Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling transport protocols from what's below, by Catherine Pearce.
A presentation given at APRICOT 2016’s APOPS Plenary 1 session on 22 February 2016.
The document discusses measuring the performance and reliability of IPv6 connections compared to IPv4. It analyzes data from 2011 and 2015-2016 on connection failure rates and round-trip times. In 2011, IPv6 connections using 6to4 and Teredo tunnels had high failure rates of 10-20% and 5.3% respectively, while unicast was lower at 5.3%. By 2015, 6to4 failure dropped to 9% while unicast was between 1.5-4%. Round-trip time analyses found 13% of unicast IPv6 connections were over 10ms faster than IPv4 in 2015-2016, while 32% were over 10ms slower. The document provides online maps showing average connection reliability and
The document discusses RPKI (Resource Public Key Infrastructure) deployment factors in Japan. It notes that RPKI deployment has been slower in Asia including Japan compared to Europe. It outlines some of the challenges including that router implementations are still being enhanced and operational practices need to mature. It also notes that JPNIC and JPNAP have recently launched public RPKI ROA caches to help accelerate deployment in Japan. The document closes by outlining some issues seen with RPKI validation and provides a proposed step-by-step approach to RPKI deployment.
APNIC Senior Trainer Tashi Phuntsho gives an update on IPv6 deployment in Bhutan and the region, noting that the true driver for IPv6 adoption is the mobile Internet.
This document discusses the need for IPv6 adoption in the Pacific region. It notes that while IPv4 addresses are still available in some Pacific nations, drivers like access to online content and services are increasing the need for IPv6. The status of IPv6 deployment is reviewed for several Pacific countries, showing most have very low IPv6 capability currently but high potential addresses per person with IPv6. Training opportunities are highlighted to help build capacity for IPv6 in the region.
This document discusses the linkages between governmental policy and IPv6 adoption. It begins with background on IPv4 address exhaustion and the need to adopt IPv6. It then examines IPv6 readiness around the world and provides examples from various countries and economies. Recommendations are made to SATRC to encourage a multi-stakeholder approach, establish IPv6 guidelines, conduct industry readiness research, and develop policies and human capacity. APNIC can contribute training, monitoring, and outreach efforts to support the transition.
Presentation given by Srinivas (Sunny) Chendi, APNIC's Senior Internet Development Advisor, at the 3rd Open Policy meeting held by the Indian Registry for Internet Names and Numbers (IRINN) 24 November 2015
The document discusses measuring the performance and reliability of IPv6 connections compared to IPv4. It analyzes data from 2011 and 2015-2016 on connection failure rates and round-trip times. In 2011, IPv6 connections using 6to4 and Teredo tunnels had high failure rates of 10-20% and 5.3% respectively, while unicast was lower at 5.3%. By 2015, 6to4 failure dropped to 9% while unicast was between 1.5-4%. Round-trip time analyses found 13% of unicast IPv6 connections were over 10ms faster than IPv4 in 2015-2016, while 32% were over 10ms slower. The document provides online maps showing average connection reliability and
The document discusses RPKI (Resource Public Key Infrastructure) deployment factors in Japan. It notes that RPKI deployment has been slower in Asia including Japan compared to Europe. It outlines some of the challenges including that router implementations are still being enhanced and operational practices need to mature. It also notes that JPNIC and JPNAP have recently launched public RPKI ROA caches to help accelerate deployment in Japan. The document closes by outlining some issues seen with RPKI validation and provides a proposed step-by-step approach to RPKI deployment.
APNIC Senior Trainer Tashi Phuntsho gives an update on IPv6 deployment in Bhutan and the region, noting that the true driver for IPv6 adoption is the mobile Internet.
This document discusses the need for IPv6 adoption in the Pacific region. It notes that while IPv4 addresses are still available in some Pacific nations, drivers like access to online content and services are increasing the need for IPv6. The status of IPv6 deployment is reviewed for several Pacific countries, showing most have very low IPv6 capability currently but high potential addresses per person with IPv6. Training opportunities are highlighted to help build capacity for IPv6 in the region.
This document discusses the linkages between governmental policy and IPv6 adoption. It begins with background on IPv4 address exhaustion and the need to adopt IPv6. It then examines IPv6 readiness around the world and provides examples from various countries and economies. Recommendations are made to SATRC to encourage a multi-stakeholder approach, establish IPv6 guidelines, conduct industry readiness research, and develop policies and human capacity. APNIC can contribute training, monitoring, and outreach efforts to support the transition.
Presentation given by Srinivas (Sunny) Chendi, APNIC's Senior Internet Development Advisor, at the 3rd Open Policy meeting held by the Indian Registry for Internet Names and Numbers (IRINN) 24 November 2015
Vivek Nigam and Pubudu Jayasinghe discuss the Internet in Myanmar, IPv4 depletion and how Members can manage that, deploying IPv6, and routing security.
Deputy Director General, Sanjaya, outlines Internet infrastructure in Taiwan, demonstrating how the BGP routing table can be used as a data source to visualise Internet infrastructure in an economy by mapping transit paths of Autonomous System Numbers delegated to that economy.
George Michaelson's presentation on End User DNS Measurement at APNIC @ ‘Technical: Measure Like We, Measure with Us: Ensuring the Quality of DNS Measuring'
Comcast began deploying IPv6 in 2005 to support future growth as IPv4 addresses were becoming inadequate. They have since made IPv6 the primary protocol for managing their network and services. Over 99% of their devices are now managed using IPv6-only, and around 40% of their internet traffic occurs over IPv6. Their goal is to continue transitioning their entire infrastructure and services to IPv6-only to fully leverage its capabilities.
This document analyzes IPv6 adoption trends in Asia, finding that while some economies like Japan, Australia, Malaysia, and Singapore show significant IPv6 capability, many others in the region are stagnant or show slow growth. It examines IPv6 deployment by major ISPs in economies with high IPv6 rates, like SK Telecom in Korea, and compares IPv6 capability between Asia, Europe, and North America. The analysis suggests the Internet may diverge between those investing in IPv6 and those relying primarily on IPv4.
This document discusses the global deployment of IPv6 and the risks of a "digital divide" if not adopted widely. It outlines two mobile revolutions with the explosion of mobile voice in the 1990s and mobile broadband in the 2010s. While 3G began providing limited Internet to mobile devices, 4G/LTE now enables full, high-speed access over an IP-based infrastructure. However, IPv4 addresses are dwindling and carrier-grade NAT poses challenges like reduced address space and functionality. The document argues that IPv6 must be fully adopted to support continued growth of Internet-connected devices on a global scale without technical limitations or digital inequities between early and late IPv6 adopters.
Community Engagement Specialist, Sunny Chendi, provides an update of APNIC's service initiatives and activities at the second Nepal Network Operators Group meeting in Kathmandu.
Internet infrastructure in the South East Asia regionAPNIC
The document provides an overview of Internet infrastructure in Southeast Asia, focusing on Laos. It discusses key concepts like autonomous systems (ASNs) and routing. Visualizations show the interconnection of networks globally and in Southeast Asia. Laos currently has predominantly internet service providers and government networks, but more non-ISP networks are expected to deploy ASNs as the country develops similarly to its neighbors. Looking ahead, trends include more local interconnection to improve performance and reduce costs, as well as growth in local content and initiatives driving more networks across academia, businesses and other sectors.
A review of current worldwide IPv6 deployment - SANOG EditionAPNIC
This document provides an overview of global IPv6 deployment as of 2016, with a focus on the Asia Pacific region and SANOG economies. It finds that while global IPv6 capability is around 6.5%, some countries have much higher rates, like Belgium at 53%. In Asia Pacific, Japan, Australia, Malaysia, and Singapore show leading deployment. However, few economies in the region are above the global average. The document also analyzes IPv6 deployment data for ISPs and economies in the US, Belgium, Germany, Brazil, Ecuador, and Afghanistan and Bangladesh to understand trends. It concludes that IPv6 and IPv4 networks may increasingly diverge, with some networks investing in IPv6 and others relying more on IPv4 transition technologies
Presented by Elly Tawhai, APNIC Senior Hostmaster, at the 2017 New Zealand Network Operators Group (NZNOG) meeting was held in Tauranga, New Zealand from 26 to 27 January.
IPv6 adoption is increasing due to the depletion of available IPv4 addresses. The document discusses IPv6 allocation timelines, the need to reach more internet users, and transition techniques from IPv4 to IPv6 like dual stacking and tunneling. It provides guidance on obtaining IPv6 allocations and assignments, addressing and routing, and a phased approach to deployment within an organization.
Global IPv6 Summit Presentation - Global Deployment or Digital DivideAPNIC
This document summarizes IPv6 deployment efforts globally and in specific regions and countries. It discusses the growing need for IPv6 due to the depletion of IPv4 address space. Several case studies are presented on IPv6 deployment by mobile carriers like T-Mobile USA. Taiwan's government efforts to promote IPv6 are also summarized, as well as the work done by TWNIC and APNIC to measure IPv6 readiness and encourage adoption.
F5 has added new solutions that combine its BIG-IP Application Security Manager with Oracle Database Firewall to provide stronger protection against SQL injection attacks. The integrated solution monitors and blocks traffic at the web and database layers, tracking application sessions from client to database. When anomalies are detected by the Application Security Manager, they are logged by both the Application Security Manager and Oracle Database Firewall, providing complete visibility of attacks from source to SQL transaction. This ensures administrators have consistent, correlated application monitoring data and web tier attacks are blocked while undetected attacks reaching the database are blocked by the Database Firewall.
This document discusses virtualization, cloud computing, and SDN technologies. It covers some of the key challenges in application provisioning across network layers that can lead to long deployment times. The document presents solutions from F5 that aim to simplify and accelerate application deployments through a high-performance services fabric and integration with technologies like Cisco ACI and VMware NSX to enable automated, policy-based provisioning of load balancing and other application services.
Vivek Nigam and Pubudu Jayasinghe discuss the Internet in Myanmar, IPv4 depletion and how Members can manage that, deploying IPv6, and routing security.
Deputy Director General, Sanjaya, outlines Internet infrastructure in Taiwan, demonstrating how the BGP routing table can be used as a data source to visualise Internet infrastructure in an economy by mapping transit paths of Autonomous System Numbers delegated to that economy.
George Michaelson's presentation on End User DNS Measurement at APNIC @ ‘Technical: Measure Like We, Measure with Us: Ensuring the Quality of DNS Measuring'
Comcast began deploying IPv6 in 2005 to support future growth as IPv4 addresses were becoming inadequate. They have since made IPv6 the primary protocol for managing their network and services. Over 99% of their devices are now managed using IPv6-only, and around 40% of their internet traffic occurs over IPv6. Their goal is to continue transitioning their entire infrastructure and services to IPv6-only to fully leverage its capabilities.
This document analyzes IPv6 adoption trends in Asia, finding that while some economies like Japan, Australia, Malaysia, and Singapore show significant IPv6 capability, many others in the region are stagnant or show slow growth. It examines IPv6 deployment by major ISPs in economies with high IPv6 rates, like SK Telecom in Korea, and compares IPv6 capability between Asia, Europe, and North America. The analysis suggests the Internet may diverge between those investing in IPv6 and those relying primarily on IPv4.
This document discusses the global deployment of IPv6 and the risks of a "digital divide" if not adopted widely. It outlines two mobile revolutions with the explosion of mobile voice in the 1990s and mobile broadband in the 2010s. While 3G began providing limited Internet to mobile devices, 4G/LTE now enables full, high-speed access over an IP-based infrastructure. However, IPv4 addresses are dwindling and carrier-grade NAT poses challenges like reduced address space and functionality. The document argues that IPv6 must be fully adopted to support continued growth of Internet-connected devices on a global scale without technical limitations or digital inequities between early and late IPv6 adopters.
Community Engagement Specialist, Sunny Chendi, provides an update of APNIC's service initiatives and activities at the second Nepal Network Operators Group meeting in Kathmandu.
Internet infrastructure in the South East Asia regionAPNIC
The document provides an overview of Internet infrastructure in Southeast Asia, focusing on Laos. It discusses key concepts like autonomous systems (ASNs) and routing. Visualizations show the interconnection of networks globally and in Southeast Asia. Laos currently has predominantly internet service providers and government networks, but more non-ISP networks are expected to deploy ASNs as the country develops similarly to its neighbors. Looking ahead, trends include more local interconnection to improve performance and reduce costs, as well as growth in local content and initiatives driving more networks across academia, businesses and other sectors.
A review of current worldwide IPv6 deployment - SANOG EditionAPNIC
This document provides an overview of global IPv6 deployment as of 2016, with a focus on the Asia Pacific region and SANOG economies. It finds that while global IPv6 capability is around 6.5%, some countries have much higher rates, like Belgium at 53%. In Asia Pacific, Japan, Australia, Malaysia, and Singapore show leading deployment. However, few economies in the region are above the global average. The document also analyzes IPv6 deployment data for ISPs and economies in the US, Belgium, Germany, Brazil, Ecuador, and Afghanistan and Bangladesh to understand trends. It concludes that IPv6 and IPv4 networks may increasingly diverge, with some networks investing in IPv6 and others relying more on IPv4 transition technologies
Presented by Elly Tawhai, APNIC Senior Hostmaster, at the 2017 New Zealand Network Operators Group (NZNOG) meeting was held in Tauranga, New Zealand from 26 to 27 January.
IPv6 adoption is increasing due to the depletion of available IPv4 addresses. The document discusses IPv6 allocation timelines, the need to reach more internet users, and transition techniques from IPv4 to IPv6 like dual stacking and tunneling. It provides guidance on obtaining IPv6 allocations and assignments, addressing and routing, and a phased approach to deployment within an organization.
Global IPv6 Summit Presentation - Global Deployment or Digital DivideAPNIC
This document summarizes IPv6 deployment efforts globally and in specific regions and countries. It discusses the growing need for IPv6 due to the depletion of IPv4 address space. Several case studies are presented on IPv6 deployment by mobile carriers like T-Mobile USA. Taiwan's government efforts to promote IPv6 are also summarized, as well as the work done by TWNIC and APNIC to measure IPv6 readiness and encourage adoption.
F5 has added new solutions that combine its BIG-IP Application Security Manager with Oracle Database Firewall to provide stronger protection against SQL injection attacks. The integrated solution monitors and blocks traffic at the web and database layers, tracking application sessions from client to database. When anomalies are detected by the Application Security Manager, they are logged by both the Application Security Manager and Oracle Database Firewall, providing complete visibility of attacks from source to SQL transaction. This ensures administrators have consistent, correlated application monitoring data and web tier attacks are blocked while undetected attacks reaching the database are blocked by the Database Firewall.
This document discusses virtualization, cloud computing, and SDN technologies. It covers some of the key challenges in application provisioning across network layers that can lead to long deployment times. The document presents solutions from F5 that aim to simplify and accelerate application deployments through a high-performance services fabric and integration with technologies like Cisco ACI and VMware NSX to enable automated, policy-based provisioning of load balancing and other application services.
The document summarizes an IT architect conference presentation on architecting enterprise security for service-oriented architectures (SOA). The presentation discusses key enterprise security concerns like governance, infrastructure, applications and how SOA brings changes that impact security. It provides examples of security architecture policies and how to implement aspects of security like threat protection, transport layer security, service virtualization, externalizing and centralizing security management, authenticating and authorizing all messages.
В связи с завершением разработки Microsoft Forefront Threat Management Gateway (TMG) множество организаций, использующих или планировавших использовать TMG столкнулись с дилеммой: как и, более важно, что администраторы будут использовать для защиты своих приложений Microsoft, имеющих доступ в Интернет типа Exchange, SharePoint и Lync?
F5 Networks предлагает ответ на эти вопросы. Подробности описываются в данной презентации.
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...Michael Noel
One of the biggest advantage of using SharePoint as a Document Management and collaboration environment is that a robust security and permissions structure is built-in to the application itself. Authenticating and authorizing users is a fairly straightforward task, and administration of security permissions is simplified. Too often, however, security for SharePoint stops there, and organizations don’t pay enough attention to all of the other considerations that are part of a SharePoint Security stack, and more often than not don’t properly build them into a deployment. This includes such diverse categories including Edge, Transport, Infrastructure, Data, and Rights Management Security, all areas that are often neglected but are nonetheless extremely important. This session discusses the entire stack of Security within SharePoint, from best practices around managing permissions and ACLs to comply with Role Based Access Control, to techniques to secure inbound access to externally-facing SharePoint sites. The session is designed to be comprehensive, and includes all major security topics in SharePoint and a discussion of various real-world designs that are built to be secure. • Understand how to use native technologies to secure all layers of a SharePoint environment, including Data, Transport, Infrastructure, Edge, and Rights Management. • Examine tools and technologies that can help secure SharePoint, including AD Rights Management Services, Forefront Unified Access Gateway, SQL Transparent Data Encryption, and more. • Understand a Role-Based Access Control (RBAC) permissions model and how it can be used to gain better control over authorization and access control to SharePoint files and data
Legacy security systems are failing because attacks have moved "up the stack" to target applications rather than just networks. While 90% of security investment focuses on network threats, 75% of attacks now target applications. The top 10 web application vulnerabilities remain unaddressed, leaving many sites open to injection attacks, XSS, authentication issues, and more. To better protect applications, a next-generation security platform needs to be scalable, adaptable to change, understand context, involve the security community, and take a unified approach.
Многие компании сегодня вынуждены искать замену решению Microsoft Forefront Threat Management Gateway, разработка которого была прекращена. Превосходной альтернативой является решение F5 Secure Web Gateway Services, обеспечивающее контроль и безопасную работу в Интернете.
Cisco Trustsec & Security Group TaggingCisco Canada
This presentation covers the protocols and functions that create a trusted network. We will discuss the best practices when deploying this tagging ability using campus switches including migration techniques from non-SGT capable to devices to a fully SGT capable network deployment. For more information please visit our website here: http://www.cisco.com/web/CA/index.html
F5 Offers Advanced Web Security With BIG-IP v10.1DSorensenCPR
With the new v10.1 release of BIG-IP, F5 tackles existing and emerging web security threats, while optimizing web applications to enhance end-user experience. The new release enhances an IT staff’s operational efficiency, reduces security risks and associated litigation costs, while streamlining application delivery.
HK VForum F5 apps centric security nov 4, 2016 - finalJuni Yan
This document discusses the need for a new, application-centric approach to cybersecurity. It notes that traditional network perimeter-based security is inadequate and that most security breaches now involve user identities and applications. It promotes governing application access and protecting applications to secure data across cloud, on-premises and future applications. The document advocates for a flexible security architecture using F5 technologies to assess risks, control access, and protect applications based on defined conditions.
This presentation discusses using Multi-Path Transmission Control Protocols (MPTCP) as a security solution for data transfer. MPTCP allows a single TCP connection to use multiple paths between devices, increasing throughput and security. It works by encrypting data, dividing it into blocks, randomly assigning the blocks to different paths, and reassembling them at the destination. This makes sniffing or decrypting the full data more difficult as hackers would need to monitor multiple paths simultaneously. The presentation provides an overview of TCP, features of MPTCP, the MPTCP connection establishment process, and proposes an algorithm for securely transferring data using path mixing and encryption.
The VIPRION® 2400 is a midrange chassis-based hardware platform. Adding to the successful F5® VIPRION product line, the new Application Delivery Controller (ADC) provides significant price/performance advantages for enterprises. In addition, F5's Virtual Clustered Multiprocessing (vCMP™) technology combines virtualization and multi-tenancy capabilities to help customers consolidate and efficiently manage application delivery services. Building on F5’s previously announced Clustered Multiprocessing (CMP™) technology, vCMP enables multiple instances of BIG-IP® software to run on one device.
This document summarizes the transport layer and its key protocols TCP and UDP. It describes the transport layer's role in establishing communication sessions and delivering data between applications. TCP provides reliable, ordered delivery using acknowledgments, while UDP is unreliable but lower overhead. The document explains how ports distinguish communications and lists applications commonly using each protocol.
How to deliver industry standard browser security to the native Domino HTTP stack, using company-wide wildcard certificates deployed across all platforms.
This document discusses using Multipath TCP (MPTCP) to utilize multiple network paths simultaneously for increased bandwidth and reliability. It proposes using shadowsocks and redsocks to enable MPTCP for end users. Shadowsocks would encrypt traffic and redsocks would redirect connections through multiple paths, including the user's ADSL and fiber connections, via a gateway box running Ubuntu with MPTCP and Webmin for configuration. The gateway would split traffic across up to 6 possible paths to the destination server.
The F5 DDoS Protection Reference Architecture (Technical White Paper)F5 Networks
This white paper proposes a multi-tier architecture for protecting against distributed denial of service (DDoS) attacks. It recommends using a cloud-based DDoS protection service to mitigate volumetric attacks, while using on-premises network and application defense tiers to handle asymmetric and computational attacks. The network defense tier uses firewalls and load balancers to protect network layers, while the application defense tier uses web application firewalls and ADCs to inspect application traffic in depth. This hybrid cloud/on-premises architecture is designed to defend against all categories of DDoS attacks.
This document summarizes the transport layer and the key protocols TCP and UDP. It explains that the transport layer establishes communication sessions between applications, segments data for transmission, and ensures proper delivery. TCP provides reliable, ordered delivery using acknowledgements, while UDP is simpler but unreliable. Popular applications of each are discussed, showing how TCP and UDP address different network requirements.
Transport Layer Security (TLS) is a protocol that ensures privacy between communicating applications and their users on the Internet. When a server and client communicate, TLS ensures that no third party may eavesdrop or tamper with any message. TLS is the successor to the Secure Sockets Layer (SSL).
The document announces an upcoming webinar from Cisco on reducing security risks to protect networks. It provides details on the webinar such as the date, time, and how to ask questions. The webinar will discuss assessing and evolving security strategies, maintaining security postures, and security services to prepare networks. It also lists upcoming webinar sessions on related topics and provides contact information for Cisco services.
The document advertises an upcoming webinar from Cisco on reducing security risks to protect networks. It provides details on the webinar such as the date, presenter, and topics to be discussed including assessing security strategies, maintaining postures, and security services. Information is also provided on Cisco's security services and upcoming webinar sessions.
NOS Webinar: Reduce Security Risks to Protect Your Network FinalB2BContact
This document outlines a webinar from Cisco on reducing security risks to protect networks. The webinar will discuss assessing and evolving security strategies, maintaining security postures, and security services to prepare networks. It promotes following the vulnerability lifecycle of identifying, prioritizing, remediating, and validating the removal of risks. The webinar will also cover Cisco's security services to help secure networks.
Security and Virtualization in the Data CenterCisco Canada
The evolving complexity of the data center is placing increased demand on the network and security teams to come up with inventive methods for enforcing security policies in these ever-changing environments. The goal of this session is to provide participants with an understanding of features and design recommendations for integrating security into the data center environment. This session will focus on recommendations for securing next-generation data center architectures. Areas of focus include security services integration, leveraging device virtualization, and considerations and recommendations for server virtualization. The target audience are security and data center administrators.
Nos webinar architecture strategy and planning what's your game plan fina lv3B2BContact
The document summarizes a Cisco presentation on network architecture strategy and planning. It discusses the importance of a methodical approach to avoid network entropy, streamline operations, and maximize uptime. It also addresses how establishing an architecture strategy can help organizations introduce new services and support expansion while achieving business goals like protecting data and creating an engaged workforce. Resources are provided on optimizing networks with proactive support services.
The document discusses a Cisco SmartTalk session on network architecture strategy and planning. It notes the importance of a methodical approach to avoid network entropy, streamline operations, and maximize uptime. It discusses how establishing a baseline and combating variability through change management can help achieve business goals like protecting data and improving customer experience. Resources on proactive network management and an upcoming webinar on preparing networks for innovation are provided.
NEW - Nos webinar architecture strategy and planning what's your game plan ...B2BContact
The document discusses a Cisco SmartTalk webinar on network architecture strategy and planning. It notes upcoming webinars on topics like analytics and security. The presented webinar discusses why network architecture planning is important to avoid issues like network entropy, streamline operations, and maximize uptime. It notes how variability in a network can increase risks and discusses combating variability through validation and baselines. The webinar also addresses how network planning can help achieve business goals like protecting data and making better decisions faster. Resources are provided on network optimization case studies and infographics.
Nos webinar architecture strategy and planning what's your game plan fina lv3B2BContact
The document summarizes a Cisco presentation on network architecture strategy and planning. It discusses the importance of a methodical approach to avoid network entropy, streamline operations, and maximize uptime. It also addresses how establishing an architecture strategy can help organizations introduce new services and support expansion while achieving business goals like protecting data and creating an engaged workforce. Resources are provided on optimizing networks with proactive support services.
Cisco Live LatAm - Mexico Executive Symposium on DigitizationRick Huijbregts
This document discusses the transition to the digital age and the increasing connectivity and digital transformation of various industries and markets. It notes that technological adoption and penetration of things like cellular networks, the internet, and computers occurred more rapidly than previous innovations. The document argues that we have not yet seen the full potential of digital transformation and connectivity through the internet of everything. It presents Cisco's vision and strategy to enable this digital transformation through open, programmable, and integrated infrastructure solutions that support new experiences, innovation, efficiency and intelligence across business operations and markets.
This document discusses IPv6 transition and the state of IPv6 adoption. It notes that while IPv4 address exhaustion is a real issue, users do not care and prefer NAT for security. Transition requires cooperation across users, ISPs, devices and content. Statistics show rapid growth of IPv6 adoption by major networks worldwide in the last two years. Full transition to IPv6 is needed to enable unlimited connectivity for cloud/mobile internet and the internet of things going forward.
Jeremiah O'Connor & David Maynor - Chasing the Crypto Workshop: Tracking Fina...NoNameCon
This document summarizes a presentation given by Cisco researchers on tracking a Ukrainian Bitcoin phishing ring. It discusses how the researchers used DNS data and analysis to link phishing domains to a criminal group called Coinhoarder. The researchers found the group was using lookalike domains to steal users' Bitcoin credentials from popular wallets and exchanges. They traced the domains and ransom payments and found the operation involved multiple actors conducting phishing, ransomware attacks, and money laundering.
Idc security roadshow may2015 Adrian AronDejan Jeremic
The document discusses cybersecurity threats and Cisco's approach to addressing them. It notes that hacking has become a multi-billion dollar global industry. It also discusses the growth of mobile devices, cloud apps, and the Internet of Everything. Cisco's strategies for security involve continuous advanced threat protection using a network-integrated, broad sensor base with context and automation. Cisco protects infrastructure using advanced malware protection everywhere, big data analytics, and by making infrastructure a self-defending, self-healing architecture.
Building a Streaming Microservices Architecture - Data + AI Summit EU 2020Databricks
Jules Damji and Denny Lee from Databricks Developer Relations will recap some keynote highlights, and each will briefly present personal picks from sessions that resonated well with them. Next, Jacek Laskowski, an independent consultant, will speak about Spark 3.0 internals, and Scott Haines from Twilio, Inc. will give a talk about structured streaming microservice architectures. This live coding session and technical deep dive are not to be missed!
Tomorrow Starts Here - Security Everywhere Cisco Canada
The document discusses Cisco's security solutions and services. Some key points:
- Cisco conducts a large amount of threat intelligence gathering from network traffic and other sources.
- Cisco offers a range of security products including next-generation firewalls, advanced malware protection, and threat defense.
- Cisco provides managed threat defense services where security experts monitor customer networks and respond to threats.
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocenceCisco Canada
Cisco Connect events bring together technical education, networking opportunities, and expert insight for communities worldwide. They offer insights from Cisco leadership on strategic direction and partnerships, as well as educational content on current and future technologies. Unlike other events, Cisco Connect is specifically for Cisco customers, partners, and those with Cisco certifications.
Vbrownbag container networking for real workloadsCisco DevNet
This document summarizes Matt Johnson's presentation on container networking at Cisco LIVE! 2015. The presentation discussed:
1) The default Docker networking model of using NAT which has limits like containers only having private IPs tied to the host IP.
2) Emerging solutions like Kubernetes that provide services for containers but still rely on tunnels.
3) The benefits of integrating containers as "first class citizens" on the real network using standards like BGP without NAT or tunnels so containers can have public IPs and mobility.
4) Cisco's work to implement these ideas in an open source project called the Cisco Microservices Environment based on Mesos to provide a preconfigured environment for real workloads.
Similar to Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling transport protocols from what's below (20)
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...APNIC
Chimi Dorji, Internet Resource Analyst at APNIC, presented on Registry Data Accuracy Improvements at SANOG 41 jointly held with INNOG 7 in Mumbai, India from 25 to 30 April 2024.
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
Sunny Chendi, Senior Advisor, Membership and Policy at APNIC, presents 'APNIC Policy Roundup' at the 5th ICANN APAC-TWNIC Engagement Forum and 41st TWNIC OPM in Taipei, Taiwan from 23 to 24 April.
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
Dave Phelan, Senior Network Analyst/Technical Trainer at APNIC, presents 'DDoS In Oceania and the Pacific' at NZNOG 2024 held in Nelson, New Zealand from 8 to 12 April 2024.
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
Geoff Huston, Chief Scientist at APNIC deliver keynote presentation on the 'Future Evolution of the Internet' at the Everything Open 2024 conference in Gladstone, Australia from 16 to 18 April 2024.
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
Paul Wilson, Director General of APNIC delivers a presentation on IP addressing and IPv6 to the Policymakers Program during IETF 119 in Brisbane Australia from 16 to 22 March 2024.
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
Tom Harrison, Product and Delivery Manager at APNIC presents at the Registration Protocols Extensions working group during IETF 119 in Brisbane, Australia from 16-22 March 2024
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
Che-Hoo Cheng, Senior Director, Development at APNIC presents on the "Benefits of doing Internet peering and running an Internet Exchange (IX)" at the Communications Regulatory Commission of Mongolia's IPv6, IXP, Datacenter - Policy and Regulation International Trends Forum in Ulaanbaatar, Mongolia on 7 March 2024
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
APNIC Senior Advisor, Membership and Policy, Sunny Chendi presented on APNIC updates and RIR Policies for ccTLDs at APTLD 85 in Goa, India from 19-22 February 2024.
Discover the benefits of outsourcing SEO to Indiadavidjhones387
"Discover the benefits of outsourcing SEO to India! From cost-effective services and expert professionals to round-the-clock work advantages, learn how your business can achieve digital success with Indian SEO solutions.
Gen Z and the marketplaces - let's translate their needsLaura Szabó
The product workshop focused on exploring the requirements of Generation Z in relation to marketplace dynamics. We delved into their specific needs, examined the specifics in their shopping preferences, and analyzed their preferred methods for accessing information and making purchases within a marketplace. Through the study of real-life cases , we tried to gain valuable insights into enhancing the marketplace experience for Generation Z.
The workshop was held on the DMA Conference in Vienna June 2024.
HijackLoader Evolution: Interactive Process HollowingDonato Onofri
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. HijackLoader, an increasingly popular tool among adversaries for deploying additional payloads and tooling, continues to evolve as its developers experiment and enhance its capabilities.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. The malware developer used a standard process hollowing technique coupled with an additional trigger that was activated by the parent process writing to a pipe. This new approach, called "Interactive Process Hollowing", has the potential to make defense evasion stealthier.
Ready to Unlock the Power of Blockchain!Toptal Tech
Imagine a world where data flows freely, yet remains secure. A world where trust is built into the fabric of every transaction. This is the promise of blockchain, a revolutionary technology poised to reshape our digital landscape.
Toptal Tech is at the forefront of this innovation, connecting you with the brightest minds in blockchain development. Together, we can unlock the potential of this transformative technology, building a future of transparency, security, and endless possibilities.
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling transport protocols from what's below
1. Catherine (Kate) Pearce
Sr Security Consultant, Cisco Security Services
Feb 22, 2016
Decoupling transport protocols from what's below
Multipathed, Multiplexed, Multilateral Transport Protocols