SlideShare a Scribd company logo
1 of 50
Download to read offline
Global-WAN®
Swiss Data Haven
The Neutral Global Network
Built on Post-Quantum Security
for “The Internet of Things”
global-wan.ch
This document is aimed at helping people to understand the Global-WAN technology. Further
information regarding the internals of TWD Industries AG's technology are available under a
proper NDA, to selected partners.
2 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
3 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
4 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
5 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
6 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
7 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
8 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
9 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
10 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
11 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
12 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
The Problem
“Nations have no friends,
only interests”
John Kornblum
US Ambassador in Germany (2014)
13 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
US Vendors' Dilemma
“How do you protect
what you want to exploit?”
Scott Charney,
VP Trustworthy Computing, Microsoft
14 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
US Strategists' Dilemma
“The Internet is the most transformative
innovation since Gutenberg and the printing
press, yet we're treating it as a war zone.”
Jason Healey
The Atlantic Council (US think-tank)
15 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
The Solution
“To restore trust, there's no substitute to
offering the real thing:
forever unbreakable trusted security.”
TWD Industries AG, 2007
16 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Global-WAN
Purpose & Distinctive Value
Unique, By-Design
17 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
“Securing Phone, Fax, Radio, Video Conferencing,
Web applications, unified communications, etc.
with Forever-Unbreakable Trusted Encryption”.
For * Individuals (consulting, politics, lawyers)
* Enterprises (board, partners, R&D, branch)
* Governments (Army, Police, energy grid,
embassies, trading, etc.).
18 | Copyright © 2014 TWD Industries AG. All rights reserved.
PURPOSE
Global-WAN
19 | Copyright © 2014 TWD Industries AG. All rights reserved.
EASE OF USE
20 | Copyright © 2014 TWD Industries AG. All rights reserved.
Plug & Play and:
- Compatible with all HARDWARE
- Compatible with all SOFTWARE
- Compatible with all Operating Systems
(IBM, ORACLE, Apple, Microsoft, Linux...)
Global-WAN
Global-WAN
21 | Copyright © 2014 TWD Industries AG. All rights reserved.
FOREVER SAFE
22 | Copyright © 2014 TWD Industries AG. All rights reserved.
Security designed to last:
- Proven as unbreakable forever (post-quantum)
- Hides communication endpoints (where, who)
- Hides application and user metadata
Complete security: no “what, who, when, where”.
Global-WAN
Global-WAN
Business Development
Investment Opportunities
23 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
To accelerate its Development,
TWD Industries AG invites
International Investors
24 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
“With the right acts of digital sabotage,
attack aircraft will be grounded,
infrastructure disrupted and
communications severed, reducing the
enemy to a state of raging, pre-modern
impotence.”
The Economist
25 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
26 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
“There's a market failure in cyber-security,
made worse by the trouble firms have in
getting reliable information about the
threats they face.”
The Economist, “Vulnerabilities - Zero-day
game - Wielding a controversial cyber-weapon.”
27 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
28 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
“To avoid lurid headlines about car
crashing, insulin overdoses and houses
burning, tech firms will surely have to
embrace higher [security] standards.”
The Economist
"The Internet of things (to be hacked)"
29 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
30 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
INVEST GLOBALLY
In Emerging Markets and Established Markets:
● USA (“the NSA has destroyed trust”)
● EUROPE (badly needs resilience, growth)
● AFRICA (new infrastructure, sovereignty)
● ASIA (needs to foster independence)
● LATIN-AMERICA (won't trust the USA)
31 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
INVEST IN NATIONS
Securing the CRITICAL INFRASTRUCTURE:
● Security (Army, Police, Finance, etc.)
● Assets (Water Supply, Airports, etc.)
● Energy (Pipelines, Nuclear Plants, etc.)
● Networks (Internet, GSM, 3G/4G, etc.)
● E-Admin (e-Votes, e-Medical, e-Fiscal)
32 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
INVEST IN PATENTS
Let Global-WAN
licence its
patents and
micro-chips
to secure all
these devices.
33 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
Architecture & Components
Designed From Scratch
(can't trust existing products)
34 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
SOFTWARE COMPONENTS
G-WAN: A Server That Can be Trusted
Designed To Build A Secure Platform:
● Less Code, Less Bugs, Higher Efficiency
● New Technologies (Parsing, Memory, etc.)
● No Vulnerability Found Since 2009 Launch
Needed a Safe Server to release Secure Services.
35 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
Lorenz-Waterwheel
Designed to Scale
From [1-∞] CPU Cores.
Lock-Free, Wait-Free,
Multi-Threaded and
Event-Based.
36 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
Connections
MULTICORE SCALABILITY
37 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
MULTICORE SCALABILITY
UBIQUITOUS PLATFORM
G-WAN: Lightweight (200 KB) App. Server
Designed To Run Everywhere:
● Smartphones (Low-Consumption, Low-Latency)
● Embedded (Control At The Lowest Level)
● Servers (Web, SaaS, PaaS, Clouds)
With Scripts In 17 Programming Languages:
(asm, C/C++, C#, Java, Scala, Go, Javascript, Lua, Perl...)
38 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
VERSATILE PLATFORM
G-WAN: An Universal Stack
Open to Third-Parties:
● Applications (C/C++, C#, Java, Obj-C, Perl)
● Middleware (HTTP/S, asynchronous scripts)
● Database (Key-Value, SQLite, ORACLE)
● Infrastructure (DNS, Email, Proxy, VPN, etc.)
39 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
ZERO CONFIGURATION
G-WAN: An Unobstrusive Stack
Why Configuration Files Are Bad:
● Confusing, User Errors, Buggy, Version Incompatibilities
● Mostly Redundant with existing File System Information
● Inadequate: Adaptive Options Are Much Safer / Efficient
Safer, Faster, Simpler, No User Lock-In, No Planned
Obsolescence, Able to Run on Unattended Systems.
40 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
ORACLE OPEN-WORLD
41 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
ORACLE OPEN-WORLD
42 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
Making The Impossible Become Routine
●
G-WAN Accelerating ORACLE NoSQL
●
In A Social Gaming Demo Of 100 Millions Bots
●
All Moving In Real-Time (Heading, Speed, etc.)
●
Queried by 45,000 Persons Joining The Game
●
And Achieving A Whooping 1.2 Billion of TPS
●
...On A Mere 6-Core Desktop Machine!
The Global-WAN Project
Development
Schedule
43 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
44 | Copyright © 2014 TWD Industries AG. All rights reserved.
Reaching The Harvesting Phase
3 years 2 years 5 plus years
 Integration still dominating
 Exploitation gains speed
 Consolidation of
development processes is
key
 Minimize team churn and
grow it only slowly
 Focus on integration
 Only very few clients
 Gain experience in
automation
 Build a strong team
 Integration becomes less
important
 Exploitation takes lead and
grows significantly
 Quality becomes key topic
 Long term employees
perform best
Information
Integration
Information
Exploitation
1) Ramp-up phase,
2008
2) Consolidation
phase
3) Harvesting
phase, 2014
Global-WAN
Productivity Standards
Favourably Comparing With The Next Best:
45 | Copyright © 2014 TWD Industries AG. All rights reserved.
Server Birth Files Blank Comment Code Total
Nginx 2002 256 35,131 4,308 94,369 133,808
G-WAN 2009 171 11,198 42,706 56,766 110,670
G-WAN was written in less than half the time, and offers many
more features in half the code of Nginx. Further, G-WAN's source
code has 10x more comments than Nginx's code.
Source Code
Lines
Global-WAN
Why TrustLeap?
The Need For Global-WAN
on both
Server and Client Sides
46 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
Unbreakable Security
● Future-Proof (Post-QUANTUM)
● Mathematically Proven (Can Be Trusted By All)
● Independent From Computing Power Used To Break It
● No More Need To Enlarge Encryption Keys
● No More Need To Change Encryption Algorithms
● Also Unbreakable Two & Three-Factor Authentication
● No Central Key Repository Needed (But Can Be Used)
● Mobiles / Embedded: Very Low Overhead (CPU / RAM)
47 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
The Value Of Trust
Applications
● Corporate Asset Protection (Patents, Talks, Databases)
● Public Asset Protection (e-Votes, Medical Records, Legal)
● International Negotiations (United Nations, Contracts)
● Transaction / Archiving Certifications (Indisputable)
● Defence (Impenetrable Communications, Drones, etc.)
● Chips Would Be Ideally Used (Tampering, I.P. Protection)
● Legitimacy to Impose a Licensing Monopole (Exclusivity)
48 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
Trust Starts With Identity
● Email (Data Protection, Negotiations, Board Talks)
● Routers / Firewalls (How Safe Are Barriers If Broken?)
● Transactions (Trading, Contracts, Non-Repudiation)
● Storage (Confidentiality, Tamper-Proof, Full-Control)
● Defence (Remote Presence / Control, Chain Of Orders)
● I.P. Rights (What Worth Is A Proof That Can Be Spoofed?)
● Legal (Customers / Lawyers / Regulators Security Chain)
49 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
TrustLeap
Worldwide Corporate HQ
TrustLeap
Paradiesli 17
CH-8842 Unteriberg SZ
Switzerland
Phone +41 (0)55 414 20 93
Fax +41 (0)55 414 20 67
Email contact@trustleap.com
www.trustleap.com
About TrustLeap
TrustLeap, the security division of TWD Industries AG, protects digital assets with cryptanalytically unbreakable technology
(safe against unlimited computing power as it is proven mathematically that no key leaks can be exploited). The TrustLeap
secure platform leverages offers of enterprise, cloud, networking, digital media and financial services in global strategic markets.
TrustLeap lets partners and users form dynamic ecosystems where duly accredited strangers can safely trust each-other.
Establishing widespread trust enables organizations to secure their infrastructure, raise the value of their offers and safely
market their digital assets.
TrustLeap
50 | Copyright © 2014 TWD Industries AG. All rights reserved.

More Related Content

What's hot

Vulnerabilities of machine learning infrastructure
Vulnerabilities of machine learning infrastructureVulnerabilities of machine learning infrastructure
Vulnerabilities of machine learning infrastructureSergey Gordeychik
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deckRichard Blech
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesCharalampos Doukas
 
Conclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleConclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleGuardicore
 
SafeNet overview 2014
SafeNet overview 2014SafeNet overview 2014
SafeNet overview 2014Sectricity
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewIEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewPeter Waher
 
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)Lancope, Inc.
 
Stories from the Trainyard!
Stories from the Trainyard!Stories from the Trainyard!
Stories from the Trainyard!Patrick Kelley
 
Netguard product brochure
Netguard product brochureNetguard product brochure
Netguard product brochurecmnewman78
 
Exfiltrating Data through IoT
Exfiltrating Data through IoTExfiltrating Data through IoT
Exfiltrating Data through IoTPriyanka Aash
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9Arvind Tiwary
 
Best Practices of IoT Security in the Cloud
Best Practices of IoT Security in the CloudBest Practices of IoT Security in the Cloud
Best Practices of IoT Security in the CloudAmazon Web Services
 
A 2018 practical guide to hacking RFID/NFC
A 2018 practical guide to hacking RFID/NFCA 2018 practical guide to hacking RFID/NFC
A 2018 practical guide to hacking RFID/NFCSlawomir Jasek
 
Fal conunite2019 complete_zero_trust_final
Fal conunite2019 complete_zero_trust_finalFal conunite2019 complete_zero_trust_final
Fal conunite2019 complete_zero_trust_finalBryan Fite
 
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Positive Hack Days
 
SecurEntry by PrehKeyTec
SecurEntry by PrehKeyTecSecurEntry by PrehKeyTec
SecurEntry by PrehKeyTeccshergi
 
IoT End-to-End Security Overview
IoT End-to-End Security OverviewIoT End-to-End Security Overview
IoT End-to-End Security OverviewAmazon Web Services
 

What's hot (20)

Making Network Security Relevant
Making Network Security RelevantMaking Network Security Relevant
Making Network Security Relevant
 
Vulnerabilities of machine learning infrastructure
Vulnerabilities of machine learning infrastructureVulnerabilities of machine learning infrastructure
Vulnerabilities of machine learning infrastructure
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deck
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health Devices
 
Conclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleConclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at Scale
 
SafeNet overview 2014
SafeNet overview 2014SafeNet overview 2014
SafeNet overview 2014
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewIEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
 
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
 
Stories from the Trainyard!
Stories from the Trainyard!Stories from the Trainyard!
Stories from the Trainyard!
 
Netguard product brochure
Netguard product brochureNetguard product brochure
Netguard product brochure
 
Exfiltrating Data through IoT
Exfiltrating Data through IoTExfiltrating Data through IoT
Exfiltrating Data through IoT
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
 
Best Practices of IoT Security in the Cloud
Best Practices of IoT Security in the CloudBest Practices of IoT Security in the Cloud
Best Practices of IoT Security in the Cloud
 
CDE Marketplace: SQR Systems
CDE Marketplace: SQR SystemsCDE Marketplace: SQR Systems
CDE Marketplace: SQR Systems
 
A 2018 practical guide to hacking RFID/NFC
A 2018 practical guide to hacking RFID/NFCA 2018 practical guide to hacking RFID/NFC
A 2018 practical guide to hacking RFID/NFC
 
Fal conunite2019 complete_zero_trust_final
Fal conunite2019 complete_zero_trust_finalFal conunite2019 complete_zero_trust_final
Fal conunite2019 complete_zero_trust_final
 
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
 
SecurEntry by PrehKeyTec
SecurEntry by PrehKeyTecSecurEntry by PrehKeyTec
SecurEntry by PrehKeyTec
 
IoT End-to-End Security Overview
IoT End-to-End Security OverviewIoT End-to-End Security Overview
IoT End-to-End Security Overview
 

Viewers also liked

Large-scale real-time analytics for everyone
Large-scale real-time analytics for everyoneLarge-scale real-time analytics for everyone
Large-scale real-time analytics for everyonePavel Kalaidin
 
The Allen AI Science Challenge
The Allen AI Science ChallengeThe Allen AI Science Challenge
The Allen AI Science ChallengePavel Kalaidin
 
Обработка данных в RTB: быстро, дешево и на 98% точно
Обработка данных в RTB:  быстро, дешево и на 98% точноОбработка данных в RTB:  быстро, дешево и на 98% точно
Обработка данных в RTB: быстро, дешево и на 98% точноPavel Kalaidin
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayCisco Canada
 
Internet
InternetInternet
Internetbbilja
 
Prezentacija o internetu
Prezentacija o internetuPrezentacija o internetu
Prezentacija o internetuOS Cegar Nis
 

Viewers also liked (12)

Global wan prez-ru.mini
Global wan prez-ru.miniGlobal wan prez-ru.mini
Global wan prez-ru.mini
 
Large-scale real-time analytics for everyone
Large-scale real-time analytics for everyoneLarge-scale real-time analytics for everyone
Large-scale real-time analytics for everyone
 
The Allen AI Science Challenge
The Allen AI Science ChallengeThe Allen AI Science Challenge
The Allen AI Science Challenge
 
Data Mining in RTB
Data Mining in RTBData Mining in RTB
Data Mining in RTB
 
Обработка данных в RTB: быстро, дешево и на 98% точно
Обработка данных в RTB:  быстро, дешево и на 98% точноОбработка данных в RTB:  быстро, дешево и на 98% точно
Обработка данных в RTB: быстро, дешево и на 98% точно
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus Day
 
Racunarske mreze
Racunarske mrezeRacunarske mreze
Racunarske mreze
 
Internet
InternetInternet
Internet
 
2 racunarske mreze
2 racunarske mreze2 racunarske mreze
2 racunarske mreze
 
Prezentacija o internetu
Prezentacija o internetuPrezentacija o internetu
Prezentacija o internetu
 
Računarske mreže
Računarske mrežeRačunarske mreže
Računarske mreže
 
Ppt on internet
Ppt on internetPpt on internet
Ppt on internet
 

Similar to Global-WAN - The Swiss Neutral Data Haven

Lieven Vermaele - SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...
Lieven Vermaele -  SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...Lieven Vermaele -  SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...
Lieven Vermaele - SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...Burton Lee
 
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)IoT613
 
Firewall Webinar
Firewall WebinarFirewall Webinar
Firewall WebinarAT&T
 
WM press release VIP Tower - 122017
WM press release VIP Tower - 122017WM press release VIP Tower - 122017
WM press release VIP Tower - 122017Joel Gil
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?360mnbsu
 
The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)Gerardo Pardo-Castellote
 
Eseminar – Internet delle Cose
Eseminar – Internet delle CoseEseminar – Internet delle Cose
Eseminar – Internet delle CoseInSide Training
 
Developer Day 2014 - 4 - wind river - iot business and technology trends
Developer Day 2014 - 4 - wind river - iot business and technology trendsDeveloper Day 2014 - 4 - wind river - iot business and technology trends
Developer Day 2014 - 4 - wind river - iot business and technology trendsThibault Cantegrel
 
Open Source for Industry 4.0 – Open IoT Summit NA 2018
Open Source for Industry 4.0 – Open IoT Summit NA 2018Open Source for Industry 4.0 – Open IoT Summit NA 2018
Open Source for Industry 4.0 – Open IoT Summit NA 2018Benjamin Cabé
 
Project Grace - Towards a Secure Internet
Project Grace - Towards a Secure InternetProject Grace - Towards a Secure Internet
Project Grace - Towards a Secure Internetinside-BigData.com
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
NUB3D - Company Presentation
NUB3D - Company PresentationNUB3D - Company Presentation
NUB3D - Company PresentationNUB3D
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalA. Phillip Smith
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Digital Bond
 
Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)
Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)
Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)Real-Time Innovations (RTI)
 
Security in Optical Networks - Useless or Necessary?
Security in Optical Networks - Useless or Necessary?Security in Optical Networks - Useless or Necessary?
Security in Optical Networks - Useless or Necessary?ADVA
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Rafael Maranon
 
Transforming enterprise and industry with 5G private networks
Transforming enterprise and industry with 5G private networksTransforming enterprise and industry with 5G private networks
Transforming enterprise and industry with 5G private networksQualcomm Research
 
Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Securityteam-WIBU
 

Similar to Global-WAN - The Swiss Neutral Data Haven (20)

Lieven Vermaele - SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...
Lieven Vermaele -  SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...Lieven Vermaele -  SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...
Lieven Vermaele - SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...
 
Waterfall Wonderware Joint Offering
Waterfall Wonderware Joint OfferingWaterfall Wonderware Joint Offering
Waterfall Wonderware Joint Offering
 
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
 
Firewall Webinar
Firewall WebinarFirewall Webinar
Firewall Webinar
 
WM press release VIP Tower - 122017
WM press release VIP Tower - 122017WM press release VIP Tower - 122017
WM press release VIP Tower - 122017
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
 
The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)
 
Eseminar – Internet delle Cose
Eseminar – Internet delle CoseEseminar – Internet delle Cose
Eseminar – Internet delle Cose
 
Developer Day 2014 - 4 - wind river - iot business and technology trends
Developer Day 2014 - 4 - wind river - iot business and technology trendsDeveloper Day 2014 - 4 - wind river - iot business and technology trends
Developer Day 2014 - 4 - wind river - iot business and technology trends
 
Open Source for Industry 4.0 – Open IoT Summit NA 2018
Open Source for Industry 4.0 – Open IoT Summit NA 2018Open Source for Industry 4.0 – Open IoT Summit NA 2018
Open Source for Industry 4.0 – Open IoT Summit NA 2018
 
Project Grace - Towards a Secure Internet
Project Grace - Towards a Secure InternetProject Grace - Towards a Secure Internet
Project Grace - Towards a Secure Internet
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
NUB3D - Company Presentation
NUB3D - Company PresentationNUB3D - Company Presentation
NUB3D - Company Presentation
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security
 
Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)
Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)
Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)
 
Security in Optical Networks - Useless or Necessary?
Security in Optical Networks - Useless or Necessary?Security in Optical Networks - Useless or Necessary?
Security in Optical Networks - Useless or Necessary?
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
 
Transforming enterprise and industry with 5G private networks
Transforming enterprise and industry with 5G private networksTransforming enterprise and industry with 5G private networks
Transforming enterprise and industry with 5G private networks
 
Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Security
 

Recently uploaded

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Global-WAN - The Swiss Neutral Data Haven

  • 1. Global-WAN® Swiss Data Haven The Neutral Global Network Built on Post-Quantum Security for “The Internet of Things” global-wan.ch
  • 2. This document is aimed at helping people to understand the Global-WAN technology. Further information regarding the internals of TWD Industries AG's technology are available under a proper NDA, to selected partners. 2 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 3. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 3 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 4. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 4 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 5. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 5 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 6. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 6 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 7. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 7 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 8. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 8 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 9. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 9 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 10. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 10 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 11. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 11 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 12. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 12 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 13. The Problem “Nations have no friends, only interests” John Kornblum US Ambassador in Germany (2014) 13 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 14. US Vendors' Dilemma “How do you protect what you want to exploit?” Scott Charney, VP Trustworthy Computing, Microsoft 14 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 15. US Strategists' Dilemma “The Internet is the most transformative innovation since Gutenberg and the printing press, yet we're treating it as a war zone.” Jason Healey The Atlantic Council (US think-tank) 15 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 16. The Solution “To restore trust, there's no substitute to offering the real thing: forever unbreakable trusted security.” TWD Industries AG, 2007 16 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 17. Global-WAN Purpose & Distinctive Value Unique, By-Design 17 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 18. “Securing Phone, Fax, Radio, Video Conferencing, Web applications, unified communications, etc. with Forever-Unbreakable Trusted Encryption”. For * Individuals (consulting, politics, lawyers) * Enterprises (board, partners, R&D, branch) * Governments (Army, Police, energy grid, embassies, trading, etc.). 18 | Copyright © 2014 TWD Industries AG. All rights reserved. PURPOSE Global-WAN
  • 19. 19 | Copyright © 2014 TWD Industries AG. All rights reserved.
  • 20. EASE OF USE 20 | Copyright © 2014 TWD Industries AG. All rights reserved. Plug & Play and: - Compatible with all HARDWARE - Compatible with all SOFTWARE - Compatible with all Operating Systems (IBM, ORACLE, Apple, Microsoft, Linux...) Global-WAN
  • 21. Global-WAN 21 | Copyright © 2014 TWD Industries AG. All rights reserved.
  • 22. FOREVER SAFE 22 | Copyright © 2014 TWD Industries AG. All rights reserved. Security designed to last: - Proven as unbreakable forever (post-quantum) - Hides communication endpoints (where, who) - Hides application and user metadata Complete security: no “what, who, when, where”. Global-WAN
  • 23. Global-WAN Business Development Investment Opportunities 23 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 24. To accelerate its Development, TWD Industries AG invites International Investors 24 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 25. “With the right acts of digital sabotage, attack aircraft will be grounded, infrastructure disrupted and communications severed, reducing the enemy to a state of raging, pre-modern impotence.” The Economist 25 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 26. 26 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 27. “There's a market failure in cyber-security, made worse by the trouble firms have in getting reliable information about the threats they face.” The Economist, “Vulnerabilities - Zero-day game - Wielding a controversial cyber-weapon.” 27 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 28. 28 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 29. “To avoid lurid headlines about car crashing, insulin overdoses and houses burning, tech firms will surely have to embrace higher [security] standards.” The Economist "The Internet of things (to be hacked)" 29 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 30. 30 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 31. INVEST GLOBALLY In Emerging Markets and Established Markets: ● USA (“the NSA has destroyed trust”) ● EUROPE (badly needs resilience, growth) ● AFRICA (new infrastructure, sovereignty) ● ASIA (needs to foster independence) ● LATIN-AMERICA (won't trust the USA) 31 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 32. INVEST IN NATIONS Securing the CRITICAL INFRASTRUCTURE: ● Security (Army, Police, Finance, etc.) ● Assets (Water Supply, Airports, etc.) ● Energy (Pipelines, Nuclear Plants, etc.) ● Networks (Internet, GSM, 3G/4G, etc.) ● E-Admin (e-Votes, e-Medical, e-Fiscal) 32 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 33. INVEST IN PATENTS Let Global-WAN licence its patents and micro-chips to secure all these devices. 33 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 34. Architecture & Components Designed From Scratch (can't trust existing products) 34 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 35. SOFTWARE COMPONENTS G-WAN: A Server That Can be Trusted Designed To Build A Secure Platform: ● Less Code, Less Bugs, Higher Efficiency ● New Technologies (Parsing, Memory, etc.) ● No Vulnerability Found Since 2009 Launch Needed a Safe Server to release Secure Services. 35 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 36. Lorenz-Waterwheel Designed to Scale From [1-∞] CPU Cores. Lock-Free, Wait-Free, Multi-Threaded and Event-Based. 36 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN Connections MULTICORE SCALABILITY
  • 37. 37 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN MULTICORE SCALABILITY
  • 38. UBIQUITOUS PLATFORM G-WAN: Lightweight (200 KB) App. Server Designed To Run Everywhere: ● Smartphones (Low-Consumption, Low-Latency) ● Embedded (Control At The Lowest Level) ● Servers (Web, SaaS, PaaS, Clouds) With Scripts In 17 Programming Languages: (asm, C/C++, C#, Java, Scala, Go, Javascript, Lua, Perl...) 38 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 39. VERSATILE PLATFORM G-WAN: An Universal Stack Open to Third-Parties: ● Applications (C/C++, C#, Java, Obj-C, Perl) ● Middleware (HTTP/S, asynchronous scripts) ● Database (Key-Value, SQLite, ORACLE) ● Infrastructure (DNS, Email, Proxy, VPN, etc.) 39 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 40. ZERO CONFIGURATION G-WAN: An Unobstrusive Stack Why Configuration Files Are Bad: ● Confusing, User Errors, Buggy, Version Incompatibilities ● Mostly Redundant with existing File System Information ● Inadequate: Adaptive Options Are Much Safer / Efficient Safer, Faster, Simpler, No User Lock-In, No Planned Obsolescence, Able to Run on Unattended Systems. 40 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 41. ORACLE OPEN-WORLD 41 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 42. ORACLE OPEN-WORLD 42 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN Making The Impossible Become Routine ● G-WAN Accelerating ORACLE NoSQL ● In A Social Gaming Demo Of 100 Millions Bots ● All Moving In Real-Time (Heading, Speed, etc.) ● Queried by 45,000 Persons Joining The Game ● And Achieving A Whooping 1.2 Billion of TPS ● ...On A Mere 6-Core Desktop Machine!
  • 43. The Global-WAN Project Development Schedule 43 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 44. 44 | Copyright © 2014 TWD Industries AG. All rights reserved. Reaching The Harvesting Phase 3 years 2 years 5 plus years  Integration still dominating  Exploitation gains speed  Consolidation of development processes is key  Minimize team churn and grow it only slowly  Focus on integration  Only very few clients  Gain experience in automation  Build a strong team  Integration becomes less important  Exploitation takes lead and grows significantly  Quality becomes key topic  Long term employees perform best Information Integration Information Exploitation 1) Ramp-up phase, 2008 2) Consolidation phase 3) Harvesting phase, 2014 Global-WAN
  • 45. Productivity Standards Favourably Comparing With The Next Best: 45 | Copyright © 2014 TWD Industries AG. All rights reserved. Server Birth Files Blank Comment Code Total Nginx 2002 256 35,131 4,308 94,369 133,808 G-WAN 2009 171 11,198 42,706 56,766 110,670 G-WAN was written in less than half the time, and offers many more features in half the code of Nginx. Further, G-WAN's source code has 10x more comments than Nginx's code. Source Code Lines Global-WAN
  • 46. Why TrustLeap? The Need For Global-WAN on both Server and Client Sides 46 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 47. Unbreakable Security ● Future-Proof (Post-QUANTUM) ● Mathematically Proven (Can Be Trusted By All) ● Independent From Computing Power Used To Break It ● No More Need To Enlarge Encryption Keys ● No More Need To Change Encryption Algorithms ● Also Unbreakable Two & Three-Factor Authentication ● No Central Key Repository Needed (But Can Be Used) ● Mobiles / Embedded: Very Low Overhead (CPU / RAM) 47 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 48. The Value Of Trust Applications ● Corporate Asset Protection (Patents, Talks, Databases) ● Public Asset Protection (e-Votes, Medical Records, Legal) ● International Negotiations (United Nations, Contracts) ● Transaction / Archiving Certifications (Indisputable) ● Defence (Impenetrable Communications, Drones, etc.) ● Chips Would Be Ideally Used (Tampering, I.P. Protection) ● Legitimacy to Impose a Licensing Monopole (Exclusivity) 48 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 49. Trust Starts With Identity ● Email (Data Protection, Negotiations, Board Talks) ● Routers / Firewalls (How Safe Are Barriers If Broken?) ● Transactions (Trading, Contracts, Non-Repudiation) ● Storage (Confidentiality, Tamper-Proof, Full-Control) ● Defence (Remote Presence / Control, Chain Of Orders) ● I.P. Rights (What Worth Is A Proof That Can Be Spoofed?) ● Legal (Customers / Lawyers / Regulators Security Chain) 49 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 50. TrustLeap Worldwide Corporate HQ TrustLeap Paradiesli 17 CH-8842 Unteriberg SZ Switzerland Phone +41 (0)55 414 20 93 Fax +41 (0)55 414 20 67 Email contact@trustleap.com www.trustleap.com About TrustLeap TrustLeap, the security division of TWD Industries AG, protects digital assets with cryptanalytically unbreakable technology (safe against unlimited computing power as it is proven mathematically that no key leaks can be exploited). The TrustLeap secure platform leverages offers of enterprise, cloud, networking, digital media and financial services in global strategic markets. TrustLeap lets partners and users form dynamic ecosystems where duly accredited strangers can safely trust each-other. Establishing widespread trust enables organizations to secure their infrastructure, raise the value of their offers and safely market their digital assets. TrustLeap 50 | Copyright © 2014 TWD Industries AG. All rights reserved.