Network and data security

Assured networking solutions for 24/7 data protection.

Data breach. Hackers. Stolen records. Words that not only send shivers down security officers’ spines, but also cost businesses millions of dollars and negatively impact customer trust. Today, securing networks and customer data is top of mind.

Whether supporting time-critical financial transactions, sensitive healthcare record storage, secure government communications, or simply wireless voice connections, today’s networking infrastructure operates in an environment of ever-increasing threats. Couple that with more and more applications residing in the cloud, the proliferation of diverse data centers and critical high-capacity data traveling metro, regional, and global distances, businesses need to know their data is secure 24/7.

The Big 3

Protect every bit of data with highly secure, FIPS-certified encrypted end-to- end communications across all infrastructures

Obtain unmatched performance with high-capacity, ultra-low latency, wire-speed encryption leveraging WaveLogic 3 Extreme coherent technology

Achieve 24/7 in-flight data security with always-on, protocol-agnostic optical encryption that protects today's dynamic on-demand services and cloud-based applications

What’s next

Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) will provide the next evolution in securing both the network and the in-flight data across the network.  

With SDN, various points in the cyber event chain—breach, reconnaissance, and exploitation—become both an indicator of events and a response mechanism. The flexibility and responsiveness of the network actively defends and combats denial-of-service-type attacks, especially as these attacks evolve toward cloud-type services.

Supplemental network capabilities, and sensors coupled with dynamic provisioning capabilities, open the door to an extremely resilient active defense focused at the lower layers. Additionally, the network resource allocation mix can be adjusted in accordance with the threat environment, while flow table policies can be adapted. This creates, in essence, policy-based—programmable—network defense.   

NFV is the ability to virtualize a number of network appliances (e.g., firewalls, DPI, and routers) that were previously instantiated in separate hardware platforms, and to realize these functions using generic x86-based compute hardware. By leveraging NFV, a network operator can instantly distribute and manage these virtual appliances to any location, via the network. This not only saves space, power, and hardware costs, but it also evolves service delivery and ensures consistent security levels across the enterprise.

Industry insights

The number of data security breaches rises daily, affecting businesses and government agencies with major financial, intellectual property, and time losses. Last year alone, there was a 25 percent increase in the number of records breached.

Ciena Insights

Today, the cost of a data breach cannot be ignored. New government regulations and laws are coming into effect to ensure that vulnerable and sensitive information remains protected. Fines for not securing this data in the event of a breach are steep, negatively affecting a company’s bottom line. Optical encryption can be deployed as part of a holistic security strategy to safeguard all in-flight data from unwanted intrusions, as it travels over the network across any distance.

Latest articles

More on redefining optical networks

Get the insights you want.

Subscribe to the latest news on network and data security.