Enviar pesquisa
Carregar
Managed-Defence-on-Vessels_en
•
0 gostou
•
206 visualizações
Intellicomp GmbH
Seguir
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 12
Baixar agora
Baixar para ler offline
Recomendados
Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...
Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...
Les Interconnectés
Security solutions 2010 death of patrols
Security solutions 2010 death of patrols
Ilias Varsamis
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson
Adsii Slide Show
Adsii Slide Show
Farhaad Sheikh
Buckle Up
Buckle Up
DMIMarketing
Fox-Industrial-Skytale-EN
Fox-Industrial-Skytale-EN
Ben Lange
Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson
Expo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_EN
Cisco Case Studies
Recomendados
Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...
Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...
Les Interconnectés
Security solutions 2010 death of patrols
Security solutions 2010 death of patrols
Ilias Varsamis
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson
Adsii Slide Show
Adsii Slide Show
Farhaad Sheikh
Buckle Up
Buckle Up
DMIMarketing
Fox-Industrial-Skytale-EN
Fox-Industrial-Skytale-EN
Ben Lange
Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson
Expo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_EN
Cisco Case Studies
AASTMT Case Study
AASTMT Case Study
Cisco Case Studies
Proyecto Final (IoT, Cloud Computing, Domotica)
Proyecto Final (IoT, Cloud Computing, Domotica)
GabrielaNicole4
Presentacion final inf103
Presentacion final inf103
FabiolaTorres61
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agenda
Copperberg
Reinhard Posch
Reinhard Posch
Tecnimap
Living In a World of Data Exploitation - CPDP 2017
Living In a World of Data Exploitation - CPDP 2017
Frederike Kaltheuner
Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell Goodman
jonneiditz
Algoritmos
Algoritmos
Carlos Campani
Power point on linux commands,appache,php,mysql,html,css,web 2.0
Power point on linux commands,appache,php,mysql,html,css,web 2.0
venkatakrishnan k
Overcoming challenges relating to operational implementation
Overcoming challenges relating to operational implementation
saamali
Tablets: Evolving from Personal to Business By Elaine B. Coleman, Desirée Dav...
Tablets: Evolving from Personal to Business By Elaine B. Coleman, Desirée Dav...
ElainebColeman
Final Nacional Premio EmprendedorXXI 2009
Final Nacional Premio EmprendedorXXI 2009
Caixa Capital Risc
EPSILON'S ENTERPRISE CONNECT SERVICES: TURNING PAIN POINTS INTO PROFITABILITY
EPSILON'S ENTERPRISE CONNECT SERVICES: TURNING PAIN POINTS INTO PROFITABILITY
Geraldine Tan
Programa Conjunto: Justicia, Seguridad, Comunidad y Desarrollo Económico
Programa Conjunto: Justicia, Seguridad, Comunidad y Desarrollo Económico
Unidos por la Justicia Asociación Civil
Tweets und Aktienkurse? Wertvolle Erkenntnisse durch Data Blending gewinnen
Tweets und Aktienkurse? Wertvolle Erkenntnisse durch Data Blending gewinnen
it-novum
Dossier Avalon Red
Dossier Avalon Red
Avalon, la red de expertos
28noviembre1970
28noviembre1970
VESCELIA
Programa dia de_la_persona_emprendedora_2011_aragon
Programa dia de_la_persona_emprendedora_2011_aragon
Carmen Urbano
Rauchgasentstickung | weyer spezial
Rauchgasentstickung | weyer spezial
weyer gruppe
Aplicacion de nuevas tecnologias Internet
Aplicacion de nuevas tecnologias Internet
Jhair2012
Drum Cafe
Drum Cafe
Drum Cafe
Plantilla con-normas-icontec (4)
Plantilla con-normas-icontec (4)
Juan Ossa
Mais conteúdo relacionado
Mais procurados
AASTMT Case Study
AASTMT Case Study
Cisco Case Studies
Proyecto Final (IoT, Cloud Computing, Domotica)
Proyecto Final (IoT, Cloud Computing, Domotica)
GabrielaNicole4
Presentacion final inf103
Presentacion final inf103
FabiolaTorres61
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agenda
Copperberg
Reinhard Posch
Reinhard Posch
Tecnimap
Living In a World of Data Exploitation - CPDP 2017
Living In a World of Data Exploitation - CPDP 2017
Frederike Kaltheuner
Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell Goodman
jonneiditz
Mais procurados
(7)
AASTMT Case Study
AASTMT Case Study
Proyecto Final (IoT, Cloud Computing, Domotica)
Proyecto Final (IoT, Cloud Computing, Domotica)
Presentacion final inf103
Presentacion final inf103
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agenda
Reinhard Posch
Reinhard Posch
Living In a World of Data Exploitation - CPDP 2017
Living In a World of Data Exploitation - CPDP 2017
Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell Goodman
Destaque
Algoritmos
Algoritmos
Carlos Campani
Power point on linux commands,appache,php,mysql,html,css,web 2.0
Power point on linux commands,appache,php,mysql,html,css,web 2.0
venkatakrishnan k
Overcoming challenges relating to operational implementation
Overcoming challenges relating to operational implementation
saamali
Tablets: Evolving from Personal to Business By Elaine B. Coleman, Desirée Dav...
Tablets: Evolving from Personal to Business By Elaine B. Coleman, Desirée Dav...
ElainebColeman
Final Nacional Premio EmprendedorXXI 2009
Final Nacional Premio EmprendedorXXI 2009
Caixa Capital Risc
EPSILON'S ENTERPRISE CONNECT SERVICES: TURNING PAIN POINTS INTO PROFITABILITY
EPSILON'S ENTERPRISE CONNECT SERVICES: TURNING PAIN POINTS INTO PROFITABILITY
Geraldine Tan
Programa Conjunto: Justicia, Seguridad, Comunidad y Desarrollo Económico
Programa Conjunto: Justicia, Seguridad, Comunidad y Desarrollo Económico
Unidos por la Justicia Asociación Civil
Tweets und Aktienkurse? Wertvolle Erkenntnisse durch Data Blending gewinnen
Tweets und Aktienkurse? Wertvolle Erkenntnisse durch Data Blending gewinnen
it-novum
Dossier Avalon Red
Dossier Avalon Red
Avalon, la red de expertos
28noviembre1970
28noviembre1970
VESCELIA
Programa dia de_la_persona_emprendedora_2011_aragon
Programa dia de_la_persona_emprendedora_2011_aragon
Carmen Urbano
Rauchgasentstickung | weyer spezial
Rauchgasentstickung | weyer spezial
weyer gruppe
Aplicacion de nuevas tecnologias Internet
Aplicacion de nuevas tecnologias Internet
Jhair2012
Drum Cafe
Drum Cafe
Drum Cafe
Plantilla con-normas-icontec (4)
Plantilla con-normas-icontec (4)
Juan Ossa
I Sistemi di scambio non monetari
I Sistemi di scambio non monetari
IFLab
Functional analysis aiesec in spain 1213
Functional analysis aiesec in spain 1213
Jeesoo
Spirent TestCenter Virtual on OracleVM
Spirent TestCenter Virtual on OracleVM
Malathi Malla
Parques Nacionales de Canarias
Parques Nacionales de Canarias
albahm
Hidrogeología básica de la Península de Yucatán
Hidrogeología básica de la Península de Yucatán
Emiliano Monroy Ríos
Destaque
(20)
Algoritmos
Algoritmos
Power point on linux commands,appache,php,mysql,html,css,web 2.0
Power point on linux commands,appache,php,mysql,html,css,web 2.0
Overcoming challenges relating to operational implementation
Overcoming challenges relating to operational implementation
Tablets: Evolving from Personal to Business By Elaine B. Coleman, Desirée Dav...
Tablets: Evolving from Personal to Business By Elaine B. Coleman, Desirée Dav...
Final Nacional Premio EmprendedorXXI 2009
Final Nacional Premio EmprendedorXXI 2009
EPSILON'S ENTERPRISE CONNECT SERVICES: TURNING PAIN POINTS INTO PROFITABILITY
EPSILON'S ENTERPRISE CONNECT SERVICES: TURNING PAIN POINTS INTO PROFITABILITY
Programa Conjunto: Justicia, Seguridad, Comunidad y Desarrollo Económico
Programa Conjunto: Justicia, Seguridad, Comunidad y Desarrollo Económico
Tweets und Aktienkurse? Wertvolle Erkenntnisse durch Data Blending gewinnen
Tweets und Aktienkurse? Wertvolle Erkenntnisse durch Data Blending gewinnen
Dossier Avalon Red
Dossier Avalon Red
28noviembre1970
28noviembre1970
Programa dia de_la_persona_emprendedora_2011_aragon
Programa dia de_la_persona_emprendedora_2011_aragon
Rauchgasentstickung | weyer spezial
Rauchgasentstickung | weyer spezial
Aplicacion de nuevas tecnologias Internet
Aplicacion de nuevas tecnologias Internet
Drum Cafe
Drum Cafe
Plantilla con-normas-icontec (4)
Plantilla con-normas-icontec (4)
I Sistemi di scambio non monetari
I Sistemi di scambio non monetari
Functional analysis aiesec in spain 1213
Functional analysis aiesec in spain 1213
Spirent TestCenter Virtual on OracleVM
Spirent TestCenter Virtual on OracleVM
Parques Nacionales de Canarias
Parques Nacionales de Canarias
Hidrogeología básica de la Península de Yucatán
Hidrogeología básica de la Península de Yucatán
Semelhante a Managed-Defence-on-Vessels_en
Tech trendnotes
Tech trendnotes
Studying
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture
Symantec
Leandro Agrò
Leandro Agrò
GoWireless
Massive Data Collection
Massive Data Collection
Leandro Agro'
Insecure mag-19
Insecure mag-19
Ambuj Sharma
CABA Whitepaper - Cybersecurity in Smart Buildings
CABA Whitepaper - Cybersecurity in Smart Buildings
Iron Mountain
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
Samuel Kamuli
presentation-2022.pptx
presentation-2022.pptx
AhmedSharshar6
Securing 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and Virtualization
Dr. Edwin Hernandez
DVCOM
DVCOM
dvcom2
DVCOM
DVCOM
dvcom2
IoT digest. March 2018
IoT digest. March 2018
ElifTech
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
Security Gen
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
SecurityGen1
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
Security Gen
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
Security Gen
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
Nabil Bouzerna
WmScammell--CDX-Chi-D1-p1
WmScammell--CDX-Chi-D1-p1
William Scammell
21 Innovative IoT Products To Watch at Hannover Messe 2017
21 Innovative IoT Products To Watch at Hannover Messe 2017
Kudzai Manditereza
Bretagne at Mobile World Congress 2015
Bretagne at Mobile World Congress 2015
Bretagne Commerce International
Semelhante a Managed-Defence-on-Vessels_en
(20)
Tech trendnotes
Tech trendnotes
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture
Leandro Agrò
Leandro Agrò
Massive Data Collection
Massive Data Collection
Insecure mag-19
Insecure mag-19
CABA Whitepaper - Cybersecurity in Smart Buildings
CABA Whitepaper - Cybersecurity in Smart Buildings
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
presentation-2022.pptx
presentation-2022.pptx
Securing 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and Virtualization
DVCOM
DVCOM
DVCOM
DVCOM
IoT digest. March 2018
IoT digest. March 2018
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
WmScammell--CDX-Chi-D1-p1
WmScammell--CDX-Chi-D1-p1
21 Innovative IoT Products To Watch at Hannover Messe 2017
21 Innovative IoT Products To Watch at Hannover Messe 2017
Bretagne at Mobile World Congress 2015
Bretagne at Mobile World Congress 2015
Managed-Defence-on-Vessels_en
1.
ubique TECHNOLOGIES
2.
©UBIQUETechnologiesGmbH www.ubique-technologies.de Astableonlineaccessistantamountforthecaptainandcrew,notonlyforretrievalofcurrentdata,butalsoasa communicationchannelwithhomeandforrecreationalactivities.Ifprivatelaptopsorsmartdevicesareconnectedtothe ship’snetwork,keyonboardsystemscouldbeaffected.Privatebrowsingortheuseofbandwidth-intensiveapplications suchasmultimediastreamingorvideochatscanexhaustsatellitelinksquickly,causingcoststoskyrocket. InfrastructureSecurityandCostcontrol SecureSolutionsforasecurebusiness ThemanipulationorfailureofanITorcommunicationsnetworkonboardcanhavefatalconsequences,fromcostlydelays tomanipulationofon-boardsystemsorcargosoftwaretohazardsfortheshipandcrew. AdistinguishedCyberSecurityspecialistsince2011,UBIQUE Technologiesoffersworldwideprotectionfordigital infrastructuresagainstmanipulation,infiltrationandIT-relatedmalfunctions.WithCyberSecurityCommandCenters, mannedaroundtheclockinitsowndatacentersinGermany,UBIQUETechnologiesstandsfortheimmediatedefense againstdigitalattacksaswellastargetedinitiationofappropriatecountermeasurestoprotectdigitalandphysicalvalues. TToday’sshipsusemoreinformationtechnologythanamedium-sizedcompany.Inaddition,thedemandsonseaworthy hardwaresystemsaremuchhigherthanfornormalhardwaresystems:roughseas,highhumidityandlimitedspacerequire robustandreliableinfrastructuresystems.Atthesametime,thepotentialrisksandassociatedcostsofafunctionalfailure oftheonboardITsystembyfarexceedwhatsystemsdesignedfornormalusearecapableofhandling. DesigninganIT-Protectionsystem
tailoredtotheneedsofmoderncommercialshippingrequiresthatsuchfactorsas acquisitionacquisitionandoperatingcosts,globalavailabilityofpartsandaglobalservicestructurebeconsideredaswellasthefeasi- bilityofconnectionquality,bandwidthandtheoverallcostsofoperatingthetechnologiesusedineachcase.
3.
©UBIQUETechnologiesGmbH www.ubique-technologies.de Thefirststepstobetakeninordertoincreasenetworksecurityonboardaretocreateseparatenetworksfortheintra-and inter-shipcommunicationsandcrewusageaswellasintegratingvarioussecurityfiltersinthedatastream. Theseparationofindividualnetworksectorsservestosimplifynetworkmanagementandimplementcostcontroloftheser- vicesprovided,aswellasgreatlyenhancingsecurity. Thetoken-basedInternetaccesssystem enablescompliancewithlegalprivacyrequirementsandprotectsthenetwork operator,inthiscasetheshipowners,fromliabilityclaimsbyindividualcrewmemberswithoutthenecessityofrestricting internetusage.TheDualControlprinciplefacilitateslegallycompliantstorageofstoredlogdatawhichcanlaterbeanaly- zed,ifrequired. Accesscontrolalsoallowsapersonalorgroup-basedbandwidthallocationandcanprioritizeorblockinternetorapplication accessonthebasisofoperationalplans. Thecontentfilteremployedprotectsagainsttheunlawfuluseoftheinternetconnectionbycrewmembersandcanbe tailoredtomeetthelegalrequirementsofthevariousportsofcallorcountriesatanytime.Atthesametime,downloads containingmalwareorotherhazardouscontentsarecaughtanddisabled. GeneraluseofaFleetBroadband(FBB)connectionismoreexpensivethanthecostofasatellitelink(VSAT)link.Incase ofaVSATconnectionfailure,onlytheoperationalandsecurity-relatedservices,vitaltotheship’soperation,shouldbe transferredtotheFBBsothattheyremainavailable. AlthoughAlthoughnon-criticalservices,suchassurfingtheinternet,arenownolongeravailabletothecrew,thesefunctionscanstill beusedbygroupsofspecificallydefinedcrewmembersontheFBB.Inaddition,personalizedinternetandapplication accesscanbelimited,eitherconnection-dependentorbyvolumeortime,extendingthesystem’scapabilitiestoensureop- timumcostcontrol. Theallocationofdefinedbandwidths,eitherfixedorpercentage-wise,fordefinedapplications,links,individualsorgroups provideseachwiththeoptimalavailabilityofimportantsystemsandinformationsources. Networkseparation/Networkdivision Accesscontrol InternetFilter ServiceorientedFailover InfrastructureSecurityandCostcontrol
4.
©UBIQUETechnologiesGmbH www.ubique-technologies.de State-of-the-artencryptiontechnologiesareusedtoprotectwirelessnetworks(Wi-Fi);however,itisonlyamatteroftime beforeanintrusionintoaWLANissuccessful.Thatiswhywehaveaddedanactiveandtamper-freenetworkaccess control(NAC)tooursecuritysystem. This additionallayerofprotection
continuously scans allnetwork activity withoutburdening the network itself. Shouldanattackergainillegalaccesstoanetworksegment,hewillbeidentifiedwithinmillisecondsandany communicationbetweentheattacker’ssystemandtheinternalsystemisprevented. JustJustasthefirewallitselfincludesallthenecessaryprotectivefunctionstopreventagainstcontaminationovertheIP,the NACnotonlyscansallinternalnetworktraffictounknownsystems,butalsochecksfornetworkcommunicationinconsis- tenciesaswellasmonitoringallconnectedsystemsforvulnerabilities. Thesystemrecordsallsecuritybreachestoatamper-proofdatabasewhichispassedontothecontrolroomwhereitcan bepursuedfurtherincompliancereportsandprocess-drivenworkflows,asnecessary. ApplicationContainmentprovidesanotherimportantlayerofsecurityforhighlysensitiveapplications.Acontainerized applicationrunswithinacontainerapplicationandeveryapplicationinterfaceismonitored. Thisprotectstheapplicationitselfaswellasalldatainputagainstmanipulationandanyunlawfuldatatap.Evenkeystrokes themselvesare encrypted before being passed on to the protected application within the containerapplication. Containerizationmakesitpossiblenotonlytorunsafeapplicationsinuncertainenvironments,buttoalsoexecuteunsecu- redapplicationsinsecureenvironments. NetworkAccessControl VulnerabilityManagementandReporting ApplicationContainment InfrastructureSecurityandCostcontrol
5.
©UBIQUETechnologiesGmbH www.ubique-technologies.de Theadministratingemployeesareauthenticatedthroughatokensystem.Thecentralmanagementinterfaceallowsthem accessonlytothefunctionsforwhichtheyhavebeenauthorized.Thisenablesagranularimplementationoftheseparation offunctionsbetweenthevariousadministrativetasks. Inordertominimizethebandwidthloadasmuchaspossible,thetransmissionofloginformationandreportscanbe granularlygranularlycontrolledandtimed.Thetransmissionitselfcanbeswitchedfromthecurrentpushmethod,wheretheindividual applicationsautomaticallypasstheirinformationtoheadquarters,tothepullmethod,wherethecentrallogandreporting serveractivelyretrievestheapplianceinformation. Thisalsoappliestochangesinrules.Thesystem rulechangescaneitherbeexecuteddirectlyorthroughthecentral controlcenter.Theyarethensynchronizedagainsteachotherandonbothsides–inthedatacenterandontheindividual applianceonboard–sothatuniformrulesareavailable. ThisThismakesitpossibletosetuprulescentrallyand,aftercentralclearance,pushthem
totheconnectedapplianceson boardandactivatethem. Accesscontrolandseparationoffunctions PullundPush Responsibilityforthemanagementoftheprotectionsystemisallocatedtoacentrallocation, eithertheheadquartersoftheshippingcompany,orUBIQUETechnologies’datacenterinGermany, Centrallymanaged,optimalSecurity
6.
©UBIQUETechnologiesGmbH www.ubique-technologies.de Incaseitbecomesnecessarytoexchangetheentiresystem,thecentralofficecan„refuel“thereplacementdevices remotelyandguideacrewmemberduringtheimplementation.Theglobaluseofthesesystemsensuresthatexchange systemscanbeprocuredandbroughtonboardfrommostnearbyports. Wehighlyrecommendtheuseofacluster,inwhich2identicaldevicesacttogether,asthefailureofonesystemcanbe compensatedbythesecondsystemuntilthereplacementbecomesavailable. UsageUsageReportsserveasproofofsystemusagebyindividuals,systemsandapplicationsandshowtheentiredatatransfer history.Asidefromtheresultingplanningsecurity,itispossibletodrawconclusionsandalsodoaforensicevaluationof thesystem’ssecurity. Usetheexistingreporttemplatesortheoptionofdefiningyourownreports,togeneratecompliancereportsonsystemse- curity,configurationandusageinjustminutes. . Systemexchange UsageandComplianceReports Centrallymanaged,optimalSecurity
7.
©UBIQUETechnologiesGmbH www.ubique-technologies.de Often,inadditiontorequiringusernameandpassword,applicationandsystem accesscanbelimitedtoasingle, accessingIPaddresswhichfurtherreinforcessystemprotection. UBIQUETechnologies‘centralVPN-Fixed-IPServicemakestheuseofafixedIPintheauthenticationprocesspossible, withoutlosingtheconvenienceofwidespreadorevenmobileaccesses. EmployeesandserviceproviderscansetuptheirVPNinourdatacenterasusual,fromheadquartersorontheroad,using theirlaptops,andcanaccessthesystemstobeadministeredthroughthat. EmployeeEmployeeaccessissecuredthroughtheuseofatokensystem.Thepasswordsusedtologinareclearlydefinedand updatedina30-60secondcycle. Eachemployeeentershisusername,knownonlytohimself,andthepasswordprovidedviaahardorsofttoken,togain accesstothecentralaccesspointwherehethenauthenticateshisidentity. CentrallysecuredaccesseswithfixedIPaddresses
8.
©UBIQUETechnologiesGmbH www.ubique-technologies.de WiththeintroductionofVoIP,theproblem ofachievingtap-proofcommunicationschannelswasoftentransferredtothe VoIPtelecommunicationssystembeingused.Widespreadimplementationofthispracticehasgeneratedincreasedattacks onthevulnerabilitieswithintheprotocolitself,inparticular,targetingtheclientsystemsinuse. WithAdhocVoIP-Encryption,wemaketheencryptionofvoicecommunicationpossibleinanend-to-endprocessandby removingtheunknownvariableintheoperatingsystem,whetheritisalaptoporapersonalcomputer,fromtheequation. InInordertominimizethetarget,thesystem
encryptsthevoicepacketbeforeitleavestheclientcomputeranddecrypts incomingvoicepacketsafterthesehaveleftthePCusedtosendthem.Thisprocessismadepossiblethroughtheuseof aspecialUSB hardwaresystem inwhichahardware-basedencryptionisemployedwhichallowsasecureand certificate-basedauthenticationofthecommunicationspartner. UsingacommerciallyavailableUSBheadsetorasimpleUSBdeskphonesystemissufficient. AdhocVoIP-Encryption EncryptedVoiceCommunication
9.
©UBIQUETechnologiesGmbH www.ubique-technologies.de FleetinternatVoIP-Encryption Forfleetinternalencryptedvoicecommunicationweuseanencryptingappliancethatcanbeplacedinorganizations headquarterandneedstogetconnectedinfrontoftheexitingPBX. AsanoptionPBXandVoIP-Encryption-AppiancecanbeplacedinoneofourGermanDatacenter. AfteractivationoftheserviceencryptedVoIP-Callswillbeavailablebetweenthecorporatesheadquarter,vesselsand singlepersons.Ineverycasewegrantthatinfrontoftheconnectiontheuseddeviceswillgetauthenticatedandthatalso thehandshake-infrontoftheestablishingofancommunicationchannel–willbeinitiallycrypted. Fortheusageofthisserviceeverysmartdevice,PCorFortheusageofthisserviceeverysmartdevice,PCorVoIP-enableddevicecangetused. EncryptedVoiceCommunication
10.
©UBIQUETechnologiesGmbH www.ubique-technologies.de EncryptedEmailCommunication&DataTransfer Currentencryptionmethodsforemailcommunicationareusuallybasedononeoftwostandards:PGPorS/Mime.These standardsaredesignedtoensuresecureend-to-endencryptionandwhenproperlyapplied,bothstandardsmeetthe highestsafetyrequirements. Unfortunately,bothmethodsrequirethattheclientsystemsusedarecleanandfreeofspywareormalwaresuchas RootkitsorTrojans.Basedonourexperiencesandthoseofourparentcompany,wemustalwaysassumethatnosystem istrustworthy. TheThesystem weprovideforthesecureexchangeofemailmessagesisthereforebasedonadedicatedcommunications server,wherepartnerscanexchangesecurecommunicationsandtheencryptedinformationisuploadedtotheindividual emailclientonlyifneeded. Inaddition,thesystemprovidedissupportedbyboththePGPundS/Mimestandards. EncryptedEmailCommunication
11.
©UBIQUETechnologiesGmbH www.ubique-technologies.de TECHNOLOGIES ubique AdistinguishedCyberSecurityspecialistsince2011,UBIQUETechnologiesoffersworldwideprotectionfordigital infrastructuresagainstmanipulation,infiltrationandIT-relatedmalfunctions.WithCyberSecurityCommand Centers,mannedaroundtheclockinitsowndatacentersinGermany,UBIQUETechnologiesstandsfortheimme- diatedefenseagainstdigitalattacksaswellastargetedinitiationofappropriatecountermeasurestoprotectdigital andphysicalvalues. UBIQUETechnologiesGmbH ChristianNowitzki,Geschäftsführer UBIQUETechnologiesGmbH Economic success
is created through entrepreneurial thinkingandaction.Appropriateriskmanagementensures successaswellasmakingeconomicriskspredictable. Becausewespecializeintheprotectionofdigitalinfra- structures,wecanensurethesecurityofyourcompanyand theprotectionofyourinformationandassets.
12.
UBIQUETechnologiesGmbH Mühlstraße50 63762Großostheim Germany Telefon:+49(6093)3699990 www.ubique-technologies.dekontakt@ubique-technologies.de ubique TECHNOLOGIES securesolutionsforasecurebusiness
Baixar agora