SlideShare a Scribd company logo
Introducing Adva Network Security – a trusted German
anchor
September 2022
Security expertise and transparent operations
© 2022 ADVA. All rights reserved.
2
Increasing threat level
• Increasing complexity with IoT and enterprise 5G
• Higher impact as critical operations dependent on IT
• More sensitive data outside security perimeter
• No script kiddies but highly paid, highly skilled attackers
• Market for malware, exploit kits, attack services, zero-days
• Long-lasting, multi-staged attack scenarios
Expanding attack surface
Growing sophistication
• Huge business opportunities for cybercriminals
• Nation-state actors and geopolitical turmoil
• Low risk of criminal prosecution and punishment
More aggression
Need for highly secure network devices from security-qualified suppliers
© 2022 ADVA. All rights reserved.
3
Bottom-up network security
Combined optical (L1) – Ethernet (L2) – IP (L3) encryption closes any security gap
Protects all traffic between end points
of optical connection, but not the final
hops
Optical Layer 1 encryption
Site-to-site protection, needs to be at
every site and does not protect final
hop
Ethernet Layer 2 encryption
Mainly protects end connection or
application-to-application, however,
needs to be available at every end point
IP Layer 3 protection
© 2022 ADVA. All rights reserved.
4
Our three pillars of network security
• Protecting optical, Ethernet and
IP transport solutions
• Development, certification and
integration of essential security
components
• Re-use of security modules for
speed, efficiency and
effectiveness
Security sub-systems and
security modules
Optical
transport
Packet
network
Appliance
hosting
Hardened
security
components
• Security expertise
pooled/sheltered in Germany
• Driving security lifecycle process
across R&D and services
organization
• Pragmatic processes and clear
responsibility
Ring-fenced security team as
strong trust anchor
German
trust hub
• Leveraging independent security
competences
• Close interaction with BSI,
vendor and product approvals,
certifications
• Trust by transparency
Approval/certifications from
government security bodies
Gov. security
body, e.g., BSI
Adva
Network
Security
© 2022 ADVA. All rights reserved.
5
Track record with protective network controls
2010: First 10G optical encryption using AES-256
2014: Market-first 100G optical encryption
2016: First QKD demo in live network
2021: First post-quantum safe optical transport
2022: Founded
Adva Network Security
2021: First crypto-agile
end-to-end Ethernet encryption
2018: Introducing standard-compliant key exchange interface
Secure DCI solution
with finance
The making of Adva Network Security
Encryption protects
optical infrastructure
Ethernet encryption
with finance
Secure governmental
networks
2017: BSI-approved VS-NfD 100G encryption
© 2022 ADVA. All rights reserved.
6
Market-leading
supplier of optical and
packet transport
solutions
ADVA and Adva Network Security
• Open optical transport
• Ethernet and IP networking
• Synchronization and timing
• Network management
Security advisors
Secure design
Certification,
approval
Technology, products
Security competence
• Secure transport
• Packet and optical
• VS-NfD approved and
FIPS certified
• Professional security
support
Connectivity
networks for
sensitive information
© 2022 ADVA. All rights reserved.
7
Security offering: expertise, products, services
• Security-hardened optical transport
• Ethernet demarcation devices for
secure end-to-end connections
• Standardized key exchange interfaces
• BSI-approval VS-NfD, FIPS certifications
• Approved supplier
Products
• Professional services: design, build and
operate secure connectivity networks
• Product security incident management
• Joint research and innovation projects,
such as QKD, post-quantum security
Support
FSP 3000 – BSI-approved
optical transport
FSP 150 – packet edge
for secure end-to-end
connectivity
Secure
connectivity
VS-NfD
Plan – build – operate
© 2022 ADVA. All rights reserved.
8
Adva Network Security
Security solutions made in Germany
Robust critical infrastructure, protected businesses and secure governments
“We’re bringing many years of experience in
cryptography to this new German company.
With it, we’re making optical transmission and
data networks quantum safe.”
“We founded Adva Network Security to help
enterprises, government agencies and critical
infrastructure respond appropriately to the
intensifying threat landscape.“
Michael Roth,
general manager
Josef Sißmeir,
general manager
Thank you
IMPORTANT NOTICE
ADVA is the exclusive owner or licensee of the content, material, and information in this presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited.
The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or implied. ADVA shall not be responsible for and disclaims any liability for any loss or damages, including without limitation,
direct, indirect, incidental, consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation.
Copyright © for the entire content of this presentation: ADVA.
www.advasecurity.com | info@advasecurity.com

More Related Content

What's hot

SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?Haris Chughtai
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
 
Cellular V2X is Gaining Momentum
Cellular V2X is Gaining MomentumCellular V2X is Gaining Momentum
Cellular V2X is Gaining MomentumQualcomm Research
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionADVA
 
Introducing Coherent 100ZR for the optical edge
Introducing Coherent 100ZR for the optical edgeIntroducing Coherent 100ZR for the optical edge
Introducing Coherent 100ZR for the optical edgeADVA
 
Huawei IT Product and Solution Overview
Huawei IT Product and Solution OverviewHuawei IT Product and Solution Overview
Huawei IT Product and Solution OverviewOpenNebula Project
 
4G to 5G Evolution
4G to 5G Evolution4G to 5G Evolution
4G to 5G EvolutionManoj Singh
 
Nozomi Networks Level 1 Technical Certification
Nozomi Networks Level 1 Technical CertificationNozomi Networks Level 1 Technical Certification
Nozomi Networks Level 1 Technical CertificationGiacomoCocozziello
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise Management Associates
 
6G Training Course Part 7: 6G Technologies - Introduction
6G Training Course Part 7: 6G Technologies - Introduction6G Training Course Part 7: 6G Technologies - Introduction
6G Training Course Part 7: 6G Technologies - Introduction3G4G
 
Beginners: Open RAN Terminology – Virtualization, Disaggregation & Decomposition
Beginners: Open RAN Terminology – Virtualization, Disaggregation & DecompositionBeginners: Open RAN Terminology – Virtualization, Disaggregation & Decomposition
Beginners: Open RAN Terminology – Virtualization, Disaggregation & Decomposition3G4G
 
Introducing ultra-precise time for server-hosted applications
Introducing ultra-precise time for server-hosted applicationsIntroducing ultra-precise time for server-hosted applications
Introducing ultra-precise time for server-hosted applicationsADVA
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN Ashutosh Kaushik
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANRobb Boyd
 
The business case for SD WAN in the enterprise
The business case for SD WAN in the enterprise The business case for SD WAN in the enterprise
The business case for SD WAN in the enterprise Colt Technology Services
 
Synchronization for 5G: the requirements and the solutions
Synchronization for 5G: the requirements and the solutionsSynchronization for 5G: the requirements and the solutions
Synchronization for 5G: the requirements and the solutionsADVA
 
IP Mobile Backhaul Presentation
IP Mobile Backhaul PresentationIP Mobile Backhaul Presentation
IP Mobile Backhaul PresentationAviat Networks
 
How to build high performance 5G networks with vRAN and O-RAN
How to build high performance 5G networks with vRAN and O-RANHow to build high performance 5G networks with vRAN and O-RAN
How to build high performance 5G networks with vRAN and O-RANQualcomm Research
 

What's hot (20)

SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
Cellular V2X is Gaining Momentum
Cellular V2X is Gaining MomentumCellular V2X is Gaining Momentum
Cellular V2X is Gaining Momentum
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryption
 
Introducing Coherent 100ZR for the optical edge
Introducing Coherent 100ZR for the optical edgeIntroducing Coherent 100ZR for the optical edge
Introducing Coherent 100ZR for the optical edge
 
Huawei IT Product and Solution Overview
Huawei IT Product and Solution OverviewHuawei IT Product and Solution Overview
Huawei IT Product and Solution Overview
 
4G to 5G Evolution
4G to 5G Evolution4G to 5G Evolution
4G to 5G Evolution
 
Nozomi Networks Level 1 Technical Certification
Nozomi Networks Level 1 Technical CertificationNozomi Networks Level 1 Technical Certification
Nozomi Networks Level 1 Technical Certification
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
 
6G Training Course Part 7: 6G Technologies - Introduction
6G Training Course Part 7: 6G Technologies - Introduction6G Training Course Part 7: 6G Technologies - Introduction
6G Training Course Part 7: 6G Technologies - Introduction
 
Beginners: Open RAN Terminology – Virtualization, Disaggregation & Decomposition
Beginners: Open RAN Terminology – Virtualization, Disaggregation & DecompositionBeginners: Open RAN Terminology – Virtualization, Disaggregation & Decomposition
Beginners: Open RAN Terminology – Virtualization, Disaggregation & Decomposition
 
Introducing ultra-precise time for server-hosted applications
Introducing ultra-precise time for server-hosted applicationsIntroducing ultra-precise time for server-hosted applications
Introducing ultra-precise time for server-hosted applications
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WAN
 
The business case for SD WAN in the enterprise
The business case for SD WAN in the enterprise The business case for SD WAN in the enterprise
The business case for SD WAN in the enterprise
 
Synchronization for 5G: the requirements and the solutions
Synchronization for 5G: the requirements and the solutionsSynchronization for 5G: the requirements and the solutions
Synchronization for 5G: the requirements and the solutions
 
PortaOne Overview
PortaOne OverviewPortaOne Overview
PortaOne Overview
 
IP Mobile Backhaul Presentation
IP Mobile Backhaul PresentationIP Mobile Backhaul Presentation
IP Mobile Backhaul Presentation
 
5G UE Simulator
5G UE Simulator5G UE Simulator
5G UE Simulator
 
How to build high performance 5G networks with vRAN and O-RAN
How to build high performance 5G networks with vRAN and O-RANHow to build high performance 5G networks with vRAN and O-RAN
How to build high performance 5G networks with vRAN and O-RAN
 

Similar to Introducing Adva Network Security – a trusted German anchor

Industrial IoT summit_andresg_guilarte Siemens
Industrial IoT summit_andresg_guilarte Siemens Industrial IoT summit_andresg_guilarte Siemens
Industrial IoT summit_andresg_guilarte Siemens Andres G. Guilarte
 
Security and services drive data north
Security and services drive data northSecurity and services drive data north
Security and services drive data northADVA
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxssuser365526
 
ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...ADVA
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxArianeSpano
 
Vizocom Company Overview
Vizocom Company OverviewVizocom Company Overview
Vizocom Company OverviewDino Sergio
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
The Relevance of IoT and 5G for Multicloud - Vodafone and IBM join Forces
The Relevance of IoT and 5G for Multicloud - Vodafone and IBM join ForcesThe Relevance of IoT and 5G for Multicloud - Vodafone and IBM join Forces
The Relevance of IoT and 5G for Multicloud - Vodafone and IBM join ForcesVolker Schiecke
 
NAGRA KUDELSKI - Overview and Analysis
NAGRA KUDELSKI - Overview and AnalysisNAGRA KUDELSKI - Overview and Analysis
NAGRA KUDELSKI - Overview and AnalysisPiyushi Chaudhary
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerADVA
 
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...Bosnia Agile
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
2015 Identity Summit - The Identity Broker as Driver for Growth
2015 Identity Summit - The Identity Broker as Driver for Growth2015 Identity Summit - The Identity Broker as Driver for Growth
2015 Identity Summit - The Identity Broker as Driver for GrowthForgeRock
 
Cisco Industrial Wireless
Cisco Industrial WirelessCisco Industrial Wireless
Cisco Industrial WirelessCisco Russia
 

Similar to Introducing Adva Network Security – a trusted German anchor (20)

Industrial IoT summit_andresg_guilarte Siemens
Industrial IoT summit_andresg_guilarte Siemens Industrial IoT summit_andresg_guilarte Siemens
Industrial IoT summit_andresg_guilarte Siemens
 
Security and services drive data north
Security and services drive data northSecurity and services drive data north
Security and services drive data north
 
CDE Marketplace: SQR Systems
CDE Marketplace: SQR SystemsCDE Marketplace: SQR Systems
CDE Marketplace: SQR Systems
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...
 
SP 5G: Unified Enablement Platform
SP 5G: Unified Enablement Platform  SP 5G: Unified Enablement Platform
SP 5G: Unified Enablement Platform
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
 
Vizocom Company Overview
Vizocom Company OverviewVizocom Company Overview
Vizocom Company Overview
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
The Relevance of IoT and 5G for Multicloud - Vodafone and IBM join Forces
The Relevance of IoT and 5G for Multicloud - Vodafone and IBM join ForcesThe Relevance of IoT and 5G for Multicloud - Vodafone and IBM join Forces
The Relevance of IoT and 5G for Multicloud - Vodafone and IBM join Forces
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
NAGRA KUDELSKI - Overview and Analysis
NAGRA KUDELSKI - Overview and AnalysisNAGRA KUDELSKI - Overview and Analysis
NAGRA KUDELSKI - Overview and Analysis
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network Layer
 
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
2015 Identity Summit - The Identity Broker as Driver for Growth
2015 Identity Summit - The Identity Broker as Driver for Growth2015 Identity Summit - The Identity Broker as Driver for Growth
2015 Identity Summit - The Identity Broker as Driver for Growth
 
Cisco Industrial Wireless
Cisco Industrial WirelessCisco Industrial Wireless
Cisco Industrial Wireless
 
Ministry of Foreign Affairs
Ministry of Foreign AffairsMinistry of Foreign Affairs
Ministry of Foreign Affairs
 
Value Journal - October 2020
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
 

More from ADVA

Industrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clockIndustrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clockADVA
 
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...ADVA
 
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350  SePRC™ optical cesium clockIndustry's longest holdover with the OSA 3350  SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clockADVA
 
Precise and assured timing for enterprise networks
Precise and assured timing for enterprise networksPrecise and assured timing for enterprise networks
Precise and assured timing for enterprise networksADVA
 
Introducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demandIntroducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demandADVA
 
Meet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networkingMeet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networkingADVA
 
Quantum threat: How to protect your optical network
Quantum threat: How to protect your optical networkQuantum threat: How to protect your optical network
Quantum threat: How to protect your optical networkADVA
 
Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...ADVA
 
Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)ADVA
 
Open optical edge connecting mobile access networks
Open optical edge connecting mobile access networksOpen optical edge connecting mobile access networks
Open optical edge connecting mobile access networksADVA
 
Meet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation deviceMeet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation deviceADVA
 
Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™ADVA
 
10G edge technology for outdoor environments
10G edge technology for outdoor environments10G edge technology for outdoor environments
10G edge technology for outdoor environmentsADVA
 
The quantum age - secure transport networks
The quantum age - secure transport networksThe quantum age - secure transport networks
The quantum age - secure transport networksADVA
 
From leased lines to optical spectrum services
From leased lines to optical spectrum servicesFrom leased lines to optical spectrum services
From leased lines to optical spectrum servicesADVA
 
The coherent optical edge
The coherent optical edgeThe coherent optical edge
The coherent optical edgeADVA
 
Get your timing right for 5G OpenRAN!
Get your timing right for 5G OpenRAN!Get your timing right for 5G OpenRAN!
Get your timing right for 5G OpenRAN!ADVA
 
Introducing the market's first high-performance optical cesium clock
Introducing the market's first high-performance optical cesium clockIntroducing the market's first high-performance optical cesium clock
Introducing the market's first high-performance optical cesium clockADVA
 
Best practices in synchronizing IP-based packet broadcast networks
Best practices in synchronizing IP-based packet broadcast networksBest practices in synchronizing IP-based packet broadcast networks
Best practices in synchronizing IP-based packet broadcast networksADVA
 
Achieving resilient and assured PNT in secure information networks
Achieving resilient and assured PNT in secure information networksAchieving resilient and assured PNT in secure information networks
Achieving resilient and assured PNT in secure information networksADVA
 

More from ADVA (20)

Industrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clockIndustrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clock
 
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
 
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350  SePRC™ optical cesium clockIndustry's longest holdover with the OSA 3350  SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
 
Precise and assured timing for enterprise networks
Precise and assured timing for enterprise networksPrecise and assured timing for enterprise networks
Precise and assured timing for enterprise networks
 
Introducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demandIntroducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demand
 
Meet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networkingMeet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networking
 
Quantum threat: How to protect your optical network
Quantum threat: How to protect your optical networkQuantum threat: How to protect your optical network
Quantum threat: How to protect your optical network
 
Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...
 
Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)
 
Open optical edge connecting mobile access networks
Open optical edge connecting mobile access networksOpen optical edge connecting mobile access networks
Open optical edge connecting mobile access networks
 
Meet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation deviceMeet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation device
 
Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™
 
10G edge technology for outdoor environments
10G edge technology for outdoor environments10G edge technology for outdoor environments
10G edge technology for outdoor environments
 
The quantum age - secure transport networks
The quantum age - secure transport networksThe quantum age - secure transport networks
The quantum age - secure transport networks
 
From leased lines to optical spectrum services
From leased lines to optical spectrum servicesFrom leased lines to optical spectrum services
From leased lines to optical spectrum services
 
The coherent optical edge
The coherent optical edgeThe coherent optical edge
The coherent optical edge
 
Get your timing right for 5G OpenRAN!
Get your timing right for 5G OpenRAN!Get your timing right for 5G OpenRAN!
Get your timing right for 5G OpenRAN!
 
Introducing the market's first high-performance optical cesium clock
Introducing the market's first high-performance optical cesium clockIntroducing the market's first high-performance optical cesium clock
Introducing the market's first high-performance optical cesium clock
 
Best practices in synchronizing IP-based packet broadcast networks
Best practices in synchronizing IP-based packet broadcast networksBest practices in synchronizing IP-based packet broadcast networks
Best practices in synchronizing IP-based packet broadcast networks
 
Achieving resilient and assured PNT in secure information networks
Achieving resilient and assured PNT in secure information networksAchieving resilient and assured PNT in secure information networks
Achieving resilient and assured PNT in secure information networks
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform EngineeringJemma Hussein Allen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...Sri Ambati
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»QADay
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 

Introducing Adva Network Security – a trusted German anchor

  • 1. Introducing Adva Network Security – a trusted German anchor September 2022 Security expertise and transparent operations
  • 2. © 2022 ADVA. All rights reserved. 2 Increasing threat level • Increasing complexity with IoT and enterprise 5G • Higher impact as critical operations dependent on IT • More sensitive data outside security perimeter • No script kiddies but highly paid, highly skilled attackers • Market for malware, exploit kits, attack services, zero-days • Long-lasting, multi-staged attack scenarios Expanding attack surface Growing sophistication • Huge business opportunities for cybercriminals • Nation-state actors and geopolitical turmoil • Low risk of criminal prosecution and punishment More aggression Need for highly secure network devices from security-qualified suppliers
  • 3. © 2022 ADVA. All rights reserved. 3 Bottom-up network security Combined optical (L1) – Ethernet (L2) – IP (L3) encryption closes any security gap Protects all traffic between end points of optical connection, but not the final hops Optical Layer 1 encryption Site-to-site protection, needs to be at every site and does not protect final hop Ethernet Layer 2 encryption Mainly protects end connection or application-to-application, however, needs to be available at every end point IP Layer 3 protection
  • 4. © 2022 ADVA. All rights reserved. 4 Our three pillars of network security • Protecting optical, Ethernet and IP transport solutions • Development, certification and integration of essential security components • Re-use of security modules for speed, efficiency and effectiveness Security sub-systems and security modules Optical transport Packet network Appliance hosting Hardened security components • Security expertise pooled/sheltered in Germany • Driving security lifecycle process across R&D and services organization • Pragmatic processes and clear responsibility Ring-fenced security team as strong trust anchor German trust hub • Leveraging independent security competences • Close interaction with BSI, vendor and product approvals, certifications • Trust by transparency Approval/certifications from government security bodies Gov. security body, e.g., BSI Adva Network Security
  • 5. © 2022 ADVA. All rights reserved. 5 Track record with protective network controls 2010: First 10G optical encryption using AES-256 2014: Market-first 100G optical encryption 2016: First QKD demo in live network 2021: First post-quantum safe optical transport 2022: Founded Adva Network Security 2021: First crypto-agile end-to-end Ethernet encryption 2018: Introducing standard-compliant key exchange interface Secure DCI solution with finance The making of Adva Network Security Encryption protects optical infrastructure Ethernet encryption with finance Secure governmental networks 2017: BSI-approved VS-NfD 100G encryption
  • 6. © 2022 ADVA. All rights reserved. 6 Market-leading supplier of optical and packet transport solutions ADVA and Adva Network Security • Open optical transport • Ethernet and IP networking • Synchronization and timing • Network management Security advisors Secure design Certification, approval Technology, products Security competence • Secure transport • Packet and optical • VS-NfD approved and FIPS certified • Professional security support Connectivity networks for sensitive information
  • 7. © 2022 ADVA. All rights reserved. 7 Security offering: expertise, products, services • Security-hardened optical transport • Ethernet demarcation devices for secure end-to-end connections • Standardized key exchange interfaces • BSI-approval VS-NfD, FIPS certifications • Approved supplier Products • Professional services: design, build and operate secure connectivity networks • Product security incident management • Joint research and innovation projects, such as QKD, post-quantum security Support FSP 3000 – BSI-approved optical transport FSP 150 – packet edge for secure end-to-end connectivity Secure connectivity VS-NfD Plan – build – operate
  • 8. © 2022 ADVA. All rights reserved. 8 Adva Network Security Security solutions made in Germany Robust critical infrastructure, protected businesses and secure governments “We’re bringing many years of experience in cryptography to this new German company. With it, we’re making optical transmission and data networks quantum safe.” “We founded Adva Network Security to help enterprises, government agencies and critical infrastructure respond appropriately to the intensifying threat landscape.“ Michael Roth, general manager Josef Sißmeir, general manager
  • 9. Thank you IMPORTANT NOTICE ADVA is the exclusive owner or licensee of the content, material, and information in this presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited. The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or implied. ADVA shall not be responsible for and disclaims any liability for any loss or damages, including without limitation, direct, indirect, incidental, consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation. Copyright © for the entire content of this presentation: ADVA. www.advasecurity.com | info@advasecurity.com