SlideShare a Scribd company logo
1 of 2
Download to read offline
www.kudelskisecurity.com
request@kudelskisecurity.com
Cybersecurity unit of Kudelski Group
END-TO-END SECURE 4G-LTE
WIRELESS BROADBAND SOLUTION
THE CHALLENGE OF SECURE BROADBAND FOR CRITICAL COMMUNICATION
LTE is the future of mobile broadband technology. It provides the high-speed data capabilities needed for mission-critical
communications in all key sectors - from public safety, defense, and emergency services to transport, energy and water.
Several challenges, however, have emerged with the transition to 4G-LTE.
Firstly, end users are dependent on a service provided by commercial mobile network operators, over which they have no control.
They cannot have guaranteed consistent or priority access to the network, which is key to maintaining communication in critical
situations and facilitating an effective, coordinated operational response.
A second challenge relates to security. LTE brings new challenges in terms of cybersecurity, and organizations need to ensure that
the information they are transmitting cannot be intercepted by anyone trying to access sensitive information or disrupt operations.
In some countries, governments have answered these challenges by creating legislation that requires public safety and critical
infrastructure entities to own and operate private mobile networks.
The additional challenge of cost control faces any organization deploying a dedicated mobile network. Networks may not need to
be huge, but they do need to be scalable according to the number of end users. They also need to be compact and mobile, with
installations distributed wherever operations are taking place. Finding a cost-effective solution is a formidable challenge.
SOLUTION OVERVIEW – SECURE BY DESIGN
MOBILE CELLULAR COMMUNICATION
Kudelski Security has created a cost-effective, secure-by-
design, portable and private cellular network that combines the
increased speeds, improved latency and greater bandwidth of
4G-LTE with the benefit of full independence from commercial
mobile network operators.
•	 Secure, self-contained mobile network infrastructure
in which personnel can communicate, and over which you
maintain full control and visibility
•	 Ruggedized mobile units create secure, independent
network bubbles (no single-point-of failure) that
enable offices and units in different areas of operation to
communicate with, or independently of, the secured IP
central infrastructure
•	 Mobile units can cover areas of many kilometers.
Communications within those areas remain local,
guaranteeing network operation even if remote
connectivity (e.g. satcom link) becomes unavailable
•	 Extra security possible by incorporating customized
algorithms into the hardware or software encryption
•	 Built-in sensors and management console to monitor
and analyze local and advanced threats in real time.
Units can also connect to Kudelski Security’s Cyber
Fusion Center for long-term, secure storage and big data
analytics and intelligence
KEY FEATURES
Secure 4G-LTE, which can complement the Cyber Fusion
Center has the following key features:
1.	 Complete and compact secure mobile network based on
latest 3GPP standards, supporting UMTS, HSPA, LTE 
WiFi technologies and running on COTS hardware.
2.	 End-to-end voice encryption for mobile and desktop
devices, based on hardware and software cryptography,
for secure communication.
3.	 Resilient, secure, scalable and built on cost-effective
Network Function Virtualization (NFV) and service-oriented
architecture, allowing for better use of resources, and
distribution of network functions that ensures local users
are served ‘locally’ and network load is reduced.
4.	 Local application servers offering best-in-class user
experience and high security (secure voice over
LTE, secure push-to-talk, one-to-many secure video
distribution, secure messaging).
5.	 Data access management based on built-in, SIM-based
authentication.
6.	 Real-time monitoring and advanced threat intelligence
possible through the optional Cyber Fusion Center
solution, enabling tracking and reporting of user activity
both inside and outside the communication network.
7.	 IT-friendly management and easy system operability
through web-based interfaces and API.
END-TO-END SECURE 4G-LTE
WIRELESS BROADBAND SOLUTION
ABOUT KUDELSKI SECURITY
Kudelski Security, a division of the Kudelski Group (SIX: KUD.S), is an innovative, independent Swiss provider of tailored cyber and
media security solutions to enterprises and public sector institutions.
Our team of security experts delivers end-to-end consulting, technology, managed services, and threat intelligence to help
organizations build and run successful security programs.
Our global reach and cyber solutions focus is reinforced by key international partnerships.
www.kudelskisecurity.com
request@kudelskisecurity.com
Cybersecurity unit of Kudelski Group
ABOUT ATHONET
Athonet is a company specialized in the field of mobile network infrastructure where “the software is the network”. Athonet
has created a unique compact, cost-effective and transportable Mobile Core solution for LTE/UMTS/WiFi networks dedicated to
serving mobile operators, professional users and MVNOs. Athonet’s product, PriMo, has been fully built in-house to virtualize
(NFV) and increase the performance of the Mobile Core in a cost-effective manner running on standard IT servers. PriMo provides
very low latency, highly reliable complete support for LTE/WiFi voice and data services that have been successfully deployed by
operators, government and private clients in real-world mission-critical conditions. Athonet is headquartered in Italy.
For more information please visit: www.athonet.com
POLICE
CRITICAL
INFRASTRUCTURE
FIRST AID
GOVERNMENT
DEFENSE
END-TO-END SECURE VOICE AND DATA EXCHANGE
4G-LTE WIRELESS BROADBAND SOLUTION
SECURE 4G-LTE PRIVATE MOBILE
NETWORK FOR LOCAL COVERAGE
Native
encryption
for VoLTE
Identity credentials
access management
user / group
provisioning and
access management
One-to-many
secure broadcast
Network triggers
warnings, logs
API for feedback
control
Local monitoring
Smart LTE mobile core
Secure
VoLTE
Secure
Broadcast
Secure, self-contained 4G-LTE
network infrastructure through which
personnel can communicate, and over
which full control and visibility is
maintained

More Related Content

What's hot

Driving fixed mobile convergence with 5 g 140617 final with notes
Driving fixed mobile convergence with 5 g 140617 final with notesDriving fixed mobile convergence with 5 g 140617 final with notes
Driving fixed mobile convergence with 5 g 140617 final with notesDr. David Soldani
 
M2 m overview_18112013
M2 m overview_18112013M2 m overview_18112013
M2 m overview_18112013Saida Yengui
 
Security and Transport Performance in 5G
Security and Transport Performance in 5GSecurity and Transport Performance in 5G
Security and Transport Performance in 5GDirk Kutscher
 
What is next for Telecom (Broadband and Cell) - September 2021
What is next for Telecom (Broadband and Cell) - September 2021What is next for Telecom (Broadband and Cell) - September 2021
What is next for Telecom (Broadband and Cell) - September 2021paul young cpa, cga
 
Evolution of M2M Communication
Evolution of M2M CommunicationEvolution of M2M Communication
Evolution of M2M CommunicationIndaka Raigama
 
A Review of Low Power Wide Area Technology in Licensed and Unlicensed Spectru...
A Review of Low Power Wide Area Technology in Licensed and Unlicensed Spectru...A Review of Low Power Wide Area Technology in Licensed and Unlicensed Spectru...
A Review of Low Power Wide Area Technology in Licensed and Unlicensed Spectru...journalBEEI
 
Supelec m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.4)
Supelec   m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.4)Supelec   m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.4)
Supelec m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.4)Thierry Lestable
 
5 g enterprise market
5 g enterprise market5 g enterprise market
5 g enterprise marketarchanamohol
 
IDC: Peplink Adds Resilience to IoT Networks
IDC: Peplink Adds Resilience to IoT NetworksIDC: Peplink Adds Resilience to IoT Networks
IDC: Peplink Adds Resilience to IoT NetworksEric Wong
 
5G-Advanced Technology Evolution from a Network Perspective White Paper 2.0
5G-Advanced Technology Evolution from a Network Perspective White Paper 2.05G-Advanced Technology Evolution from a Network Perspective White Paper 2.0
5G-Advanced Technology Evolution from a Network Perspective White Paper 2.0IPLOOK Networks
 
Blockchain convergence wih 5 g and iot
Blockchain convergence wih 5 g and iotBlockchain convergence wih 5 g and iot
Blockchain convergence wih 5 g and iotClint Smith
 
Aviation 5G/5G in Aviation
Aviation 5G/5G in AviationAviation 5G/5G in Aviation
Aviation 5G/5G in AviationAssem mousa
 
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-20215G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021IPLOOK Networks
 
InnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivityInnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivityThibault Cantegrel
 
A fresh approach to remote IoT connectivity | by Podsystem
A fresh approach to remote IoT connectivity | by Podsystem A fresh approach to remote IoT connectivity | by Podsystem
A fresh approach to remote IoT connectivity | by Podsystem Kira Ugai
 
Strategi Menyonsong 5G di Indonesia
Strategi Menyonsong 5G di IndonesiaStrategi Menyonsong 5G di Indonesia
Strategi Menyonsong 5G di IndonesiaMastel Indonesia
 

What's hot (20)

Ipx explained
Ipx   explainedIpx   explained
Ipx explained
 
Driving fixed mobile convergence with 5 g 140617 final with notes
Driving fixed mobile convergence with 5 g 140617 final with notesDriving fixed mobile convergence with 5 g 140617 final with notes
Driving fixed mobile convergence with 5 g 140617 final with notes
 
M2 m overview_18112013
M2 m overview_18112013M2 m overview_18112013
M2 m overview_18112013
 
Security and Transport Performance in 5G
Security and Transport Performance in 5GSecurity and Transport Performance in 5G
Security and Transport Performance in 5G
 
What is next for Telecom (Broadband and Cell) - September 2021
What is next for Telecom (Broadband and Cell) - September 2021What is next for Telecom (Broadband and Cell) - September 2021
What is next for Telecom (Broadband and Cell) - September 2021
 
Evolution of M2M Communication
Evolution of M2M CommunicationEvolution of M2M Communication
Evolution of M2M Communication
 
A Review of Low Power Wide Area Technology in Licensed and Unlicensed Spectru...
A Review of Low Power Wide Area Technology in Licensed and Unlicensed Spectru...A Review of Low Power Wide Area Technology in Licensed and Unlicensed Spectru...
A Review of Low Power Wide Area Technology in Licensed and Unlicensed Spectru...
 
Overview – M2M Equipment’s Manufacturer
Overview – M2M Equipment’s ManufacturerOverview – M2M Equipment’s Manufacturer
Overview – M2M Equipment’s Manufacturer
 
Supelec m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.4)
Supelec   m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.4)Supelec   m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.4)
Supelec m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.4)
 
5 g enterprise market
5 g enterprise market5 g enterprise market
5 g enterprise market
 
IDC: Peplink Adds Resilience to IoT Networks
IDC: Peplink Adds Resilience to IoT NetworksIDC: Peplink Adds Resilience to IoT Networks
IDC: Peplink Adds Resilience to IoT Networks
 
5G-Advanced Technology Evolution from a Network Perspective White Paper 2.0
5G-Advanced Technology Evolution from a Network Perspective White Paper 2.05G-Advanced Technology Evolution from a Network Perspective White Paper 2.0
5G-Advanced Technology Evolution from a Network Perspective White Paper 2.0
 
Blockchain convergence wih 5 g and iot
Blockchain convergence wih 5 g and iotBlockchain convergence wih 5 g and iot
Blockchain convergence wih 5 g and iot
 
Aviation 5G/5G in Aviation
Aviation 5G/5G in AviationAviation 5G/5G in Aviation
Aviation 5G/5G in Aviation
 
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-20215G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021
 
InnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivityInnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivity
 
A fresh approach to remote IoT connectivity | by Podsystem
A fresh approach to remote IoT connectivity | by Podsystem A fresh approach to remote IoT connectivity | by Podsystem
A fresh approach to remote IoT connectivity | by Podsystem
 
IPLOOK global cases
IPLOOK global casesIPLOOK global cases
IPLOOK global cases
 
Tcl telecom expertise v 2 00 vs 220812
Tcl telecom expertise v 2 00 vs 220812Tcl telecom expertise v 2 00 vs 220812
Tcl telecom expertise v 2 00 vs 220812
 
Strategi Menyonsong 5G di Indonesia
Strategi Menyonsong 5G di IndonesiaStrategi Menyonsong 5G di Indonesia
Strategi Menyonsong 5G di Indonesia
 

Similar to Secure 4G-LTE Private Mobile Network Solution

Druid - Latest Case Studies & Use Cases_08.07.20
Druid - Latest Case Studies & Use Cases_08.07.20Druid - Latest Case Studies & Use Cases_08.07.20
Druid - Latest Case Studies & Use Cases_08.07.20Druid Software
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureExclusive Networks ME
 
Future Intelligence Fusepool End User presentation Harris Moysadis
Future Intelligence Fusepool End User presentation Harris MoysadisFuture Intelligence Fusepool End User presentation Harris Moysadis
Future Intelligence Fusepool End User presentation Harris MoysadisFusepool SME project
 
Iot basics & evolution of 3 gpp technolgies for iot connectivity
Iot basics & evolution of 3 gpp technolgies for iot connectivityIot basics & evolution of 3 gpp technolgies for iot connectivity
Iot basics & evolution of 3 gpp technolgies for iot connectivityKAILASH CHAUHAN
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Unisys Corporation
 
A Fresh Approach to Remote IoT Connectivity
A Fresh Approach to Remote IoT ConnectivityA Fresh Approach to Remote IoT Connectivity
A Fresh Approach to Remote IoT ConnectivityPodsystem M2M
 
Io t solutions schildknecht ag en_2021
Io t solutions schildknecht ag en_2021Io t solutions schildknecht ag en_2021
Io t solutions schildknecht ag en_2021Dhilan Atapattu
 
Io t solutions schildknecht ag en_2021
Io t solutions schildknecht ag en_2021Io t solutions schildknecht ag en_2021
Io t solutions schildknecht ag en_2021DhilanAtapattu1
 
Midokura for Industry 4.0
Midokura for Industry 4.0Midokura for Industry 4.0
Midokura for Industry 4.0Susan Wu
 
Block Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for TelcomBlock Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for TelcomBlockArmour1
 
Cybersecurity Trends in Telecom Industry.pptx
Cybersecurity Trends in Telecom Industry.pptxCybersecurity Trends in Telecom Industry.pptx
Cybersecurity Trends in Telecom Industry.pptxSonaliG6
 
HH QUALCOMM UplinQ - the next 10 billion mobile devices
HH QUALCOMM UplinQ - the next 10 billion mobile devicesHH QUALCOMM UplinQ - the next 10 billion mobile devices
HH QUALCOMM UplinQ - the next 10 billion mobile devicesSatya Harish
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...IJCSIS Research Publications
 
Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015Nagui Chalache
 
Bayside Case Study (Final January 2014)
Bayside Case Study (Final January 2014)Bayside Case Study (Final January 2014)
Bayside Case Study (Final January 2014)Nep Vijayaraja
 
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecuritySECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecurityIRJET Journal
 
SPHER NET full presentation - v1.1 Final
SPHER NET full presentation - v1.1 FinalSPHER NET full presentation - v1.1 Final
SPHER NET full presentation - v1.1 FinalElliot Charles Willcox
 

Similar to Secure 4G-LTE Private Mobile Network Solution (20)

Druid - Latest Case Studies & Use Cases_08.07.20
Druid - Latest Case Studies & Use Cases_08.07.20Druid - Latest Case Studies & Use Cases_08.07.20
Druid - Latest Case Studies & Use Cases_08.07.20
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access Architecture
 
Future Intelligence Fusepool End User presentation Harris Moysadis
Future Intelligence Fusepool End User presentation Harris MoysadisFuture Intelligence Fusepool End User presentation Harris Moysadis
Future Intelligence Fusepool End User presentation Harris Moysadis
 
Iot basics & evolution of 3 gpp technolgies for iot connectivity
Iot basics & evolution of 3 gpp technolgies for iot connectivityIot basics & evolution of 3 gpp technolgies for iot connectivity
Iot basics & evolution of 3 gpp technolgies for iot connectivity
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
 
A Fresh Approach to Remote IoT Connectivity
A Fresh Approach to Remote IoT ConnectivityA Fresh Approach to Remote IoT Connectivity
A Fresh Approach to Remote IoT Connectivity
 
Io t solutions schildknecht ag en_2021
Io t solutions schildknecht ag en_2021Io t solutions schildknecht ag en_2021
Io t solutions schildknecht ag en_2021
 
Io t solutions schildknecht ag en_2021
Io t solutions schildknecht ag en_2021Io t solutions schildknecht ag en_2021
Io t solutions schildknecht ag en_2021
 
Midokura for Industry 4.0
Midokura for Industry 4.0Midokura for Industry 4.0
Midokura for Industry 4.0
 
Value Journal - March 2021
Value Journal - March 2021Value Journal - March 2021
Value Journal - March 2021
 
Block Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for TelcomBlock Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for Telcom
 
Cybersecurity Trends in Telecom Industry.pptx
Cybersecurity Trends in Telecom Industry.pptxCybersecurity Trends in Telecom Industry.pptx
Cybersecurity Trends in Telecom Industry.pptx
 
HH QUALCOMM UplinQ - the next 10 billion mobile devices
HH QUALCOMM UplinQ - the next 10 billion mobile devicesHH QUALCOMM UplinQ - the next 10 billion mobile devices
HH QUALCOMM UplinQ - the next 10 billion mobile devices
 
Huawei 6 month industrail training program
Huawei 6 month industrail training programHuawei 6 month industrail training program
Huawei 6 month industrail training program
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
 
Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015
 
5G_Upload.docx
5G_Upload.docx5G_Upload.docx
5G_Upload.docx
 
Bayside Case Study (Final January 2014)
Bayside Case Study (Final January 2014)Bayside Case Study (Final January 2014)
Bayside Case Study (Final January 2014)
 
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecuritySECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
 
SPHER NET full presentation - v1.1 Final
SPHER NET full presentation - v1.1 FinalSPHER NET full presentation - v1.1 Final
SPHER NET full presentation - v1.1 Final
 

More from Sylvain Maret

Air Navigation Service Providers - Unsecurity on Voice over IP Radion
Air Navigation Service Providers - Unsecurity on Voice over IP RadionAir Navigation Service Providers - Unsecurity on Voice over IP Radion
Air Navigation Service Providers - Unsecurity on Voice over IP RadionSylvain Maret
 
INA Volume 1/3 Version 1.02 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.02 Released / Digital Identity and AuthenticationINA Volume 1/3 Version 1.02 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.02 Released / Digital Identity and AuthenticationSylvain Maret
 
INA Volume 1/3 Version 1.0 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 Released / Digital Identity and AuthenticationINA Volume 1/3 Version 1.0 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 Released / Digital Identity and AuthenticationSylvain Maret
 
INA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 RC / Digital Identity and AuthenticationINA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 RC / Digital Identity and AuthenticationSylvain Maret
 
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012Sylvain Maret
 
Strong Authentication State of the Art 2012 / Sarajevo CSO
Strong Authentication State of the Art 2012 / Sarajevo CSOStrong Authentication State of the Art 2012 / Sarajevo CSO
Strong Authentication State of the Art 2012 / Sarajevo CSOSylvain Maret
 
ASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain Maret
ASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain MaretASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain Maret
ASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain MaretSylvain Maret
 
Threat Modeling / iPad
Threat Modeling / iPadThreat Modeling / iPad
Threat Modeling / iPadSylvain Maret
 
Strong Authentication in Web Application #SCS III
Strong Authentication in Web Application #SCS IIIStrong Authentication in Web Application #SCS III
Strong Authentication in Web Application #SCS IIISylvain Maret
 
Strong Authentication in Web Applications: State of the Art 2011
Strong Authentication in Web Applications: State of the Art 2011Strong Authentication in Web Applications: State of the Art 2011
Strong Authentication in Web Applications: State of the Art 2011Sylvain Maret
 
Strong Authentication in Web Application / ConFoo.ca 2011
Strong Authentication in Web Application / ConFoo.ca 2011Strong Authentication in Web Application / ConFoo.ca 2011
Strong Authentication in Web Application / ConFoo.ca 2011Sylvain Maret
 
Authentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationAuthentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationSylvain Maret
 
Geneva Application Security Forum 2010
Geneva Application Security Forum 2010Geneva Application Security Forum 2010
Geneva Application Security Forum 2010Sylvain Maret
 
Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...
Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...
Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...Sylvain Maret
 
Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...
Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...
Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...Sylvain Maret
 
Digital identity trust & confidence
Digital identity trust & confidenceDigital identity trust & confidence
Digital identity trust & confidenceSylvain Maret
 
Implementation of a Biometric Solution Providing Strong Authentication To Gai...
Implementation of a Biometric Solution Providing Strong Authentication To Gai...Implementation of a Biometric Solution Providing Strong Authentication To Gai...
Implementation of a Biometric Solution Providing Strong Authentication To Gai...Sylvain Maret
 
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Sylvain Maret
 
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Sylvain Maret
 
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Sylvain Maret
 

More from Sylvain Maret (20)

Air Navigation Service Providers - Unsecurity on Voice over IP Radion
Air Navigation Service Providers - Unsecurity on Voice over IP RadionAir Navigation Service Providers - Unsecurity on Voice over IP Radion
Air Navigation Service Providers - Unsecurity on Voice over IP Radion
 
INA Volume 1/3 Version 1.02 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.02 Released / Digital Identity and AuthenticationINA Volume 1/3 Version 1.02 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.02 Released / Digital Identity and Authentication
 
INA Volume 1/3 Version 1.0 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 Released / Digital Identity and AuthenticationINA Volume 1/3 Version 1.0 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 Released / Digital Identity and Authentication
 
INA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 RC / Digital Identity and AuthenticationINA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
 
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
 
Strong Authentication State of the Art 2012 / Sarajevo CSO
Strong Authentication State of the Art 2012 / Sarajevo CSOStrong Authentication State of the Art 2012 / Sarajevo CSO
Strong Authentication State of the Art 2012 / Sarajevo CSO
 
ASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain Maret
ASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain MaretASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain Maret
ASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain Maret
 
Threat Modeling / iPad
Threat Modeling / iPadThreat Modeling / iPad
Threat Modeling / iPad
 
Strong Authentication in Web Application #SCS III
Strong Authentication in Web Application #SCS IIIStrong Authentication in Web Application #SCS III
Strong Authentication in Web Application #SCS III
 
Strong Authentication in Web Applications: State of the Art 2011
Strong Authentication in Web Applications: State of the Art 2011Strong Authentication in Web Applications: State of the Art 2011
Strong Authentication in Web Applications: State of the Art 2011
 
Strong Authentication in Web Application / ConFoo.ca 2011
Strong Authentication in Web Application / ConFoo.ca 2011Strong Authentication in Web Application / ConFoo.ca 2011
Strong Authentication in Web Application / ConFoo.ca 2011
 
Authentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationAuthentication and strong authentication for Web Application
Authentication and strong authentication for Web Application
 
Geneva Application Security Forum 2010
Geneva Application Security Forum 2010Geneva Application Security Forum 2010
Geneva Application Security Forum 2010
 
Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...
Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...
Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...
 
Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...
Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...
Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...
 
Digital identity trust & confidence
Digital identity trust & confidenceDigital identity trust & confidence
Digital identity trust & confidence
 
Implementation of a Biometric Solution Providing Strong Authentication To Gai...
Implementation of a Biometric Solution Providing Strong Authentication To Gai...Implementation of a Biometric Solution Providing Strong Authentication To Gai...
Implementation of a Biometric Solution Providing Strong Authentication To Gai...
 
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...
 
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...
 
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...
 

Secure 4G-LTE Private Mobile Network Solution

  • 1. www.kudelskisecurity.com request@kudelskisecurity.com Cybersecurity unit of Kudelski Group END-TO-END SECURE 4G-LTE WIRELESS BROADBAND SOLUTION THE CHALLENGE OF SECURE BROADBAND FOR CRITICAL COMMUNICATION LTE is the future of mobile broadband technology. It provides the high-speed data capabilities needed for mission-critical communications in all key sectors - from public safety, defense, and emergency services to transport, energy and water. Several challenges, however, have emerged with the transition to 4G-LTE. Firstly, end users are dependent on a service provided by commercial mobile network operators, over which they have no control. They cannot have guaranteed consistent or priority access to the network, which is key to maintaining communication in critical situations and facilitating an effective, coordinated operational response. A second challenge relates to security. LTE brings new challenges in terms of cybersecurity, and organizations need to ensure that the information they are transmitting cannot be intercepted by anyone trying to access sensitive information or disrupt operations. In some countries, governments have answered these challenges by creating legislation that requires public safety and critical infrastructure entities to own and operate private mobile networks. The additional challenge of cost control faces any organization deploying a dedicated mobile network. Networks may not need to be huge, but they do need to be scalable according to the number of end users. They also need to be compact and mobile, with installations distributed wherever operations are taking place. Finding a cost-effective solution is a formidable challenge. SOLUTION OVERVIEW – SECURE BY DESIGN MOBILE CELLULAR COMMUNICATION Kudelski Security has created a cost-effective, secure-by- design, portable and private cellular network that combines the increased speeds, improved latency and greater bandwidth of 4G-LTE with the benefit of full independence from commercial mobile network operators. • Secure, self-contained mobile network infrastructure in which personnel can communicate, and over which you maintain full control and visibility • Ruggedized mobile units create secure, independent network bubbles (no single-point-of failure) that enable offices and units in different areas of operation to communicate with, or independently of, the secured IP central infrastructure • Mobile units can cover areas of many kilometers. Communications within those areas remain local, guaranteeing network operation even if remote connectivity (e.g. satcom link) becomes unavailable • Extra security possible by incorporating customized algorithms into the hardware or software encryption • Built-in sensors and management console to monitor and analyze local and advanced threats in real time. Units can also connect to Kudelski Security’s Cyber Fusion Center for long-term, secure storage and big data analytics and intelligence KEY FEATURES Secure 4G-LTE, which can complement the Cyber Fusion Center has the following key features: 1. Complete and compact secure mobile network based on latest 3GPP standards, supporting UMTS, HSPA, LTE WiFi technologies and running on COTS hardware. 2. End-to-end voice encryption for mobile and desktop devices, based on hardware and software cryptography, for secure communication. 3. Resilient, secure, scalable and built on cost-effective Network Function Virtualization (NFV) and service-oriented architecture, allowing for better use of resources, and distribution of network functions that ensures local users are served ‘locally’ and network load is reduced. 4. Local application servers offering best-in-class user experience and high security (secure voice over LTE, secure push-to-talk, one-to-many secure video distribution, secure messaging). 5. Data access management based on built-in, SIM-based authentication. 6. Real-time monitoring and advanced threat intelligence possible through the optional Cyber Fusion Center solution, enabling tracking and reporting of user activity both inside and outside the communication network. 7. IT-friendly management and easy system operability through web-based interfaces and API.
  • 2. END-TO-END SECURE 4G-LTE WIRELESS BROADBAND SOLUTION ABOUT KUDELSKI SECURITY Kudelski Security, a division of the Kudelski Group (SIX: KUD.S), is an innovative, independent Swiss provider of tailored cyber and media security solutions to enterprises and public sector institutions. Our team of security experts delivers end-to-end consulting, technology, managed services, and threat intelligence to help organizations build and run successful security programs. Our global reach and cyber solutions focus is reinforced by key international partnerships. www.kudelskisecurity.com request@kudelskisecurity.com Cybersecurity unit of Kudelski Group ABOUT ATHONET Athonet is a company specialized in the field of mobile network infrastructure where “the software is the network”. Athonet has created a unique compact, cost-effective and transportable Mobile Core solution for LTE/UMTS/WiFi networks dedicated to serving mobile operators, professional users and MVNOs. Athonet’s product, PriMo, has been fully built in-house to virtualize (NFV) and increase the performance of the Mobile Core in a cost-effective manner running on standard IT servers. PriMo provides very low latency, highly reliable complete support for LTE/WiFi voice and data services that have been successfully deployed by operators, government and private clients in real-world mission-critical conditions. Athonet is headquartered in Italy. For more information please visit: www.athonet.com POLICE CRITICAL INFRASTRUCTURE FIRST AID GOVERNMENT DEFENSE END-TO-END SECURE VOICE AND DATA EXCHANGE 4G-LTE WIRELESS BROADBAND SOLUTION SECURE 4G-LTE PRIVATE MOBILE NETWORK FOR LOCAL COVERAGE Native encryption for VoLTE Identity credentials access management user / group provisioning and access management One-to-many secure broadcast Network triggers warnings, logs API for feedback control Local monitoring Smart LTE mobile core Secure VoLTE Secure Broadcast Secure, self-contained 4G-LTE network infrastructure through which personnel can communicate, and over which full control and visibility is maintained