SlideShare una empresa de Scribd logo
1 de 9
Introducing Adva Network Security – a trusted German
anchor
September 2022
Security expertise and transparent operations
© 2022 ADVA. All rights reserved.
2
Increasing threat level
• Increasing complexity with IoT and enterprise 5G
• Higher impact as critical operations dependent on IT
• More sensitive data outside security perimeter
• No script kiddies but highly paid, highly skilled attackers
• Market for malware, exploit kits, attack services, zero-days
• Long-lasting, multi-staged attack scenarios
Expanding attack surface
Growing sophistication
• Huge business opportunities for cybercriminals
• Nation-state actors and geopolitical turmoil
• Low risk of criminal prosecution and punishment
More aggression
Need for highly secure network devices from security-qualified suppliers
© 2022 ADVA. All rights reserved.
3
Bottom-up network security
Combined optical (L1) – Ethernet (L2) – IP (L3) encryption closes any security gap
Protects all traffic between end points
of optical connection, but not the final
hops
Optical Layer 1 encryption
Site-to-site protection, needs to be at
every site and does not protect final
hop
Ethernet Layer 2 encryption
Mainly protects end connection or
application-to-application, however,
needs to be available at every end point
IP Layer 3 protection
© 2022 ADVA. All rights reserved.
4
Our three pillars of network security
• Protecting optical, Ethernet and
IP transport solutions
• Development, certification and
integration of essential security
components
• Re-use of security modules for
speed, efficiency and
effectiveness
Security sub-systems and
security modules
Optical
transport
Packet
network
Appliance
hosting
Hardened
security
components
• Security expertise
pooled/sheltered in Germany
• Driving security lifecycle process
across R&D and services
organization
• Pragmatic processes and clear
responsibility
Ring-fenced security team as
strong trust anchor
German
trust hub
• Leveraging independent security
competences
• Close interaction with BSI,
vendor and product approvals,
certifications
• Trust by transparency
Approval/certifications from
government security bodies
Gov. security
body, e.g., BSI
Adva
Network
Security
© 2022 ADVA. All rights reserved.
5
Track record with protective network controls
2010: First 10G optical encryption using AES-256
2014: Market-first 100G optical encryption
2016: First QKD demo in live network
2021: First post-quantum safe optical transport
2022: Founded
Adva Network Security
2021: First crypto-agile
end-to-end Ethernet encryption
2018: Introducing standard-compliant key exchange interface
Secure DCI solution
with finance
The making of Adva Network Security
Encryption protects
optical infrastructure
Ethernet encryption
with finance
Secure governmental
networks
2017: BSI-approved VS-NfD 100G encryption
© 2022 ADVA. All rights reserved.
6
Market-leading
supplier of optical and
packet transport
solutions
ADVA and Adva Network Security
• Open optical transport
• Ethernet and IP networking
• Synchronization and timing
• Network management
Security advisors
Secure design
Certification,
approval
Technology, products
Security competence
• Secure transport
• Packet and optical
• VS-NfD approved and
FIPS certified
• Professional security
support
Connectivity
networks for
sensitive information
© 2022 ADVA. All rights reserved.
7
Security offering: expertise, products, services
• Security-hardened optical transport
• Ethernet demarcation devices for
secure end-to-end connections
• Standardized key exchange interfaces
• BSI-approval VS-NfD, FIPS certifications
• Approved supplier
Products
• Professional services: design, build and
operate secure connectivity networks
• Product security incident management
• Joint research and innovation projects,
such as QKD, post-quantum security
Support
FSP 3000 – BSI-approved
optical transport
FSP 150 – packet edge
for secure end-to-end
connectivity
Secure
connectivity
VS-NfD
Plan – build – operate
© 2022 ADVA. All rights reserved.
8
Adva Network Security
Security solutions made in Germany
Robust critical infrastructure, protected businesses and secure governments
“We’re bringing many years of experience in
cryptography to this new German company.
With it, we’re making optical transmission and
data networks quantum safe.”
“We founded Adva Network Security to help
enterprises, government agencies and critical
infrastructure respond appropriately to the
intensifying threat landscape.“
Michael Roth,
general manager
Josef Sißmeir,
general manager
Thank you
IMPORTANT NOTICE
ADVA is the exclusive owner or licensee of the content, material, and information in this presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited.
The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or implied. ADVA shall not be responsible for and disclaims any liability for any loss or damages, including without limitation,
direct, indirect, incidental, consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation.
Copyright © for the entire content of this presentation: ADVA.
www.advasecurity.com | info@advasecurity.com

Más contenido relacionado

La actualidad más candente

Gponfundamentals 130805074507-phpapp02
Gponfundamentals 130805074507-phpapp02Gponfundamentals 130805074507-phpapp02
Gponfundamentals 130805074507-phpapp02
morris otieno
 
001 osn 9800 m wdm series main slides 202008-v1-r19c10-mo (1) (002)
001 osn 9800 m wdm series main slides 202008-v1-r19c10-mo (1) (002)001 osn 9800 m wdm series main slides 202008-v1-r19c10-mo (1) (002)
001 osn 9800 m wdm series main slides 202008-v1-r19c10-mo (1) (002)
victoriovega
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPT
omar awad
 

La actualidad más candente (20)

Advanced ClearPass Workshop
Advanced ClearPass WorkshopAdvanced ClearPass Workshop
Advanced ClearPass Workshop
 
Opti x osn 1800 brochure
Opti x osn 1800 brochureOpti x osn 1800 brochure
Opti x osn 1800 brochure
 
Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)
 
Building the SD-Branch using uCPE
Building the SD-Branch using uCPEBuilding the SD-Branch using uCPE
Building the SD-Branch using uCPE
 
Gponfundamentals 130805074507-phpapp02
Gponfundamentals 130805074507-phpapp02Gponfundamentals 130805074507-phpapp02
Gponfundamentals 130805074507-phpapp02
 
Fortinet_ProductGuide_NOV2021_R127.pdf
Fortinet_ProductGuide_NOV2021_R127.pdfFortinet_ProductGuide_NOV2021_R127.pdf
Fortinet_ProductGuide_NOV2021_R127.pdf
 
IIJmio meeting 7 MVNOとSIMフリー端末の問題について
IIJmio meeting 7 MVNOとSIMフリー端末の問題についてIIJmio meeting 7 MVNOとSIMフリー端末の問題について
IIJmio meeting 7 MVNOとSIMフリー端末の問題について
 
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
 
AIRCOM LTE Webinar 4 - LTE Coverage
AIRCOM LTE Webinar 4 - LTE CoverageAIRCOM LTE Webinar 4 - LTE Coverage
AIRCOM LTE Webinar 4 - LTE Coverage
 
ClearPass Overview
ClearPass OverviewClearPass Overview
ClearPass Overview
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
 
IIJmio meeting 19 IIJ フルMVNO徹底解説
IIJmio meeting 19 IIJ フルMVNO徹底解説IIJmio meeting 19 IIJ フルMVNO徹底解説
IIJmio meeting 19 IIJ フルMVNO徹底解説
 
FortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptxFortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptx
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
SD-WAN 2.0: Building a Better SD-WAN
SD-WAN 2.0: Building a Better SD-WANSD-WAN 2.0: Building a Better SD-WAN
SD-WAN 2.0: Building a Better SD-WAN
 
これだけは知っておきたい5Gのキホン - 5Gビジネスに必要な基礎知識
これだけは知っておきたい5Gのキホン - 5Gビジネスに必要な基礎知識これだけは知っておきたい5Gのキホン - 5Gビジネスに必要な基礎知識
これだけは知っておきたい5Gのキホン - 5Gビジネスに必要な基礎知識
 
001 osn 9800 m wdm series main slides 202008-v1-r19c10-mo (1) (002)
001 osn 9800 m wdm series main slides 202008-v1-r19c10-mo (1) (002)001 osn 9800 m wdm series main slides 202008-v1-r19c10-mo (1) (002)
001 osn 9800 m wdm series main slides 202008-v1-r19c10-mo (1) (002)
 
IIJmio meeting 17 DSDSと着信シーケンスについて
IIJmio meeting 17 DSDSと着信シーケンスについてIIJmio meeting 17 DSDSと着信シーケンスについて
IIJmio meeting 17 DSDSと着信シーケンスについて
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPT
 
IIJmio meeting 27 5G NSAについて
IIJmio meeting 27 5G NSAについてIIJmio meeting 27 5G NSAについて
IIJmio meeting 27 5G NSAについて
 

Similar a Introducing Adva Network Security – a trusted German anchor

Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
ArianeSpano
 
Cisco Industrial Wireless
Cisco Industrial WirelessCisco Industrial Wireless
Cisco Industrial Wireless
Cisco Russia
 

Similar a Introducing Adva Network Security – a trusted German anchor (20)

Industrial IoT summit_andresg_guilarte Siemens
Industrial IoT summit_andresg_guilarte Siemens Industrial IoT summit_andresg_guilarte Siemens
Industrial IoT summit_andresg_guilarte Siemens
 
Security and services drive data north
Security and services drive data northSecurity and services drive data north
Security and services drive data north
 
CDE Marketplace: SQR Systems
CDE Marketplace: SQR SystemsCDE Marketplace: SQR Systems
CDE Marketplace: SQR Systems
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...
 
SP 5G: Unified Enablement Platform
SP 5G: Unified Enablement Platform  SP 5G: Unified Enablement Platform
SP 5G: Unified Enablement Platform
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
 
Vizocom Company Overview
Vizocom Company OverviewVizocom Company Overview
Vizocom Company Overview
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
The Relevance of IoT and 5G for Multicloud - Vodafone and IBM join Forces
The Relevance of IoT and 5G for Multicloud - Vodafone and IBM join ForcesThe Relevance of IoT and 5G for Multicloud - Vodafone and IBM join Forces
The Relevance of IoT and 5G for Multicloud - Vodafone and IBM join Forces
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
NAGRA KUDELSKI - Overview and Analysis
NAGRA KUDELSKI - Overview and AnalysisNAGRA KUDELSKI - Overview and Analysis
NAGRA KUDELSKI - Overview and Analysis
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network Layer
 
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
2015 Identity Summit - The Identity Broker as Driver for Growth
2015 Identity Summit - The Identity Broker as Driver for Growth2015 Identity Summit - The Identity Broker as Driver for Growth
2015 Identity Summit - The Identity Broker as Driver for Growth
 
Cisco Industrial Wireless
Cisco Industrial WirelessCisco Industrial Wireless
Cisco Industrial Wireless
 
Ministry of Foreign Affairs
Ministry of Foreign AffairsMinistry of Foreign Affairs
Ministry of Foreign Affairs
 
Value Journal - October 2020
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
 

Más de ADVA

Más de ADVA (20)

Industrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clockIndustrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clock
 
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
 
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350  SePRC™ optical cesium clockIndustry's longest holdover with the OSA 3350  SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
 
Addressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructureAddressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructure
 
Precise and assured timing for enterprise networks
Precise and assured timing for enterprise networksPrecise and assured timing for enterprise networks
Precise and assured timing for enterprise networks
 
Introducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demandIntroducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demand
 
Sync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with softwareSync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with software
 
Quantum threat: How to protect your optical network
Quantum threat: How to protect your optical networkQuantum threat: How to protect your optical network
Quantum threat: How to protect your optical network
 
Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...
 
Open optical edge connecting mobile access networks
Open optical edge connecting mobile access networksOpen optical edge connecting mobile access networks
Open optical edge connecting mobile access networks
 
Meet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation deviceMeet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation device
 
Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™
 
10G edge technology for outdoor environments
10G edge technology for outdoor environments10G edge technology for outdoor environments
10G edge technology for outdoor environments
 
The quantum age - secure transport networks
The quantum age - secure transport networksThe quantum age - secure transport networks
The quantum age - secure transport networks
 
From leased lines to optical spectrum services
From leased lines to optical spectrum servicesFrom leased lines to optical spectrum services
From leased lines to optical spectrum services
 
The coherent optical edge
The coherent optical edgeThe coherent optical edge
The coherent optical edge
 
Get your timing right for 5G OpenRAN!
Get your timing right for 5G OpenRAN!Get your timing right for 5G OpenRAN!
Get your timing right for 5G OpenRAN!
 
Introducing the market's first high-performance optical cesium clock
Introducing the market's first high-performance optical cesium clockIntroducing the market's first high-performance optical cesium clock
Introducing the market's first high-performance optical cesium clock
 
Best practices in synchronizing IP-based packet broadcast networks
Best practices in synchronizing IP-based packet broadcast networksBest practices in synchronizing IP-based packet broadcast networks
Best practices in synchronizing IP-based packet broadcast networks
 
Achieving resilient and assured PNT in secure information networks
Achieving resilient and assured PNT in secure information networksAchieving resilient and assured PNT in secure information networks
Achieving resilient and assured PNT in secure information networks
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Introducing Adva Network Security – a trusted German anchor

  • 1. Introducing Adva Network Security – a trusted German anchor September 2022 Security expertise and transparent operations
  • 2. © 2022 ADVA. All rights reserved. 2 Increasing threat level • Increasing complexity with IoT and enterprise 5G • Higher impact as critical operations dependent on IT • More sensitive data outside security perimeter • No script kiddies but highly paid, highly skilled attackers • Market for malware, exploit kits, attack services, zero-days • Long-lasting, multi-staged attack scenarios Expanding attack surface Growing sophistication • Huge business opportunities for cybercriminals • Nation-state actors and geopolitical turmoil • Low risk of criminal prosecution and punishment More aggression Need for highly secure network devices from security-qualified suppliers
  • 3. © 2022 ADVA. All rights reserved. 3 Bottom-up network security Combined optical (L1) – Ethernet (L2) – IP (L3) encryption closes any security gap Protects all traffic between end points of optical connection, but not the final hops Optical Layer 1 encryption Site-to-site protection, needs to be at every site and does not protect final hop Ethernet Layer 2 encryption Mainly protects end connection or application-to-application, however, needs to be available at every end point IP Layer 3 protection
  • 4. © 2022 ADVA. All rights reserved. 4 Our three pillars of network security • Protecting optical, Ethernet and IP transport solutions • Development, certification and integration of essential security components • Re-use of security modules for speed, efficiency and effectiveness Security sub-systems and security modules Optical transport Packet network Appliance hosting Hardened security components • Security expertise pooled/sheltered in Germany • Driving security lifecycle process across R&D and services organization • Pragmatic processes and clear responsibility Ring-fenced security team as strong trust anchor German trust hub • Leveraging independent security competences • Close interaction with BSI, vendor and product approvals, certifications • Trust by transparency Approval/certifications from government security bodies Gov. security body, e.g., BSI Adva Network Security
  • 5. © 2022 ADVA. All rights reserved. 5 Track record with protective network controls 2010: First 10G optical encryption using AES-256 2014: Market-first 100G optical encryption 2016: First QKD demo in live network 2021: First post-quantum safe optical transport 2022: Founded Adva Network Security 2021: First crypto-agile end-to-end Ethernet encryption 2018: Introducing standard-compliant key exchange interface Secure DCI solution with finance The making of Adva Network Security Encryption protects optical infrastructure Ethernet encryption with finance Secure governmental networks 2017: BSI-approved VS-NfD 100G encryption
  • 6. © 2022 ADVA. All rights reserved. 6 Market-leading supplier of optical and packet transport solutions ADVA and Adva Network Security • Open optical transport • Ethernet and IP networking • Synchronization and timing • Network management Security advisors Secure design Certification, approval Technology, products Security competence • Secure transport • Packet and optical • VS-NfD approved and FIPS certified • Professional security support Connectivity networks for sensitive information
  • 7. © 2022 ADVA. All rights reserved. 7 Security offering: expertise, products, services • Security-hardened optical transport • Ethernet demarcation devices for secure end-to-end connections • Standardized key exchange interfaces • BSI-approval VS-NfD, FIPS certifications • Approved supplier Products • Professional services: design, build and operate secure connectivity networks • Product security incident management • Joint research and innovation projects, such as QKD, post-quantum security Support FSP 3000 – BSI-approved optical transport FSP 150 – packet edge for secure end-to-end connectivity Secure connectivity VS-NfD Plan – build – operate
  • 8. © 2022 ADVA. All rights reserved. 8 Adva Network Security Security solutions made in Germany Robust critical infrastructure, protected businesses and secure governments “We’re bringing many years of experience in cryptography to this new German company. With it, we’re making optical transmission and data networks quantum safe.” “We founded Adva Network Security to help enterprises, government agencies and critical infrastructure respond appropriately to the intensifying threat landscape.“ Michael Roth, general manager Josef Sißmeir, general manager
  • 9. Thank you IMPORTANT NOTICE ADVA is the exclusive owner or licensee of the content, material, and information in this presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited. The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or implied. ADVA shall not be responsible for and disclaims any liability for any loss or damages, including without limitation, direct, indirect, incidental, consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation. Copyright © for the entire content of this presentation: ADVA. www.advasecurity.com | info@advasecurity.com