SlideShare a Scribd company logo
1 of 28
Download to read offline
Straw Program
- Topics that highlight Ericsson’s IP
expertise
- Leverage Ericsson’s strengths and
apply to new technology and issues to
resolve. (e.g, MBH)
- Focus on operator perspective and
pain points
- Cover emerging tech and tech we have
“on the truck”
- Include “friendly” partners to show not
working in a vacuum
- Industry thought leaders for keynotes to
highlight technical business drivers
- One track for non-technical business
related content*
- Possible Friday customer meetings
• 2-3 distinct parallel tracks.
• Could have side room for “Meet the Engineer” private sessions.
Ericsson’s Security
Solutions
Security in A Networked Society
Telebriefing, 15 April 2015
Jonathan Olsson
Security specialist,
Group Function Technology
Stefan Jung
Head of Product Line Security
Business Unit Cloud and IP
Pedro Calderon
Product Management, Product Line Authentication & Digital ID
Business Unit Support Solutions
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 2
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 3
THE NetworkED society REQUIRES
A different SECURITY mINDSET
Security for
people
Security for
business
Security for
society
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 3
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 4
Connectivity more and more
part of our life
1875 20001975
10
30
50
15 years
50 billion connected devices
25 years
5 billion connected people
100 years
1 billion connected places
20
40
Connections(billion)
2020
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 4
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 5
Connectivity integrated
into our way of life
Collaboration
Innovation
Privacy
Competence
Trust
Socializing
Learning
Everything
PEOPLE do
Media
Commerce
Security
Government
Education
Transport
Healthcare
Utilities
In all parts of
SOCIETY &
BUSINESS
Will be done over a
NETWORK
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 6
NEW OPPORTUNITIES
– NEW CHALLENGES
Increased
network capacity
More commerce &
financial transactions
More cloud
storage & services
Open and capable
devices
An IP based unified
global network
New things
get connected
More services
get networked
More decisions
based on real-time data
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 6
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 7
our perspective on Security
in the networked society
• services should always be available
• security should require minimum effort from users
• communications should be protected
• all access to information and data should be authorized
• manipulation of data in the networks should be possible to detect
• the right to privacy should be protected
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 7
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 8
System scale
Users
Thousands Millions Billions
Enterprise
Telecom Networks
Multiple Networks
Moderate
Large
Very large
Our Focus:
Large scale security
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 8
AUTHENTICATION
& identity
Pedro Calderon
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 9
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 10
Secure Authentication
across all networks & services
Mobile
identity
ioT/M2MIMS & VolTe Media
delivery
Trusted
proxy
Cloud ready solutions
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 11
THE NETWORKED SOCIETY
Billion of devices in need of …
› Simple
› Scalable
› Cost efficient
› Secure
› E2E Solutions
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 12
Advanced security technology to…
› Meet the demand of billions of new connections
–Technology today is not only about connecting objects… It is about the data
integrity, its security and what companies do with it…
› Drive the Inflection point for new connections revenues
–Focusing on key Industry & Society Sectors
› Automotive (CVC), Industry 4.0, Health care (m-health) & Utilities.
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 12
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 13
Protected Enterprise
Protected GatewaySensor Network
SIM - UICC
GBA Bootstrapping
Protect Enterprise Access
Connect Device
Protected Data Transfer
Security for iot networks
BSF
NAF
BSF Bootstrapping Server Function
NAF Network Application Function
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 13
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 14
› First Network Based Authentication
(GBA) implementation over
LTE/WiFi for IOT/M2M in the world
› Scalable, Certificate independent
E2E solution for IoT Capillary
networks
› Future proof AKA Based 5G security
Ericsson Security
solutions for IOT
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 15
Sample use cases
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 16
Ericsson authentication & digital Identity
rich portfolio of mature & Innovative products
AUTHENTICATION
4 the NETWORK
SOCIETY
INNOVATIVE
YET PROVEN
SOLUTIONS
SCALABLE
AND
RELIABLE
GLOBAL
REACH AND
PRESENCE
PUSHING FOR
ENTIRE
ECOSYSTEM
Securing
the network society
Stefan Jung
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 17
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 18
The Traditional Approach to
Cyber Security
Build a fence around
the data. Which has
fundamental flaws…
• You can’t be 100% sure the
fence is working (no
instrumentation).
• Supervisors, courts and the
public have no transparency.
• Cloud computing means the
perimeter blurs.
• Over 50% of electronic fraud is
conducted by insiders.
ATTACKER
PERIMETER
INSIDER
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 19
Verifying that
DATA
In your network
is not compromised
What is data-centric security?
Firmware
ConfigurationsFirewalls Routing tables
Data-at-rest
…and other
critical assets
Event logs
PaaS / IaaS
Virtualization
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 19
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 20
The offerings
Data Centric Security portfolio:
Solutions:
Ericsson Cybersecurity
Ericsson Big Data Regulatory Compliance
Ericsson Industrial Infrastructure Assurance
Ericsson Internet-of-Things Security
Products:
Ericsson Security Operations Center Manager
Ericsson Security Appliance
Ericsson Global Signing as-a-Service
Ericsson Global Identity as-a-Service
CONFIDEN-
TIALITY
AVAILABILITY INTEGRITY
SECURITY
MODEL
Prevent the
disclosure of
information to
unauthorized
individual or
systems
Maintaining and
assuring the
accuracy and
consistency of
systems and data
Making sure that the
computing systems, the
security controls, and the
communication channels
are functioning correctly
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 21
Integrity Breach Confidentiality Breach
Your car Your braking system stops working Your braking patterns are exposed
Your flight
Your plane’s instruments report that
you are 1,000 feet lower than you
actually are
Your flight plan is posted on Internet
(note: it already is)
Your local power station
Critical systems compromised leading
to shutdown and catastrophic failure
Your electricity bill is published online
Your pacemaker Shutdown and death
Your heartbeat becomes public
knowledge
Your home
Your security system is remotely
disabled
The contents of your fridge are
‘leaked’. You drink how much beer?
Why does integrity matter
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 22
KSI® is a blockchain technology
invented by Guardtime.
KSI blockchain is a public ledger
that provides proof of time, integrity
and identity of electronic data.
Used by governments since 2007,
KSI will be made available for global
enterprises by Ericsson in 2015.
Enabling Technology
keyless signature infrastructure (KSI®)
KSI Calendar
Blockchain
Global
Aggregation
Tree
Europe Asia Americas
Hash Values Keyless Signatures
Customer Data
NETWORK Analytics –
Mobile network
securIty
Jonathan Olsson
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 23
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 24
Changing Device Ecosystem
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 25
Telecom
network
Integrated Security Solution
Internet
SIEM + NGFW
ERICSSON NETWORK
MANAGER
(e2e Analytics)
TRAFFIC
ANOMALIES
SECURITY
EVENTS
IMPROVED DETECTION AND RESPONSE
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 26
Operator Benefits
PROTECT
NETWORK RESOURCES
PROTECT
CUSTOMER SATISFACTION
INCREASE
TRUSTWORTHINESS
CREATE
VALUE-ADDED SERVICES
CONTROL
OPERATIONAL EXPENSE
PROTECT
ENTERPRISES
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 26
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 27
Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 28
KSI is a data signature
technology invented by
Guardtime.
KSI data signatures provide proof
of time and integrity of electronic
data as well as attribution of
origin.
Used by governments since 2007,
KSI will be made available for
global enterprises by Ericsson in
2015.
Enabling technology
keyless signature infrastructure (KSI)
Open Verification: For signature
verification, one needs to trust publicly
available information only - verification
does not rely on trusted insiders or
security of key-stores.
Massively scalable: System
performance is practically independent of
the number of clients or amount of data
signed / verified.
Portable: Data can be verified even
after crossing geographical or
organizational boundaries or service
providers.
Supports Real-time
Protection: Data signature
verification requires milliseconds, which
allows clients to perform continuous
monitoring and tamper detection.
Long-term validity: Proof is
based only on the properties of hash
functions and does not expire.
Carrier Grade: The system
architecture is able to deliver 99.999%
availability.
Offline: The system does not
require network connectivity for
verification.
Post-Quantum: The proof stays
valid even assuming functioning
quantum computers, i.e. does not rely
on traditional asymmetric or elliptic curve
cryptography.
.

More Related Content

What's hot

Innovative software solutions for industry 4.0 (English+Mandarin)
Innovative software solutions for industry 4.0 (English+Mandarin)Innovative software solutions for industry 4.0 (English+Mandarin)
Innovative software solutions for industry 4.0 (English+Mandarin)Ishay Tentser
 
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)IoT613
 
BYOD - What Every CFO Needs To Know
BYOD - What Every CFO Needs To KnowBYOD - What Every CFO Needs To Know
BYOD - What Every CFO Needs To KnowKirill Bensonoff
 
Scaling Internet of Things
Scaling Internet of ThingsScaling Internet of Things
Scaling Internet of ThingsEricsson
 
Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot IoT Tunisia
 
GES 2019 - Global Launch Lounge - “Collaborations for a Better Future” - PODI...
GES 2019 - Global Launch Lounge - “Collaborations for a Better Future” - PODI...GES 2019 - Global Launch Lounge - “Collaborations for a Better Future” - PODI...
GES 2019 - Global Launch Lounge - “Collaborations for a Better Future” - PODI...PODIS Ltd
 
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Rick Huijbregts
 
At&t cybersecurity introduction with alien vault
At&t cybersecurity introduction with alien vaultAt&t cybersecurity introduction with alien vault
At&t cybersecurity introduction with alien vaultMohamed Abdelhakim
 
Discovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTDiscovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTAlcatel-Lucent Enterprise
 
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...Cloud Native Day Tel Aviv
 
Io t standardization jan2015 mg strategy
Io t standardization jan2015 mg strategyIo t standardization jan2015 mg strategy
Io t standardization jan2015 mg strategyMartin Gutberlet
 
Unified Access from Application Chaos to Application Fluency
Unified Access from Application Chaos to Application FluencyUnified Access from Application Chaos to Application Fluency
Unified Access from Application Chaos to Application FluencyAlcatel-Lucent Enterprise
 
Importance of APIs and their Management in Digitalisation Initiatives
Importance of APIs and their Management in Digitalisation InitiativesImportance of APIs and their Management in Digitalisation Initiatives
Importance of APIs and their Management in Digitalisation InitiativesSEEBURGER
 
Embedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applicationsEmbedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applicationsM2M Alliance e.V.
 
Key Technologies for IoT
Key Technologies for IoTKey Technologies for IoT
Key Technologies for IoTBjörn Ekelund
 
Internet of Everything: The CIO's Point of View
Internet of Everything:  The CIO's Point of ViewInternet of Everything:  The CIO's Point of View
Internet of Everything: The CIO's Point of ViewCisco Canada
 
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity Darek Czuchaj
 

What's hot (20)

IoT ecosystem
IoT ecosystemIoT ecosystem
IoT ecosystem
 
Innovative software solutions for industry 4.0 (English+Mandarin)
Innovative software solutions for industry 4.0 (English+Mandarin)Innovative software solutions for industry 4.0 (English+Mandarin)
Innovative software solutions for industry 4.0 (English+Mandarin)
 
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
 
BYOD - What Every CFO Needs To Know
BYOD - What Every CFO Needs To KnowBYOD - What Every CFO Needs To Know
BYOD - What Every CFO Needs To Know
 
Scaling Internet of Things
Scaling Internet of ThingsScaling Internet of Things
Scaling Internet of Things
 
Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot
 
GES 2019 - Global Launch Lounge - “Collaborations for a Better Future” - PODI...
GES 2019 - Global Launch Lounge - “Collaborations for a Better Future” - PODI...GES 2019 - Global Launch Lounge - “Collaborations for a Better Future” - PODI...
GES 2019 - Global Launch Lounge - “Collaborations for a Better Future” - PODI...
 
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
 
At&t cybersecurity introduction with alien vault
At&t cybersecurity introduction with alien vaultAt&t cybersecurity introduction with alien vault
At&t cybersecurity introduction with alien vault
 
Discovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTDiscovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoT
 
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
 
Io t standardization jan2015 mg strategy
Io t standardization jan2015 mg strategyIo t standardization jan2015 mg strategy
Io t standardization jan2015 mg strategy
 
Unified Access from Application Chaos to Application Fluency
Unified Access from Application Chaos to Application FluencyUnified Access from Application Chaos to Application Fluency
Unified Access from Application Chaos to Application Fluency
 
M2M Scenario
M2M ScenarioM2M Scenario
M2M Scenario
 
Importance of APIs and their Management in Digitalisation Initiatives
Importance of APIs and their Management in Digitalisation InitiativesImportance of APIs and their Management in Digitalisation Initiatives
Importance of APIs and their Management in Digitalisation Initiatives
 
Embedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applicationsEmbedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applications
 
Digital buildings
Digital buildingsDigital buildings
Digital buildings
 
Key Technologies for IoT
Key Technologies for IoTKey Technologies for IoT
Key Technologies for IoT
 
Internet of Everything: The CIO's Point of View
Internet of Everything:  The CIO's Point of ViewInternet of Everything:  The CIO's Point of View
Internet of Everything: The CIO's Point of View
 
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
 

Viewers also liked

Guard time connect_estonia 21.03.2012
Guard time connect_estonia 21.03.2012Guard time connect_estonia 21.03.2012
Guard time connect_estonia 21.03.2012connectestonia
 
EBAN Statistics 2014 - summary
EBAN Statistics 2014 - summaryEBAN Statistics 2014 - summary
EBAN Statistics 2014 - summaryeban_org
 
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Martin Ruubel
 
Ericsson Technology Review: Sustaining legitimacy and trust in a data-driven ...
Ericsson Technology Review: Sustaining legitimacy and trust in a data-driven ...Ericsson Technology Review: Sustaining legitimacy and trust in a data-driven ...
Ericsson Technology Review: Sustaining legitimacy and trust in a data-driven ...Ericsson
 
Gender parity in ICT
Gender parity in ICTGender parity in ICT
Gender parity in ICTEricsson
 
Blockchain in 2016 - Advanced Distributed Ledger Technologies
Blockchain in 2016 - Advanced Distributed Ledger TechnologiesBlockchain in 2016 - Advanced Distributed Ledger Technologies
Blockchain in 2016 - Advanced Distributed Ledger TechnologiesHoward Smith
 

Viewers also liked (6)

Guard time connect_estonia 21.03.2012
Guard time connect_estonia 21.03.2012Guard time connect_estonia 21.03.2012
Guard time connect_estonia 21.03.2012
 
EBAN Statistics 2014 - summary
EBAN Statistics 2014 - summaryEBAN Statistics 2014 - summary
EBAN Statistics 2014 - summary
 
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
 
Ericsson Technology Review: Sustaining legitimacy and trust in a data-driven ...
Ericsson Technology Review: Sustaining legitimacy and trust in a data-driven ...Ericsson Technology Review: Sustaining legitimacy and trust in a data-driven ...
Ericsson Technology Review: Sustaining legitimacy and trust in a data-driven ...
 
Gender parity in ICT
Gender parity in ICTGender parity in ICT
Gender parity in ICT
 
Blockchain in 2016 - Advanced Distributed Ledger Technologies
Blockchain in 2016 - Advanced Distributed Ledger TechnologiesBlockchain in 2016 - Advanced Distributed Ledger Technologies
Blockchain in 2016 - Advanced Distributed Ledger Technologies
 

Similar to telebriefing-150415-ericssons-security-solutions

Continuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkContinuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkQuEST Forum
 
How operator core networks evolve towards 5G - Digital Futures 2025
How operator core networks evolve towards 5G - Digital Futures 2025How operator core networks evolve towards 5G - Digital Futures 2025
How operator core networks evolve towards 5G - Digital Futures 2025Ovum
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
Public Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case StudiesPublic Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case StudiesConnected Futures
 
Presentation fmc group 2015 nov
Presentation fmc group 2015 novPresentation fmc group 2015 nov
Presentation fmc group 2015 novBostjan Mencigar
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceDale Butler
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016Dale Butler
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...FinTech Belgium
 
M2M deployments in SDN Enabled IPv6 Networks
M2M deployments in SDN Enabled IPv6 NetworksM2M deployments in SDN Enabled IPv6 Networks
M2M deployments in SDN Enabled IPv6 NetworksEricsson
 
Vizocom corporate presentation
Vizocom corporate presentationVizocom corporate presentation
Vizocom corporate presentationDino Sergio
 
Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015Nagui Chalache
 
Solving the Digital Edge
Solving the Digital EdgeSolving the Digital Edge
Solving the Digital EdgeEquinix
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9alvin chin
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agendaCopperberg
 
Gartner_CSC_The Era of Digital Transformation New Normal or Deja Vu_v4
Gartner_CSC_The Era of Digital Transformation New Normal or Deja Vu_v4Gartner_CSC_The Era of Digital Transformation New Normal or Deja Vu_v4
Gartner_CSC_The Era of Digital Transformation New Normal or Deja Vu_v4Sam Lakkundi
 
2015 12-01 digital transformation in industrial automation sanitized
2015 12-01 digital transformation in industrial automation sanitized2015 12-01 digital transformation in industrial automation sanitized
2015 12-01 digital transformation in industrial automation sanitizedThorsten Schroeer
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014Andris Soroka
 

Similar to telebriefing-150415-ericssons-security-solutions (20)

Continuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkContinuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security Framework
 
How operator core networks evolve towards 5G - Digital Futures 2025
How operator core networks evolve towards 5G - Digital Futures 2025How operator core networks evolve towards 5G - Digital Futures 2025
How operator core networks evolve towards 5G - Digital Futures 2025
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
10 belsky
10 belsky10 belsky
10 belsky
 
Public Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case StudiesPublic Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case Studies
 
Presentation fmc group 2015 nov
Presentation fmc group 2015 novPresentation fmc group 2015 nov
Presentation fmc group 2015 nov
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conference
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 
M2M deployments in SDN Enabled IPv6 Networks
M2M deployments in SDN Enabled IPv6 NetworksM2M deployments in SDN Enabled IPv6 Networks
M2M deployments in SDN Enabled IPv6 Networks
 
Vizocom corporate presentation
Vizocom corporate presentationVizocom corporate presentation
Vizocom corporate presentation
 
Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015
 
Lomma Kommun
Lomma Kommun Lomma Kommun
Lomma Kommun
 
Solving the Digital Edge
Solving the Digital EdgeSolving the Digital Edge
Solving the Digital Edge
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agenda
 
Gartner_CSC_The Era of Digital Transformation New Normal or Deja Vu_v4
Gartner_CSC_The Era of Digital Transformation New Normal or Deja Vu_v4Gartner_CSC_The Era of Digital Transformation New Normal or Deja Vu_v4
Gartner_CSC_The Era of Digital Transformation New Normal or Deja Vu_v4
 
2015 12-01 digital transformation in industrial automation sanitized
2015 12-01 digital transformation in industrial automation sanitized2015 12-01 digital transformation in industrial automation sanitized
2015 12-01 digital transformation in industrial automation sanitized
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
 

telebriefing-150415-ericssons-security-solutions

  • 1. Straw Program - Topics that highlight Ericsson’s IP expertise - Leverage Ericsson’s strengths and apply to new technology and issues to resolve. (e.g, MBH) - Focus on operator perspective and pain points - Cover emerging tech and tech we have “on the truck” - Include “friendly” partners to show not working in a vacuum - Industry thought leaders for keynotes to highlight technical business drivers - One track for non-technical business related content* - Possible Friday customer meetings • 2-3 distinct parallel tracks. • Could have side room for “Meet the Engineer” private sessions. Ericsson’s Security Solutions Security in A Networked Society Telebriefing, 15 April 2015
  • 2. Jonathan Olsson Security specialist, Group Function Technology Stefan Jung Head of Product Line Security Business Unit Cloud and IP Pedro Calderon Product Management, Product Line Authentication & Digital ID Business Unit Support Solutions Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 2
  • 3. Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 3 THE NetworkED society REQUIRES A different SECURITY mINDSET Security for people Security for business Security for society Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 3
  • 4. Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 4 Connectivity more and more part of our life 1875 20001975 10 30 50 15 years 50 billion connected devices 25 years 5 billion connected people 100 years 1 billion connected places 20 40 Connections(billion) 2020 Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 4
  • 5. Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 5 Connectivity integrated into our way of life Collaboration Innovation Privacy Competence Trust Socializing Learning Everything PEOPLE do Media Commerce Security Government Education Transport Healthcare Utilities In all parts of SOCIETY & BUSINESS Will be done over a NETWORK
  • 6. Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 6 NEW OPPORTUNITIES – NEW CHALLENGES Increased network capacity More commerce & financial transactions More cloud storage & services Open and capable devices An IP based unified global network New things get connected More services get networked More decisions based on real-time data Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 6
  • 7. Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 7 our perspective on Security in the networked society • services should always be available • security should require minimum effort from users • communications should be protected • all access to information and data should be authorized • manipulation of data in the networks should be possible to detect • the right to privacy should be protected Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 7
  • 8. Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 8 System scale Users Thousands Millions Billions Enterprise Telecom Networks Multiple Networks Moderate Large Very large Our Focus: Large scale security Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 8
  • 9. AUTHENTICATION & identity Pedro Calderon Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 9
  • 10. Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 10 Secure Authentication across all networks & services Mobile identity ioT/M2MIMS & VolTe Media delivery Trusted proxy Cloud ready solutions
  • 11. Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 11 THE NETWORKED SOCIETY Billion of devices in need of … › Simple › Scalable › Cost efficient › Secure › E2E Solutions
  • 12. Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 12 Advanced security technology to… › Meet the demand of billions of new connections –Technology today is not only about connecting objects… It is about the data integrity, its security and what companies do with it… › Drive the Inflection point for new connections revenues –Focusing on key Industry & Society Sectors › Automotive (CVC), Industry 4.0, Health care (m-health) & Utilities. Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 12
  • 13. Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 13 Protected Enterprise Protected GatewaySensor Network SIM - UICC GBA Bootstrapping Protect Enterprise Access Connect Device Protected Data Transfer Security for iot networks BSF NAF BSF Bootstrapping Server Function NAF Network Application Function Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 13
  • 14. Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 14 › First Network Based Authentication (GBA) implementation over LTE/WiFi for IOT/M2M in the world › Scalable, Certificate independent E2E solution for IoT Capillary networks › Future proof AKA Based 5G security Ericsson Security solutions for IOT
  • 15. Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 15 Sample use cases
  • 16. Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 16 Ericsson authentication & digital Identity rich portfolio of mature & Innovative products AUTHENTICATION 4 the NETWORK SOCIETY INNOVATIVE YET PROVEN SOLUTIONS SCALABLE AND RELIABLE GLOBAL REACH AND PRESENCE PUSHING FOR ENTIRE ECOSYSTEM
  • 17. Securing the network society Stefan Jung Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 17
  • 18. Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 18 The Traditional Approach to Cyber Security Build a fence around the data. Which has fundamental flaws… • You can’t be 100% sure the fence is working (no instrumentation). • Supervisors, courts and the public have no transparency. • Cloud computing means the perimeter blurs. • Over 50% of electronic fraud is conducted by insiders. ATTACKER PERIMETER INSIDER
  • 19. Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 19 Verifying that DATA In your network is not compromised What is data-centric security? Firmware ConfigurationsFirewalls Routing tables Data-at-rest …and other critical assets Event logs PaaS / IaaS Virtualization Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 19
  • 20. Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 20 The offerings Data Centric Security portfolio: Solutions: Ericsson Cybersecurity Ericsson Big Data Regulatory Compliance Ericsson Industrial Infrastructure Assurance Ericsson Internet-of-Things Security Products: Ericsson Security Operations Center Manager Ericsson Security Appliance Ericsson Global Signing as-a-Service Ericsson Global Identity as-a-Service CONFIDEN- TIALITY AVAILABILITY INTEGRITY SECURITY MODEL Prevent the disclosure of information to unauthorized individual or systems Maintaining and assuring the accuracy and consistency of systems and data Making sure that the computing systems, the security controls, and the communication channels are functioning correctly
  • 21. Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 21 Integrity Breach Confidentiality Breach Your car Your braking system stops working Your braking patterns are exposed Your flight Your plane’s instruments report that you are 1,000 feet lower than you actually are Your flight plan is posted on Internet (note: it already is) Your local power station Critical systems compromised leading to shutdown and catastrophic failure Your electricity bill is published online Your pacemaker Shutdown and death Your heartbeat becomes public knowledge Your home Your security system is remotely disabled The contents of your fridge are ‘leaked’. You drink how much beer? Why does integrity matter
  • 22. Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 22 KSI® is a blockchain technology invented by Guardtime. KSI blockchain is a public ledger that provides proof of time, integrity and identity of electronic data. Used by governments since 2007, KSI will be made available for global enterprises by Ericsson in 2015. Enabling Technology keyless signature infrastructure (KSI®) KSI Calendar Blockchain Global Aggregation Tree Europe Asia Americas Hash Values Keyless Signatures Customer Data
  • 23. NETWORK Analytics – Mobile network securIty Jonathan Olsson Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 23
  • 24. Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 24 Changing Device Ecosystem
  • 25. Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 25 Telecom network Integrated Security Solution Internet SIEM + NGFW ERICSSON NETWORK MANAGER (e2e Analytics) TRAFFIC ANOMALIES SECURITY EVENTS IMPROVED DETECTION AND RESPONSE
  • 26. Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 26 Operator Benefits PROTECT NETWORK RESOURCES PROTECT CUSTOMER SATISFACTION INCREASE TRUSTWORTHINESS CREATE VALUE-ADDED SERVICES CONTROL OPERATIONAL EXPENSE PROTECT ENTERPRISES Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 26
  • 27. Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 27
  • 28. Telebriefing Security Solutions | Public | © Telefonaktiebolaget LM Ericsson 2015 | 2015-04-15 | Page 28 KSI is a data signature technology invented by Guardtime. KSI data signatures provide proof of time and integrity of electronic data as well as attribution of origin. Used by governments since 2007, KSI will be made available for global enterprises by Ericsson in 2015. Enabling technology keyless signature infrastructure (KSI) Open Verification: For signature verification, one needs to trust publicly available information only - verification does not rely on trusted insiders or security of key-stores. Massively scalable: System performance is practically independent of the number of clients or amount of data signed / verified. Portable: Data can be verified even after crossing geographical or organizational boundaries or service providers. Supports Real-time Protection: Data signature verification requires milliseconds, which allows clients to perform continuous monitoring and tamper detection. Long-term validity: Proof is based only on the properties of hash functions and does not expire. Carrier Grade: The system architecture is able to deliver 99.999% availability. Offline: The system does not require network connectivity for verification. Post-Quantum: The proof stays valid even assuming functioning quantum computers, i.e. does not rely on traditional asymmetric or elliptic curve cryptography. .