communications over public networks –Supports voice, video and data applications –Works with any carrier broadband services –Available as a fully managed service or supported product suite EdgeGuard™ End-Point Risk Mitigation –Enforcement of enterprise security policy for fixed and mobile Windows computers –Auditing of policy compliance –Discovery of security related risk factors –Available as a fully managed service or supported product suite

©2008 Blue Ridge Networks. All rights reserved. 17 Secure Virtual Ethernet Service Any-to-any, full mesh, enterprise connectivity 100% end-to-end security Unicast and Multicast Any wired or wireless networks; – DSL, Cable Modem, E1, etc. – Cell wireless, satellite, WiMax Any Data applications and Protocols Any VoIP applications Any IP Video applications Anywhere on the globe

©2008 Blue Ridge Networks. All rights reserved. 18 SVES Deployment Regional Office Branch Office Remote workstation Enterprise HQ SVES creates a complete end to end private and secure network on the global Internet. Internet Enterprise Secure Mobile Office

©2008 Blue Ridge Networks. All rights reserved. 19 Why Blue Ridge for Security A company dedicated to security products and services for over 10 years. All products are independently certified for security features. –Common Criteria –NIST FIPS level 2 No reported vulnerabilities in 14 years of use by demanding customers. Currently providing managed security services in 39 countries.

©2008 Blue Ridge Networks. All rights reserved. 20 Thank You