SlideShare una empresa de Scribd logo
1 de 13
Descargar para leer sin conexión
1
Software Protection Is Becoming Mainstream Yuan Xiang Gu Irdeto, Canada
About Irdeto Founded in 1969 by Ir. Pieter den Toonder 1000 employees, over 500 customers Dual headquarters: Amsterdam and Beijing 25 offices around the world Part of Naspers, multinational media company  10.000 employees USD $3.7B revenue in FY10 Pay TV Solutions (CA, Middleware, Billing) Enable Broadcasters to become “Broadbanders” Content Management & Distribution for Any Screen Security Lifecycle Management for Any DeviceOver 3 billion software instances protected
Un-Trusted Environment Reality  4 Cloud Computing  Environments Un-trusted environments  are everywhere and even becoming more dominated in digital world Persistent Security on  un-trusted environments  is becoming  #1  concern Public Internet Consumer Devices & Home Networks & Internet of Things
New Challenges to Traditional Security 5 White-Box Security Dynamic Security Security of Un-Trusted Environment
Traditional Attacks Black Box Attack Grey Box Attack Man-In-The-Middle Attack (Indirect) Bob Alice Network Software Software Trusted Inside Box 6
White-Box Attacks Man-At-The-End Attack Bob is the Attacker Alice Software 7 Network Software
Just Like Security and Protection in Museum 8 Beijing’s Forbidden City  suffers break-in  Beijing’s Forbidden City  Robbed, May 11, 2011
Static Security vs Dynamic Security Dynamic Security Static Security 	Once static security breaks, the entire security is gone and hard to be restored Once dynamic security breaks, the security can be renewed and restored immediately in a planned way 9
Fundamental to Digital Asset Protection Tampering Analysis Data Flow Transforms Control Flow  Transforms Dynamic Integrity Verification White Box Crypto Stage 1a. Implement Attack Resistance Protect Digital Assets through fundamental enabling software security and services through the lifecycle  Dynamic Code Decryption Dynamic Code  Decryption Core Technology Defenses Stage 2. Monitor & Analyze Hacker Progress Stage 3. Deploy Counter-measures Stage 4. Respond to Attacks Stage 5. Renew Security  Anti-Debug  Stage 1b. Implement Attack Mitigation Software Diversity Software Diversity Attack Automation Attack Distribution Software Renewability Software Renewability Lifecycle  Security Digital AssetProtection  Protected Digital Asset Distributed and Consumed 10
Irdeto Technology Protects Beyond Media 11 Multi-Media ,[object Object]
 Film
 TVGames E-Maps E-Publications ,[object Object]

Más contenido relacionado

La actualidad más candente

Cyber Security & Information Warfare : A global security issue
Cyber Security & Information Warfare  : A global security issueCyber Security & Information Warfare  : A global security issue
Cyber Security & Information Warfare : A global security issueVincent Joassin
 
Internet of things: dispelling common myths
Internet of things: dispelling common myths Internet of things: dispelling common myths
Internet of things: dispelling common myths Vish Nandlall
 
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?IoT Academy
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, EverywhereLINE Corporation
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsKenny Huang Ph.D.
 
Privacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsPrivacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsGerry Elman
 
Cyber Security Research Project Topics
Cyber Security Research Project TopicsCyber Security Research Project Topics
Cyber Security Research Project TopicsMatlab Simulation
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewSteven Russo
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chainaletarw
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't StopSophos
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoTWSO2
 

La actualidad más candente (20)

Cyber Security in 2018
Cyber Security in 2018Cyber Security in 2018
Cyber Security in 2018
 
Cyber Security & Information Warfare : A global security issue
Cyber Security & Information Warfare  : A global security issueCyber Security & Information Warfare  : A global security issue
Cyber Security & Information Warfare : A global security issue
 
IoT security
IoT securityIoT security
IoT security
 
Internet of things: dispelling common myths
Internet of things: dispelling common myths Internet of things: dispelling common myths
Internet of things: dispelling common myths
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
FRONTIERS IN CRYPTOGRAPHY
FRONTIERS IN CRYPTOGRAPHYFRONTIERS IN CRYPTOGRAPHY
FRONTIERS IN CRYPTOGRAPHY
 
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, Everywhere
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
 
Privacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsPrivacy & Security for the Internet of Things
Privacy & Security for the Internet of Things
 
Cyber Security Research Project Topics
Cyber Security Research Project TopicsCyber Security Research Project Topics
Cyber Security Research Project Topics
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
 

Destacado

Jerry Park Profile
Jerry Park ProfileJerry Park Profile
Jerry Park ProfileJLPark
 
EASTWEST PR Credentials_China/HK updated Dec 9 2015
EASTWEST PR Credentials_China/HK updated Dec 9 2015EASTWEST PR Credentials_China/HK updated Dec 9 2015
EASTWEST PR Credentials_China/HK updated Dec 9 2015EASTWEST Public Relations
 
EASTWEST PR_China media landscape&CleanTech trends 2016
EASTWEST PR_China media landscape&CleanTech trends 2016EASTWEST PR_China media landscape&CleanTech trends 2016
EASTWEST PR_China media landscape&CleanTech trends 2016EASTWEST Public Relations
 
EASTWEST PR_Media Landscape/CleanTech India trends 2016
EASTWEST PR_Media Landscape/CleanTech India trends 2016EASTWEST PR_Media Landscape/CleanTech India trends 2016
EASTWEST PR_Media Landscape/CleanTech India trends 2016EASTWEST Public Relations
 

Destacado (6)

Jerry Park Profile
Jerry Park ProfileJerry Park Profile
Jerry Park Profile
 
Fortecstar
FortecstarFortecstar
Fortecstar
 
Communic asia 2011 media consumer survey
Communic asia 2011 media consumer surveyCommunic asia 2011 media consumer survey
Communic asia 2011 media consumer survey
 
EASTWEST PR Credentials_China/HK updated Dec 9 2015
EASTWEST PR Credentials_China/HK updated Dec 9 2015EASTWEST PR Credentials_China/HK updated Dec 9 2015
EASTWEST PR Credentials_China/HK updated Dec 9 2015
 
EASTWEST PR_China media landscape&CleanTech trends 2016
EASTWEST PR_China media landscape&CleanTech trends 2016EASTWEST PR_China media landscape&CleanTech trends 2016
EASTWEST PR_China media landscape&CleanTech trends 2016
 
EASTWEST PR_Media Landscape/CleanTech India trends 2016
EASTWEST PR_Media Landscape/CleanTech India trends 2016EASTWEST PR_Media Landscape/CleanTech India trends 2016
EASTWEST PR_Media Landscape/CleanTech India trends 2016
 

Similar a Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011

Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Nancy Nimmegeers
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersCrawsec
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx1SI19IS064TEJASS
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfssuser57b3e5
 
Security Challenges and Innovative Solutions for Securing a Complex World
Security Challenges and Innovative Solutions for Securing a Complex WorldSecurity Challenges and Innovative Solutions for Securing a Complex World
Security Challenges and Innovative Solutions for Securing a Complex WorldInfotecsGmbH
 
cyber security services | MasGlobal Services
cyber security services | MasGlobal Servicescyber security services | MasGlobal Services
cyber security services | MasGlobal ServicesMas Global Services
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SIMicrosoft Ideas
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014Anita Lösch
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationHans Klos
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 

Similar a Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011 (20)

Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
Security Challenges and Innovative Solutions for Securing a Complex World
Security Challenges and Innovative Solutions for Securing a Complex WorldSecurity Challenges and Innovative Solutions for Securing a Complex World
Security Challenges and Innovative Solutions for Securing a Complex World
 
cyber security services | MasGlobal Services
cyber security services | MasGlobal Servicescyber security services | MasGlobal Services
cyber security services | MasGlobal Services
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
NTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New WorldNTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New World
 
Sophos
SophosSophos
Sophos
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure Communication
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 

Más de EASTWEST Public Relations

How to engage employees using rewards and social media
How to engage employees using rewards and social mediaHow to engage employees using rewards and social media
How to engage employees using rewards and social mediaEASTWEST Public Relations
 
How to market a chemicals company in China using traditional and digital media.
How to market a chemicals company in China using traditional and digital media.How to market a chemicals company in China using traditional and digital media.
How to market a chemicals company in China using traditional and digital media.EASTWEST Public Relations
 
Impact on women's rights of the Global Gag Rule.
Impact on women's rights of the Global Gag Rule.Impact on women's rights of the Global Gag Rule.
Impact on women's rights of the Global Gag Rule.EASTWEST Public Relations
 
Impact on women's rights of the Global Gag Rule.
Impact on women's rights of the Global Gag Rule.Impact on women's rights of the Global Gag Rule.
Impact on women's rights of the Global Gag Rule.EASTWEST Public Relations
 
EASTWEST Public Relations Group Credentials
EASTWEST Public Relations Group Credentials EASTWEST Public Relations Group Credentials
EASTWEST Public Relations Group Credentials EASTWEST Public Relations
 
Strengthening universities' reputation in the global educational community
Strengthening universities' reputation in the global educational communityStrengthening universities' reputation in the global educational community
Strengthening universities' reputation in the global educational communityEASTWEST Public Relations
 
Morgan cars luxury china 2012 media coverage
Morgan cars   luxury china 2012 media coverageMorgan cars   luxury china 2012 media coverage
Morgan cars luxury china 2012 media coverageEASTWEST Public Relations
 
Digital Journalism In 2012 Survey Infographic
Digital Journalism In 2012 Survey InfographicDigital Journalism In 2012 Survey Infographic
Digital Journalism In 2012 Survey InfographicEASTWEST Public Relations
 
IEEE Standards Association 2012 Media Round Table - EASTWEST PR
IEEE Standards Association 2012 Media Round Table - EASTWEST PRIEEE Standards Association 2012 Media Round Table - EASTWEST PR
IEEE Standards Association 2012 Media Round Table - EASTWEST PREASTWEST Public Relations
 
Entrepreneur Organization Beijing - EO Global marketing awards entry
Entrepreneur Organization Beijing - EO Global marketing awards entryEntrepreneur Organization Beijing - EO Global marketing awards entry
Entrepreneur Organization Beijing - EO Global marketing awards entryEASTWEST Public Relations
 

Más de EASTWEST Public Relations (20)

How to engage employees using rewards and social media
How to engage employees using rewards and social mediaHow to engage employees using rewards and social media
How to engage employees using rewards and social media
 
How to market a chemicals company in China using traditional and digital media.
How to market a chemicals company in China using traditional and digital media.How to market a chemicals company in China using traditional and digital media.
How to market a chemicals company in China using traditional and digital media.
 
Impact on women's rights of the Global Gag Rule.
Impact on women's rights of the Global Gag Rule.Impact on women's rights of the Global Gag Rule.
Impact on women's rights of the Global Gag Rule.
 
Impact on women's rights of the Global Gag Rule.
Impact on women's rights of the Global Gag Rule.Impact on women's rights of the Global Gag Rule.
Impact on women's rights of the Global Gag Rule.
 
EASTWEST Public Relations Group Credentials
EASTWEST Public Relations Group Credentials EASTWEST Public Relations Group Credentials
EASTWEST Public Relations Group Credentials
 
EASTWEST PR Social Media Concept
EASTWEST PR Social Media ConceptEASTWEST PR Social Media Concept
EASTWEST PR Social Media Concept
 
Strengthening universities' reputation in the global educational community
Strengthening universities' reputation in the global educational communityStrengthening universities' reputation in the global educational community
Strengthening universities' reputation in the global educational community
 
Promoting Universities in China -
Promoting Universities in China - Promoting Universities in China -
Promoting Universities in China -
 
2013 - Social Media in China
2013 - Social Media in China2013 - Social Media in China
2013 - Social Media in China
 
Morgan cars luxury china 2012 media coverage
Morgan cars   luxury china 2012 media coverageMorgan cars   luxury china 2012 media coverage
Morgan cars luxury china 2012 media coverage
 
Digital Journalism In 2012 Survey Infographic
Digital Journalism In 2012 Survey InfographicDigital Journalism In 2012 Survey Infographic
Digital Journalism In 2012 Survey Infographic
 
IEEE Standards Association 2012 Media Round Table - EASTWEST PR
IEEE Standards Association 2012 Media Round Table - EASTWEST PRIEEE Standards Association 2012 Media Round Table - EASTWEST PR
IEEE Standards Association 2012 Media Round Table - EASTWEST PR
 
Unc chapel hill intern program 2012
Unc chapel hill intern program 2012Unc chapel hill intern program 2012
Unc chapel hill intern program 2012
 
Entrepreneur Organization Beijing - EO Global marketing awards entry
Entrepreneur Organization Beijing - EO Global marketing awards entryEntrepreneur Organization Beijing - EO Global marketing awards entry
Entrepreneur Organization Beijing - EO Global marketing awards entry
 
Why multinationals turn to weibo in china
Why multinationals turn to weibo in chinaWhy multinationals turn to weibo in china
Why multinationals turn to weibo in china
 
Weibo, social media phenomenon in China
Weibo, social media phenomenon in ChinaWeibo, social media phenomenon in China
Weibo, social media phenomenon in China
 
Weibo for b2 b business
Weibo for b2 b business Weibo for b2 b business
Weibo for b2 b business
 
Content marketing and optimization/SEO
Content marketing and optimization/SEOContent marketing and optimization/SEO
Content marketing and optimization/SEO
 
Entrepreneurship in China
Entrepreneurship in ChinaEntrepreneurship in China
Entrepreneurship in China
 
Chinese media & social media
Chinese media & social mediaChinese media & social media
Chinese media & social media
 

Último

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 

Último (20)

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 

Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011

  • 1. 1
  • 2. Software Protection Is Becoming Mainstream Yuan Xiang Gu Irdeto, Canada
  • 3. About Irdeto Founded in 1969 by Ir. Pieter den Toonder 1000 employees, over 500 customers Dual headquarters: Amsterdam and Beijing 25 offices around the world Part of Naspers, multinational media company 10.000 employees USD $3.7B revenue in FY10 Pay TV Solutions (CA, Middleware, Billing) Enable Broadcasters to become “Broadbanders” Content Management & Distribution for Any Screen Security Lifecycle Management for Any DeviceOver 3 billion software instances protected
  • 4. Un-Trusted Environment Reality 4 Cloud Computing Environments Un-trusted environments are everywhere and even becoming more dominated in digital world Persistent Security on un-trusted environments is becoming #1 concern Public Internet Consumer Devices & Home Networks & Internet of Things
  • 5. New Challenges to Traditional Security 5 White-Box Security Dynamic Security Security of Un-Trusted Environment
  • 6. Traditional Attacks Black Box Attack Grey Box Attack Man-In-The-Middle Attack (Indirect) Bob Alice Network Software Software Trusted Inside Box 6
  • 7. White-Box Attacks Man-At-The-End Attack Bob is the Attacker Alice Software 7 Network Software
  • 8. Just Like Security and Protection in Museum 8 Beijing’s Forbidden City suffers break-in Beijing’s Forbidden City Robbed, May 11, 2011
  • 9. Static Security vs Dynamic Security Dynamic Security Static Security Once static security breaks, the entire security is gone and hard to be restored Once dynamic security breaks, the security can be renewed and restored immediately in a planned way 9
  • 10. Fundamental to Digital Asset Protection Tampering Analysis Data Flow Transforms Control Flow Transforms Dynamic Integrity Verification White Box Crypto Stage 1a. Implement Attack Resistance Protect Digital Assets through fundamental enabling software security and services through the lifecycle Dynamic Code Decryption Dynamic Code Decryption Core Technology Defenses Stage 2. Monitor & Analyze Hacker Progress Stage 3. Deploy Counter-measures Stage 4. Respond to Attacks Stage 5. Renew Security Anti-Debug Stage 1b. Implement Attack Mitigation Software Diversity Software Diversity Attack Automation Attack Distribution Software Renewability Software Renewability Lifecycle Security Digital AssetProtection Protected Digital Asset Distributed and Consumed 10
  • 11.
  • 13.
  • 14. E-Magazine
  • 15.
  • 16. Scripted App
  • 17. Network AppAny digitalized assets to be protected

Notas del editor

  1. Apply our multi layer security to protect the Digital Asset better than any oneApply our Diversity to mitigateApply our renewability to updatesSLM , which is the category that ActiveTrust addresses is: A more dynamic model than traditional security modelsAssumes that the protection can be updated in the fieldAssumes that given enough investment by hackers, a protection solution will be crackedIt is gaining acceptance …Security requirements imposed by Studios mirror thisSome CW customers have partially implemented content protection schemes that reflect thisIt’s readily accepted when presented to prospects, influencers and owners/custodians of DA’sThis is similar to what we do in PAY-TV to protect the business model of our customers, in this case operators. In that case, we use:Smartcard or Cloaked CA, Flexi Flash technology for renewability,And Offer security services to protect our customersIn this case, we apply different technologies and protect different assets and business models but in the same manner.