Securing Emerging Mobile Technology JOHN G. LEVINE PH.D. D/CHIEF ARCHITECTURE GROUP 13 SEP 2012 1.

Slides:



Advertisements
Similar presentations
October 10-13, 2006 San Diego Convention Center, San Diego California VoIP/SOA Integration Impact on IT Apps, Processes, & Overall Business.
Advertisements

Nortel Proprietary Information 2 The Impact of the World Wide Web on Carrier Networks – an Historic Opportunity Geoff Hall Chief Technology Officer, EMEA.
All rights reserved © 2006, Alcatel Grid Standardization & ETSI (May 2006) B. Berde, Alcatel R & I.
Trusted Computing in Government Networks May 16, 2007 Richard C. (Dick) Schaeffer, Jr. Information Assurance Director National Security Agency.
Workshop on Telecommunications for Disaster Relief, February 2003, Geneva Dag Nielsen & Catherine Mulligan Ericsson Response WLAN in Disaster and.
Geneva, Switzerland, 22 September 2012 FTTx in Japan: Past, Present, and Prospects for the Future Ken-Ichi Suzuki, NTT Access Network Service Systems Laboratories,
Mid-market server campaign – thru partner presentation: Slide for presenter only: do not show Speaker: Partner Title of Presentation: Giving you the power.
Issued by Iskratel; All rights reserved Iskratel Group Over 60 Years on the Telecommunications Market More than 12 mio Ports Installed Employees.
Mobile Devices in the DoD
Vishal K. Singh, Henning Schulzrinne
Everyone is going Wireless - VoIP is no exception Sanjit Chatterjee Director – Global Marketing
Device Evolution Greg Pelton Chief Technology Officer
Partner Smart Talk Series 101
1. 2 August Recommendation 9.1 of the Strategic Information Technology Advisory Committee (SITAC) report initiated the effort to create an Administrative.
VoIP - Australian Regulatory Practice and Directions Duncan MacAuslan Task Coordinator - VoIP ITP Training September 2006.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
What: Bringing the Latest Technology to Consumers in Washington 1 © 2014 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo and other marks.
BENEFITS OF SUCCESSFUL IT MODERNIZATION
November 2012 | Cancun, Mexico. Avaya - Proprietary. Use pursuant to your signed agreement or Avaya policy. 2 Networking Innovation Lounge Virtual.
Libraries in FE Colleges Capita Library Management System Demonstration May 2013.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
ISS IT Assessment Framework
October 4-7, 2004 Los Angeles, CA Changing the VoIP Paradigm: Delivering Value over IP John Meyer President, Lucent Worldwide Services.
Centralized Platform for Mobile Device Management and VoIP.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Colombo, Sri Lanka, 7-10 April 2009 Multimedia Service Delivery on Next Generation Networks Pradeep De Almeida, Group Chief Technology Officer Dialog Telekom.
VoIP Security Assessment Service Mark D. Collier Chief Technology Officer
Solution Briefing Flexible Workstyle. Solution Briefing work-life blur more mobile tech savvy multiple devices digital generation fast paced Consumerization.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
DuraCloud Managing durable data in the cloud Michele Kimpton, Director DuraSpace.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Mobile data. Introduction Wireless (cellular) communications has experienced a tremendous growth in this decade. Most of the wireless users also access.
CANARIE’s DAIR Digital Accelerator For Innovation and Research March 2011.
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
IP-v6 Drivers for Aviation & Usage Concepts Terry L Davis Boeing Commercial Airplanes (Advisor to the North America IPv6 Task Force)
Enterprise User Enabling Warfighter Capability
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
March 15, 2008 PM of FMC 1 Rich Watson Director of Technical Marketing DiVitas Networks – Mountain View March 15, 2008.
Sitefinity Partner Program
Greg Pisano Director, Market Development Brooktrout Technology.
September 15, 2003FG3 Report FOCUS GROUP 3 Interoperability Report to NRIC VI Council September 15, 2003 Cliff Naughton (Boeing)
Convergence Technology. Ch 01 Telecom Overview  Define communications and telecommunications  Components of a communications system  Difference between.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
Copyright© 2002 Avaya Inc. All rights reserved Anna Dorcey Director, Avaya DeveloperConnection Program August 4, 2004 Partnering in the VOIP World Anna.
EPA Geospatial Segment United States Environmental Protection Agency Office of Environmental Information Enterprise Architecture Program Segment Architecture.
1 Presentation_ID Mobile Wireless Internet Forum (MWIF)
Last Updated 1/17/02 1 Business Drivers Guiding Portal Evolution Portals Integrate web-based systems to increase productivity and reduce.
Deploying Windows 10 in the Enterprise Introduction and Windows as a Service Michael blogs.technet.com/mniehaus.
1. Nortel Confidential Information BUSINESS MADE SIMPLE 2 The Future of Telecommunications John A. Phillips Nortel, ETSI General Assembly Chairman 2007.
Enterprise Engineering Directorate (EE)
Selecting the Best Alternative Design Strategy. Two basic steps 1.Generate a comprehensive set of alternative design strategies 2.Select the one design.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
Business Communications Paradigm Shift telephone web conferencing teleconferencing two-party video multi-party video tools.
HUIT Cloud Initiative Update November, /20/2013 Ryan Frazier & Rob Parrott.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
WHAT IS SO SPECIAL? Wireless Router Analogue Telephone Adaptor + SMCWTVG.
HP Network and Service Provider Business Unit Sebastiano Tevarotto February 2003.
National Emergency Communications Plan Update National Association of Regulatory Utility Commissioners Winter Committee Meeting February 16, 2015 Ron Hewitt.
1 USDOT Next Generation Initiative Laurie Flaherty EMS Division, NHTSA.
Advancing National Wireless Capability Date: March 22, 2016 Wireless Test Bed & Wireless National User Facility Paul Titus Department Manager, Communications.
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Improving the WiFi Customer Experience
Check Point Connectra NGX R60
Mobile Commerce and Ubiquitous Computing
Red Sky Update “Watching the horizon for emerging health threats”
Presentation transcript:

Securing Emerging Mobile Technology JOHN G. LEVINE PH.D. D/CHIEF ARCHITECTURE GROUP 13 SEP

UNAMBIGUOUS DEMAND SIGNAL FROM CUSTOMERS 2

SECURE ANYWHERE, ANYTIME ACCESS TO ENTERPRISE INFRASTRUCTURE 3

CURRENT MOBILITY ENVIRONMENT Unaware of potential threats Susceptible to social engineering Bypassing "inconvenient security Insider threat, leaks and sabotage Multiple points of interception Communication and Data Centers / Towers Towers, Wireless and Wireline Over the Air updates Rogue base stations Ease of use is valued over security Vulnerabilities are widespread Attacks are cheap and easy Apps available at low or no cost Minimal technical experience required 4

PATHWAY TO SECURITY Security must be integrated into components – systems approach User interfaces must be intuitive and familiar Policy needs to stay on top of technology curve Solutions should: – Support commercial functionality – Be cost effective – Align with commercial product lifecycles User Experience Security 5

MOBILITY ENTERPRISE STRATEGY 3G | 4G Seamless Transition Wi-Fi The Cloud Internet Access Gateways PSTN Gateways 6

EXTERNAL DEPENDENCIES Carrier data coverage QoS in carrier networks * Data circuits in carrier networks * 4G / LTE is expected to improve some of the user experience as carriers upgrade 7

MOBILITY GOALS Publish and update Capability Packages Minimum security capabilities Vendor agnostic architectures Residual risk assessments Establish a Mobile Enterprise Capability Policy enforcement & enterprise security Interoperability via gateways Anywhere, Anytime, Access to Unclass, Secret, Top Secret & SCI infrastructure Establish Partnerships and work with Industry Commercial development focused to meet security requirements out of the box Forecast and prepare for next generation security technologies 8

Design Security Architecture Identify Need Develop Concept Prototype Pilot Test & Evaluate CAPABILITY DELIVERY PROCESS Implement Operational Capability Requirements Guidance to Industry Capability Package Technology Gaps System Bugs 9

MOBILITY PILOTS Milestones – Unclassified Pilot Kickoff (30 Sep 2011) – Classified Pilot Kickoff (Dec 2011) – Web based Data Pilot (May 2012) UNCLASSIFIED//FOR OFFICIAL USE ONLY Architecture – Two layers of encryption (VoIP and VPN) – Gateway connection to Enterprise Infrastructure – Backend services secured in a SCIF – Delivers secure voice and data capability – Dependant on carrier QoS – Hardened handsets 10

MOBILITY CAPABILITY PACKAGES Mobility Capability Package Pilots are used to help create CPs Development and release is an iterative process between IAD experts, interested vendors, and external partners Partners IAD SME Community CSfC Package Release Customers Vendors Integrators 11 Late 2012 Early 2013

KEY ACHIEVEMENTS TO DATE Established Mobility Innovation Center (MIC) to drive/prove technology Delivered TOP SECRET voice and data pilot (FISHBOWL) Delivered NSA Campus laptop pilot (WIFIGHTER) Demonstrated tablet architecture First Mobility Capabilities Package on web at NSA.gov 12

LOOKING AHEAD Improve user experience Prototype and pilot data services to other devices Continue to perform vulnerability analysis of emerging technologies Prototype and pilot Evolved Packet Core (EPC) capabilities Continue to mature Mobility Capability Packages Continue to work with Industry Incorporate lessons learned into future demonstrations 13

CONCLUSION Securing mobility requires a new way of thinking: Use commercial standards, platforms and applications when possible Composable and layered solutions/services to achieve desired security Integrated and hardened commercial infrastructure Keep pace with emerging technologies Strong partnerships between government and industry Work early and often with Industry to get it right from the start! 14

For wa r d. Thinking.