SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
ubique
TECHNOLOGIES
©UBIQUETechnologiesGmbH www.ubique-technologies.de
Astableonlineaccessistantamountforthecaptainandcrew,notonlyforretrievalofcurrentdata,butalsoasa
communicationchannelwithhomeandforrecreationalactivities.Ifprivatelaptopsorsmartdevicesareconnectedtothe
ship’snetwork,keyonboardsystemscouldbeaffected.Privatebrowsingortheuseofbandwidth-intensiveapplications
suchasmultimediastreamingorvideochatscanexhaustsatellitelinksquickly,causingcoststoskyrocket.
InfrastructureSecurityandCostcontrol
SecureSolutionsforasecurebusiness
ThemanipulationorfailureofanITorcommunicationsnetworkonboardcanhavefatalconsequences,fromcostlydelays
tomanipulationofon-boardsystemsorcargosoftwaretohazardsfortheshipandcrew.
AdistinguishedCyberSecurityspecialistsince2011,UBIQUE Technologiesoffersworldwideprotectionfordigital
infrastructuresagainstmanipulation,infiltrationandIT-relatedmalfunctions.WithCyberSecurityCommandCenters,
mannedaroundtheclockinitsowndatacentersinGermany,UBIQUETechnologiesstandsfortheimmediatedefense
againstdigitalattacksaswellastargetedinitiationofappropriatecountermeasurestoprotectdigitalandphysicalvalues.
TToday’sshipsusemoreinformationtechnologythanamedium-sizedcompany.Inaddition,thedemandsonseaworthy
hardwaresystemsaremuchhigherthanfornormalhardwaresystems:roughseas,highhumidityandlimitedspacerequire
robustandreliableinfrastructuresystems.Atthesametime,thepotentialrisksandassociatedcostsofafunctionalfailure
oftheonboardITsystembyfarexceedwhatsystemsdesignedfornormalusearecapableofhandling.
DesigninganIT-Protectionsystem tailoredtotheneedsofmoderncommercialshippingrequiresthatsuchfactorsas
acquisitionacquisitionandoperatingcosts,globalavailabilityofpartsandaglobalservicestructurebeconsideredaswellasthefeasi-
bilityofconnectionquality,bandwidthandtheoverallcostsofoperatingthetechnologiesusedineachcase.
©UBIQUETechnologiesGmbH www.ubique-technologies.de
Thefirststepstobetakeninordertoincreasenetworksecurityonboardaretocreateseparatenetworksfortheintra-and
inter-shipcommunicationsandcrewusageaswellasintegratingvarioussecurityfiltersinthedatastream.
Theseparationofindividualnetworksectorsservestosimplifynetworkmanagementandimplementcostcontroloftheser-
vicesprovided,aswellasgreatlyenhancingsecurity.
Thetoken-basedInternetaccesssystem enablescompliancewithlegalprivacyrequirementsandprotectsthenetwork
operator,inthiscasetheshipowners,fromliabilityclaimsbyindividualcrewmemberswithoutthenecessityofrestricting
internetusage.TheDualControlprinciplefacilitateslegallycompliantstorageofstoredlogdatawhichcanlaterbeanaly-
zed,ifrequired.
Accesscontrolalsoallowsapersonalorgroup-basedbandwidthallocationandcanprioritizeorblockinternetorapplication
accessonthebasisofoperationalplans.
Thecontentfilteremployedprotectsagainsttheunlawfuluseoftheinternetconnectionbycrewmembersandcanbe
tailoredtomeetthelegalrequirementsofthevariousportsofcallorcountriesatanytime.Atthesametime,downloads
containingmalwareorotherhazardouscontentsarecaughtanddisabled.
GeneraluseofaFleetBroadband(FBB)connectionismoreexpensivethanthecostofasatellitelink(VSAT)link.Incase
ofaVSATconnectionfailure,onlytheoperationalandsecurity-relatedservices,vitaltotheship’soperation,shouldbe
transferredtotheFBBsothattheyremainavailable.
AlthoughAlthoughnon-criticalservices,suchassurfingtheinternet,arenownolongeravailabletothecrew,thesefunctionscanstill
beusedbygroupsofspecificallydefinedcrewmembersontheFBB.Inaddition,personalizedinternetandapplication
accesscanbelimited,eitherconnection-dependentorbyvolumeortime,extendingthesystem’scapabilitiestoensureop-
timumcostcontrol.
Theallocationofdefinedbandwidths,eitherfixedorpercentage-wise,fordefinedapplications,links,individualsorgroups
provideseachwiththeoptimalavailabilityofimportantsystemsandinformationsources.
Networkseparation/Networkdivision
Accesscontrol
InternetFilter
ServiceorientedFailover
InfrastructureSecurityandCostcontrol
©UBIQUETechnologiesGmbH www.ubique-technologies.de
State-of-the-artencryptiontechnologiesareusedtoprotectwirelessnetworks(Wi-Fi);however,itisonlyamatteroftime
beforeanintrusionintoaWLANissuccessful.Thatiswhywehaveaddedanactiveandtamper-freenetworkaccess
control(NAC)tooursecuritysystem.
This additionallayerofprotection continuously scans allnetwork activity withoutburdening the network itself.
Shouldanattackergainillegalaccesstoanetworksegment,hewillbeidentifiedwithinmillisecondsandany
communicationbetweentheattacker’ssystemandtheinternalsystemisprevented.
JustJustasthefirewallitselfincludesallthenecessaryprotectivefunctionstopreventagainstcontaminationovertheIP,the
NACnotonlyscansallinternalnetworktraffictounknownsystems,butalsochecksfornetworkcommunicationinconsis-
tenciesaswellasmonitoringallconnectedsystemsforvulnerabilities.
Thesystemrecordsallsecuritybreachestoatamper-proofdatabasewhichispassedontothecontrolroomwhereitcan
bepursuedfurtherincompliancereportsandprocess-drivenworkflows,asnecessary.
ApplicationContainmentprovidesanotherimportantlayerofsecurityforhighlysensitiveapplications.Acontainerized
applicationrunswithinacontainerapplicationandeveryapplicationinterfaceismonitored.
Thisprotectstheapplicationitselfaswellasalldatainputagainstmanipulationandanyunlawfuldatatap.Evenkeystrokes
themselvesare encrypted before being passed on to the protected application within the containerapplication.
Containerizationmakesitpossiblenotonlytorunsafeapplicationsinuncertainenvironments,buttoalsoexecuteunsecu-
redapplicationsinsecureenvironments.
NetworkAccessControl
VulnerabilityManagementandReporting
ApplicationContainment
InfrastructureSecurityandCostcontrol
©UBIQUETechnologiesGmbH www.ubique-technologies.de
Theadministratingemployeesareauthenticatedthroughatokensystem.Thecentralmanagementinterfaceallowsthem
accessonlytothefunctionsforwhichtheyhavebeenauthorized.Thisenablesagranularimplementationoftheseparation
offunctionsbetweenthevariousadministrativetasks.
Inordertominimizethebandwidthloadasmuchaspossible,thetransmissionofloginformationandreportscanbe
granularlygranularlycontrolledandtimed.Thetransmissionitselfcanbeswitchedfromthecurrentpushmethod,wheretheindividual
applicationsautomaticallypasstheirinformationtoheadquarters,tothepullmethod,wherethecentrallogandreporting
serveractivelyretrievestheapplianceinformation.
Thisalsoappliestochangesinrules.Thesystem rulechangescaneitherbeexecuteddirectlyorthroughthecentral
controlcenter.Theyarethensynchronizedagainsteachotherandonbothsides–inthedatacenterandontheindividual
applianceonboard–sothatuniformrulesareavailable.
ThisThismakesitpossibletosetuprulescentrallyand,aftercentralclearance,pushthem totheconnectedapplianceson
boardandactivatethem.
Accesscontrolandseparationoffunctions
PullundPush
Responsibilityforthemanagementoftheprotectionsystemisallocatedtoacentrallocation,
eithertheheadquartersoftheshippingcompany,orUBIQUETechnologies’datacenterinGermany,
Centrallymanaged,optimalSecurity
©UBIQUETechnologiesGmbH www.ubique-technologies.de
Incaseitbecomesnecessarytoexchangetheentiresystem,thecentralofficecan„refuel“thereplacementdevices
remotelyandguideacrewmemberduringtheimplementation.Theglobaluseofthesesystemsensuresthatexchange
systemscanbeprocuredandbroughtonboardfrommostnearbyports.
Wehighlyrecommendtheuseofacluster,inwhich2identicaldevicesacttogether,asthefailureofonesystemcanbe
compensatedbythesecondsystemuntilthereplacementbecomesavailable.
UsageUsageReportsserveasproofofsystemusagebyindividuals,systemsandapplicationsandshowtheentiredatatransfer
history.Asidefromtheresultingplanningsecurity,itispossibletodrawconclusionsandalsodoaforensicevaluationof
thesystem’ssecurity.
Usetheexistingreporttemplatesortheoptionofdefiningyourownreports,togeneratecompliancereportsonsystemse-
curity,configurationandusageinjustminutes.
.
Systemexchange
UsageandComplianceReports
Centrallymanaged,optimalSecurity
©UBIQUETechnologiesGmbH www.ubique-technologies.de
Often,inadditiontorequiringusernameandpassword,applicationandsystem accesscanbelimitedtoasingle,
accessingIPaddresswhichfurtherreinforcessystemprotection.
UBIQUETechnologies‘centralVPN-Fixed-IPServicemakestheuseofafixedIPintheauthenticationprocesspossible,
withoutlosingtheconvenienceofwidespreadorevenmobileaccesses.
EmployeesandserviceproviderscansetuptheirVPNinourdatacenterasusual,fromheadquartersorontheroad,using
theirlaptops,andcanaccessthesystemstobeadministeredthroughthat.
EmployeeEmployeeaccessissecuredthroughtheuseofatokensystem.Thepasswordsusedtologinareclearlydefinedand
updatedina30-60secondcycle.
Eachemployeeentershisusername,knownonlytohimself,andthepasswordprovidedviaahardorsofttoken,togain
accesstothecentralaccesspointwherehethenauthenticateshisidentity.
CentrallysecuredaccesseswithfixedIPaddresses
©UBIQUETechnologiesGmbH www.ubique-technologies.de
WiththeintroductionofVoIP,theproblem ofachievingtap-proofcommunicationschannelswasoftentransferredtothe
VoIPtelecommunicationssystembeingused.Widespreadimplementationofthispracticehasgeneratedincreasedattacks
onthevulnerabilitieswithintheprotocolitself,inparticular,targetingtheclientsystemsinuse.
WithAdhocVoIP-Encryption,wemaketheencryptionofvoicecommunicationpossibleinanend-to-endprocessandby
removingtheunknownvariableintheoperatingsystem,whetheritisalaptoporapersonalcomputer,fromtheequation.
InInordertominimizethetarget,thesystem encryptsthevoicepacketbeforeitleavestheclientcomputeranddecrypts
incomingvoicepacketsafterthesehaveleftthePCusedtosendthem.Thisprocessismadepossiblethroughtheuseof
aspecialUSB hardwaresystem inwhichahardware-basedencryptionisemployedwhichallowsasecureand
certificate-basedauthenticationofthecommunicationspartner.
UsingacommerciallyavailableUSBheadsetorasimpleUSBdeskphonesystemissufficient.
AdhocVoIP-Encryption
EncryptedVoiceCommunication
©UBIQUETechnologiesGmbH www.ubique-technologies.de
FleetinternatVoIP-Encryption
Forfleetinternalencryptedvoicecommunicationweuseanencryptingappliancethatcanbeplacedinorganizations
headquarterandneedstogetconnectedinfrontoftheexitingPBX.
AsanoptionPBXandVoIP-Encryption-AppiancecanbeplacedinoneofourGermanDatacenter.
AfteractivationoftheserviceencryptedVoIP-Callswillbeavailablebetweenthecorporatesheadquarter,vesselsand
singlepersons.Ineverycasewegrantthatinfrontoftheconnectiontheuseddeviceswillgetauthenticatedandthatalso
thehandshake-infrontoftheestablishingofancommunicationchannel–willbeinitiallycrypted.
Fortheusageofthisserviceeverysmartdevice,PCorFortheusageofthisserviceeverysmartdevice,PCorVoIP-enableddevicecangetused.
EncryptedVoiceCommunication
©UBIQUETechnologiesGmbH www.ubique-technologies.de
EncryptedEmailCommunication&DataTransfer
Currentencryptionmethodsforemailcommunicationareusuallybasedononeoftwostandards:PGPorS/Mime.These
standardsaredesignedtoensuresecureend-to-endencryptionandwhenproperlyapplied,bothstandardsmeetthe
highestsafetyrequirements.
Unfortunately,bothmethodsrequirethattheclientsystemsusedarecleanandfreeofspywareormalwaresuchas
RootkitsorTrojans.Basedonourexperiencesandthoseofourparentcompany,wemustalwaysassumethatnosystem
istrustworthy.
TheThesystem weprovideforthesecureexchangeofemailmessagesisthereforebasedonadedicatedcommunications
server,wherepartnerscanexchangesecurecommunicationsandtheencryptedinformationisuploadedtotheindividual
emailclientonlyifneeded.
Inaddition,thesystemprovidedissupportedbyboththePGPundS/Mimestandards.
EncryptedEmailCommunication
©UBIQUETechnologiesGmbH www.ubique-technologies.de
TECHNOLOGIES
ubique
AdistinguishedCyberSecurityspecialistsince2011,UBIQUETechnologiesoffersworldwideprotectionfordigital
infrastructuresagainstmanipulation,infiltrationandIT-relatedmalfunctions.WithCyberSecurityCommand
Centers,mannedaroundtheclockinitsowndatacentersinGermany,UBIQUETechnologiesstandsfortheimme-
diatedefenseagainstdigitalattacksaswellastargetedinitiationofappropriatecountermeasurestoprotectdigital
andphysicalvalues.
UBIQUETechnologiesGmbH
ChristianNowitzki,Geschäftsführer
UBIQUETechnologiesGmbH
Economic success is created through entrepreneurial
thinkingandaction.Appropriateriskmanagementensures
successaswellasmakingeconomicriskspredictable.
Becausewespecializeintheprotectionofdigitalinfra-
structures,wecanensurethesecurityofyourcompanyand
theprotectionofyourinformationandassets.
UBIQUETechnologiesGmbH
Mühlstraße50
63762Großostheim
Germany
Telefon:+49(6093)3699990
www.ubique-technologies.dekontakt@ubique-technologies.de
ubique
TECHNOLOGIES
securesolutionsforasecurebusiness

Más contenido relacionado

La actualidad más candente

Reinhard Posch
Reinhard PoschReinhard Posch
Reinhard Posch
Tecnimap
 
Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell GoodmanCloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell Goodman
jonneiditz
 

La actualidad más candente (7)

AASTMT Case Study
AASTMT Case StudyAASTMT Case Study
AASTMT Case Study
 
Proyecto Final (IoT, Cloud Computing, Domotica)
Proyecto Final (IoT, Cloud Computing, Domotica)Proyecto Final (IoT, Cloud Computing, Domotica)
Proyecto Final (IoT, Cloud Computing, Domotica)
 
Presentacion final inf103
Presentacion final   inf103Presentacion final   inf103
Presentacion final inf103
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agenda
 
Reinhard Posch
Reinhard PoschReinhard Posch
Reinhard Posch
 
Living In a World of Data Exploitation - CPDP 2017
Living In a World of Data Exploitation - CPDP 2017Living In a World of Data Exploitation - CPDP 2017
Living In a World of Data Exploitation - CPDP 2017
 
Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell GoodmanCloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell Goodman
 

Destacado

Power point on linux commands,appache,php,mysql,html,css,web 2.0
Power point on linux commands,appache,php,mysql,html,css,web 2.0Power point on linux commands,appache,php,mysql,html,css,web 2.0
Power point on linux commands,appache,php,mysql,html,css,web 2.0
venkatakrishnan k
 
Overcoming challenges relating to operational implementation
Overcoming challenges relating to operational implementationOvercoming challenges relating to operational implementation
Overcoming challenges relating to operational implementation
saamali
 
Tablets: Evolving from Personal to Business By Elaine B. Coleman, Desirée Dav...
Tablets: Evolving from Personal to Business By Elaine B. Coleman, Desirée Dav...Tablets: Evolving from Personal to Business By Elaine B. Coleman, Desirée Dav...
Tablets: Evolving from Personal to Business By Elaine B. Coleman, Desirée Dav...
ElainebColeman
 
28noviembre1970
28noviembre197028noviembre1970
28noviembre1970
VESCELIA
 
Plantilla con-normas-icontec (4)
Plantilla con-normas-icontec (4)Plantilla con-normas-icontec (4)
Plantilla con-normas-icontec (4)
Juan Ossa
 
I Sistemi di scambio non monetari
I Sistemi di scambio non monetariI Sistemi di scambio non monetari
I Sistemi di scambio non monetari
IFLab
 
Functional analysis aiesec in spain 1213
Functional analysis aiesec  in spain 1213Functional analysis aiesec  in spain 1213
Functional analysis aiesec in spain 1213
Jeesoo
 
Parques Nacionales de Canarias
Parques Nacionales de CanariasParques Nacionales de Canarias
Parques Nacionales de Canarias
albahm
 

Destacado (20)

Algoritmos
AlgoritmosAlgoritmos
Algoritmos
 
Power point on linux commands,appache,php,mysql,html,css,web 2.0
Power point on linux commands,appache,php,mysql,html,css,web 2.0Power point on linux commands,appache,php,mysql,html,css,web 2.0
Power point on linux commands,appache,php,mysql,html,css,web 2.0
 
Overcoming challenges relating to operational implementation
Overcoming challenges relating to operational implementationOvercoming challenges relating to operational implementation
Overcoming challenges relating to operational implementation
 
Tablets: Evolving from Personal to Business By Elaine B. Coleman, Desirée Dav...
Tablets: Evolving from Personal to Business By Elaine B. Coleman, Desirée Dav...Tablets: Evolving from Personal to Business By Elaine B. Coleman, Desirée Dav...
Tablets: Evolving from Personal to Business By Elaine B. Coleman, Desirée Dav...
 
Final Nacional Premio EmprendedorXXI 2009
Final Nacional Premio EmprendedorXXI 2009Final Nacional Premio EmprendedorXXI 2009
Final Nacional Premio EmprendedorXXI 2009
 
EPSILON'S ENTERPRISE CONNECT SERVICES: TURNING PAIN POINTS INTO PROFITABILITY
EPSILON'S ENTERPRISE CONNECT SERVICES: TURNING PAIN POINTS INTO PROFITABILITYEPSILON'S ENTERPRISE CONNECT SERVICES: TURNING PAIN POINTS INTO PROFITABILITY
EPSILON'S ENTERPRISE CONNECT SERVICES: TURNING PAIN POINTS INTO PROFITABILITY
 
Programa Conjunto: Justicia, Seguridad, Comunidad y Desarrollo Económico
Programa Conjunto: Justicia, Seguridad, Comunidad y Desarrollo EconómicoPrograma Conjunto: Justicia, Seguridad, Comunidad y Desarrollo Económico
Programa Conjunto: Justicia, Seguridad, Comunidad y Desarrollo Económico
 
Tweets und Aktienkurse? Wertvolle Erkenntnisse durch Data Blending gewinnen
Tweets und Aktienkurse? Wertvolle Erkenntnisse durch Data Blending gewinnenTweets und Aktienkurse? Wertvolle Erkenntnisse durch Data Blending gewinnen
Tweets und Aktienkurse? Wertvolle Erkenntnisse durch Data Blending gewinnen
 
Dossier Avalon Red
Dossier Avalon RedDossier Avalon Red
Dossier Avalon Red
 
28noviembre1970
28noviembre197028noviembre1970
28noviembre1970
 
Programa dia de_la_persona_emprendedora_2011_aragon
Programa dia de_la_persona_emprendedora_2011_aragonPrograma dia de_la_persona_emprendedora_2011_aragon
Programa dia de_la_persona_emprendedora_2011_aragon
 
Rauchgasentstickung | weyer spezial
Rauchgasentstickung | weyer spezialRauchgasentstickung | weyer spezial
Rauchgasentstickung | weyer spezial
 
Aplicacion de nuevas tecnologias Internet
Aplicacion de nuevas tecnologias Internet Aplicacion de nuevas tecnologias Internet
Aplicacion de nuevas tecnologias Internet
 
Drum Cafe
Drum CafeDrum Cafe
Drum Cafe
 
Plantilla con-normas-icontec (4)
Plantilla con-normas-icontec (4)Plantilla con-normas-icontec (4)
Plantilla con-normas-icontec (4)
 
I Sistemi di scambio non monetari
I Sistemi di scambio non monetariI Sistemi di scambio non monetari
I Sistemi di scambio non monetari
 
Functional analysis aiesec in spain 1213
Functional analysis aiesec  in spain 1213Functional analysis aiesec  in spain 1213
Functional analysis aiesec in spain 1213
 
Spirent TestCenter Virtual on OracleVM
Spirent TestCenter Virtual on OracleVMSpirent TestCenter Virtual on OracleVM
Spirent TestCenter Virtual on OracleVM
 
Parques Nacionales de Canarias
Parques Nacionales de CanariasParques Nacionales de Canarias
Parques Nacionales de Canarias
 
Hidrogeología básica de la Península de Yucatán
Hidrogeología básica de la Península de YucatánHidrogeología básica de la Península de Yucatán
Hidrogeología básica de la Península de Yucatán
 

Similar a Managed-Defence-on-Vessels_en

Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotes
Studying
 
Massive Data Collection
Massive Data CollectionMassive Data Collection
Massive Data Collection
Leandro Agro'
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
Samuel Kamuli
 
WmScammell--CDX-Chi-D1-p1
 WmScammell--CDX-Chi-D1-p1 WmScammell--CDX-Chi-D1-p1
WmScammell--CDX-Chi-D1-p1
William Scammell
 

Similar a Managed-Defence-on-Vessels_en (20)

Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotes
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture
 
Leandro Agrò
Leandro AgròLeandro Agrò
Leandro Agrò
 
Massive Data Collection
Massive Data CollectionMassive Data Collection
Massive Data Collection
 
Insecure mag-19
Insecure mag-19Insecure mag-19
Insecure mag-19
 
CABA Whitepaper - Cybersecurity in Smart Buildings
CABA Whitepaper - Cybersecurity in Smart BuildingsCABA Whitepaper - Cybersecurity in Smart Buildings
CABA Whitepaper - Cybersecurity in Smart Buildings
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
presentation-2022.pptx
presentation-2022.pptxpresentation-2022.pptx
presentation-2022.pptx
 
Securing 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and VirtualizationSecuring 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and Virtualization
 
DVCOM
DVCOMDVCOM
DVCOM
 
DVCOM
DVCOMDVCOM
DVCOM
 
IoT digest. March 2018
IoT digest. March 2018IoT digest. March 2018
IoT digest. March 2018
 
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
 
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and FirewallGuardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
 
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
 
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
 
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
 
WmScammell--CDX-Chi-D1-p1
 WmScammell--CDX-Chi-D1-p1 WmScammell--CDX-Chi-D1-p1
WmScammell--CDX-Chi-D1-p1
 
21 Innovative IoT Products To Watch at Hannover Messe 2017
21 Innovative IoT Products To Watch at Hannover Messe 201721 Innovative IoT Products To Watch at Hannover Messe 2017
21 Innovative IoT Products To Watch at Hannover Messe 2017
 
Bretagne at Mobile World Congress 2015
Bretagne at Mobile World Congress 2015Bretagne at Mobile World Congress 2015
Bretagne at Mobile World Congress 2015
 

Managed-Defence-on-Vessels_en