We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published bySean O'Grady
Modified over 3 years ago
© CloudShield Technologies Peder Jungck, CTO & Founder
© CloudShield Technologies Company Overview Profile: Founded in 2000 115 Employees, Headquarters in Sunnyvale, CA Locations: DC, Toronto, São Paulo, London, Frankfurt, Singapore 22 technology patents filed with 12 approved to date Seasoned team: top networking, telecom & government organizations Solution Focus: Service Management & Security Policy-controlled, network elements that inspect, analyze & control all traffic; enabling lower costs, secure infrastructure & new revenues streams Large Network Operators: Telecom Service Provider, Defense Financials: Privately held, fully funded and targeting future IPO
© CloudShield Technologies DPPM-800 PN41 CS-2000 Solutions Overview & Approach 3 Hardware: CS-2000 & PN41 for IBM BladeCenter Architected open – only DPI vendor supporting open chassis architectures 100% packet inspection, no sampling; protocol-agnostic Most scalable solution(10Gbps/chassis & 20Gbps/Blade up to 1 terabit/rack) Low latency inline active or passive with stealth footprint Hardware: CS-2000 & PN41 for IBM BladeCenter Architected open – only DPI vendor supporting open chassis architectures 100% packet inspection, no sampling; protocol-agnostic Most scalable solution(10Gbps/chassis & 20Gbps/Blade up to 1 terabit/rack) Low latency inline active or passive with stealth footprint Software: packetC, PacketWorks & CPOS packetC & PacketWorks: Integrated Development Environment Rapid application development – 4 times faster than other approaches packetC first open network and packet knowledgeable language Eclipse based IDE with Language Editors, Version Control & Debugger CPOS: CloudShield PacketWorks Operating System Appliance virtualization – only DPI platform supporting multiple applications Proven secure architecture –strict separation between data & control planes Full layers 2-7 packet manipulation: inspect, intercept, block, modify, create Software: packetC, PacketWorks & CPOS packetC & PacketWorks: Integrated Development Environment Rapid application development – 4 times faster than other approaches packetC first open network and packet knowledgeable language Eclipse based IDE with Language Editors, Version Control & Debugger CPOS: CloudShield PacketWorks Operating System Appliance virtualization – only DPI platform supporting multiple applications Proven secure architecture –strict separation between data & control planes Full layers 2-7 packet manipulation: inspect, intercept, block, modify, create Broadest Set of Deployed Applications CloudShield Applications (Services Management & Infrastructure Security) Independent Software Developers (DDoS Mitigation, Lawful Intercept…) Systems Integrator Solutions (Services Mgmt. & Cross Domain Systems…) Customer Solutions (BGP Security, BOTS, Government Open Source…) Broadest Set of Deployed Applications CloudShield Applications (Services Management & Infrastructure Security) Independent Software Developers (DDoS Mitigation, Lawful Intercept…) Systems Integrator Solutions (Services Mgmt. & Cross Domain Systems…) Customer Solutions (BGP Security, BOTS, Government Open Source…)
© CloudShield Technologies Service Providers – Forces at Work 4 Service Providers Competition HackersShareholders Customers Must grow by adding new services and revenue streams Driving down monthly fees Demanding increased bandwidth and more value from providers Attacks against networks systems Service providers must cut costs, protect their infrastructure & deliver new services
© CloudShield Technologies Content Processing (DPI) Value Progression Improving Service Expense Control and Revenue Growth Infrastructure Expense Control P2P Control Systems & Visibility to Usage By User; Remove Network Overloads Improved Average Revenue Per User New Revenue Based Services (Security, Parental Control, Voice, Video) Network Monetization Transition Value of Content Providers Back To Network Provider (Advertising Revenue) Control Costs Network Traffic Control Infrastructure Security Appliance Virtualization Increase $/User Enable New Services VoIP, VoD, Wireless data Upgrade on Demand Hosted Services Managed Security Services Monetize Subscribers New Revenue Streams Ad Insertion & Targeting Tailored Information/Access Monetize Existing Users Usage CPM Ad Uplift New Billing Models Time
© CloudShield Technologies Service Delivery Retail/Wholesale Customer Purchase Portal User Purchase of Services. Media Content NW Services Branding Retail Wholesale Provisioning System Approval of Purchases Feature Customer Account Status Provisioning Data Services Bob Joe Sue Sly Service Delivery METRO / CO
© CloudShield Technologies Thank You Peder Jungck CTO & Founder firstname.lastname@example.org
PeerApp Proprietary and Confidential UltraBand Content Delivery Platform.
Grow your business with your head in the cloud. What is Cloud Computing ? Internet-based computing, whereby shared resources, software and information.
IXIA + FIREEYE SECURITY BATTLECARD SCALABLE HIGH AVAILABILITY PROTECTION FROM CYBER ATTACKS WHY COMBINE IXIA & FIREEYE? FireEye NX, FX, PX and EX appliances.
Web Streaming Solution DIGIMELD GRID-STREAMING SOLUTIONS Copyright © 2008 DigiMeld, Inc.
Decision Group Market Analysis. Agenda Market DPI/DPC Market Size Market Segments Forensic Solution Market Competitors Decision Market Position.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
DaaS (Desktop as a Service) Last Update: July 15 th, 2015.
Decision Group April 2010 Market Analysis. Agenda Market DPI/DPC Market Size Market Segments Forensic Solution Market Competitors Decision.
Presentation | P2P Media Summit CacheLogic Advanced Solutions for P2P Networks Presentation by Andrew Parker, CTO
Akamai Technologies - Overview RSA ® Conference 2013.
COPYRIGHT © 2012 ALCATEL-LUCENT. ALL RIGHTS RESERVED. ALCATEL-LUCENT — CONFIDENTIAL — SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW — PROPRIETARY.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
Check Point Virtual Gateway Protects Microsoft Azure Cloud Infrastructure with a Full Range of Security Defenses and Threat Prevention Solutions MICROSOFT.
Flight is a SaaS Solution that Accelerates the Secure Transfer of Large Files and Data Sets Into and Out of Microsoft Azure Blob Storage MICROSOFT AZURE.
2007 Level 3 Communications, Inc. All Rights Reserved. 1 Business Markets Group: Reliable and Responsive Prepared for CUSTOMER NAME PRESENTER’S NAME.
EPIC Connections® is a leading provider of contact center consulting, outsourcing and managed infrastructure services. Our highly qualified teams deliver.
Services not available everywhere. Business customers only. CenturyLink may change, cancel, or substitute offers and services, or vary them by service.
©2015 EarthLink. All rights reserved Cloud Express ™ Optimize Your Business & Cloud Networks.
For Business Partner use only IBM Software Group © 2003 IBM Corporation Competitive Update 2003 Business Partner Version.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
Effectively Explaining the Cloud to Your Colleagues.
Delivering Capacity, Low Latency and Low Jitter Jim Freeze, SVP Marketing & Alliances October 2007.
International infrastructure outsource models Eckart Zollner Safnog 2 April 2015.
Citrix Partner Update The Citrix Delivery Centre.
23-Jan-16 CLOUD COMPUTING & IPTV BY ROBERT NATHAN.
Ron van Herk Founder and CTO, AHT International BV The P2P Television Revolution The shape of things to come - but it's coming sooner than many would.
Duncan Fraiser, Adam Gambrell, Lisa Schalk, Emily Williams.
The Yottabyte NetStorage ™ Company Copyright © 2002 Steve Mattioli President and CEO.
Overview SessionVista™ Enterprise is the first integrated network monitoring and control appliance that combines application layer firewall capabilities.
Norman SecureSurf Protect your users when surfing the Internet.
Align Business and Information Technology – with SOA Pradeep Nair Director – Software Group (IBM India/SA)
Virtualization Lab 3 – Virtualization Fall 2012 CSCI 6303 Principles of I.T.
Summary Objectives: Objectives: Establish the new office and staff Establish the new office and staff Start providing our services to businesses Start.
Bluesocket vWLAN Overview. Its ALL about n……
Peering, network sharing, interconnects Eckart Zollner September 2014.
Content Delivery Cloud A Better Alternative To Your Content Delivery Network (CDN) ©2013 Riverbed Technology Confidential and Proprietary.
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
CONTENT DELIVERY NETWORKS Course: Telecom Technologies Prepared By: - Shiv Kumar Pandey MIT School Of Telecom.
Microsoft Mobile Service Platform Empowering The Agile Service Provider Ronald Chan Business Development Manager Network Service Providers Microsoft Greater.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES Lesson №18 Telecommunication software design for analyzing and control packets on the networks by using.
Profit from a practical IP Billing Solution Suresh Balasubramanian Senior Product Manager Macrovision.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
© Copyright 2011 Hewlett-Packard Development Company, L.P. 1 Sundara Nagarajan (“SN”) CLOUD SYSTEMS AUTOMATION.
Sridhar Ramachandran Chief Technology Officer Core Session Controller.
Chapter 7. Discuss Intranet and its benefits Discuss e-commerce and various forms of e-commerce Discuss the security issues in the e-commerce environment.
WAVECOM©2005. All rights reserved 1 Intelligent Device Management Service Offer Emmanuel Walckenaer April Lisboa.
October 10-13, 2006 San Diego Convention Center, San Diego California VoIP/SOA Integration Impact on IT Apps, Processes, & Overall Business.
Converged Service Management Platform A Means to Innovative User Cases Tepal - Panama 2016 Alex Fano – VP Sales CaLA.
© 2009 Wipro Ltd - Confidential 1 Security Challenges and Opportunities -Indian ISP Scenario.
Dell SonicWALL Security Series 2/14. Confidential 2 Dell SonicWALL Security solutions Product overview Agenda About threats Protecting.
© 2017 SlidePlayer.com Inc. All rights reserved.