Data breach. Hackers. Stolen records. Words that not only send shivers down security officers’ spines, but also cost businesses millions of dollars and negatively impact customer trust. Today, securing networks and customer data is top of mind.
Whether supporting time-critical financial transactions, sensitive healthcare record storage, secure government communications, or simply wireless voice connections, today’s networking infrastructure operates in an environment of ever-increasing threats. Couple that with more and more applications residing in the cloud, the proliferation of diverse data centers and critical high-capacity data traveling metro, regional, and global distances, businesses need to know their data is secure 24/7.
Protect every bit of data with highly secure, FIPS-certified encrypted end-to- end communications across all infrastructures
Obtain unmatched performance with high-capacity, ultra-low latency, wire-speed encryption leveraging WaveLogic 3 Extreme coherent technology
Achieve 24/7 in-flight data security with always-on, protocol-agnostic optical encryption that protects today's dynamic on-demand services and cloud-based applications
Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) will provide the next evolution in securing both the network and the in-flight data across the network.
With SDN, various points in the cyber event chain—breach, reconnaissance, and exploitation—become both an indicator of events and a response mechanism. The flexibility and responsiveness of the network actively defends and combats denial-of-service-type attacks, especially as these attacks evolve toward cloud-type services.
Supplemental network capabilities, and sensors coupled with dynamic provisioning capabilities, open the door to an extremely resilient active defense focused at the lower layers. Additionally, the network resource allocation mix can be adjusted in accordance with the threat environment, while flow table policies can be adapted. This creates, in essence, policy-based—programmable—network defense.
NFV is the ability to virtualize a number of network appliances (e.g., firewalls, DPI, and routers) that were previously instantiated in separate hardware platforms, and to realize these functions using generic x86-based compute hardware. By leveraging NFV, a network operator can instantly distribute and manage these virtual appliances to any location, via the network. This not only saves space, power, and hardware costs, but it also evolves service delivery and ensures consistent security levels across the enterprise.
The number of data security breaches rises daily, affecting businesses and government agencies with major financial, intellectual property, and time losses. Last year alone, there was a 25 percent increase in the number of records breached.
Today, the cost of a data breach cannot be ignored. New government regulations and laws are coming into effect to ensure that vulnerable and sensitive information remains protected. Fines for not securing this data in the event of a breach are steep, negatively affecting a company’s bottom line. Optical encryption can be deployed as part of a holistic security strategy to safeguard all in-flight data from unwanted intrusions, as it travels over the network across any distance.
Our new Ciena WaveLogic Ai coherent chipset has been generating a lot of excitement and interest from our customers. Ciena's Helen Xenos gives answers to their four most common questions.
WDM is a technique in fiber optic transmission that enables the use of multiple light wavelengths (or colors) to send data over the same medium. Two or more colors of light can travel on one fiber and several signals can be transmitted in an optical ...
Submarine cables deployed on ocean floors around the world carry nearly 100 percent of the world’s intercontinental electronic communications traffic. So the data that moves on those cables is incredibly important. The so-called ‘wet plant’—all the...
Many people don’t realize is that fiber optic cables are often easily accessible and unguarded, making them a potential target for hackers looking to tap into the huge amounts of data that travel across these fiber networks. Ciena's Paulina Gomez...
Network operators need more options and freedom to adapt and grow their networks. What they need is choice – not only with the equipment they deploy, but choices around the architectures, services, and operational paradigm that the products support. ...
Upgrade offers improved high-speed services to more than 21 communities across Eastern Kentucky test2
2016 study reports service provider perceptions of optical equipment suppliers; Ciena claims top spot in key categories test2
The IHS Technology annual optical equipment vendor leadership survey is an attempt to quantify the opinions of service providers. Download the report summary... test2
The second edition of The Acronyms Guide, brought to you by Ciena, is a handy guide to help you decipher the telecom industry’s acronym alphabet soup. Inside, you’ll find over 2,000 entries! test2
Joe Shapiro, Director, Product Line Management, explains how Ciena’s WaveLogic Ai coherent technology introduces a discontinuity in both capital and operational expenses for networks today while also enabling the foundation for the...
Subscribe to the latest news on network and data security.