There was a problem with your video. Another version is available.

Network and data security

Secure networking solutions you can trust.

Large-scale data breaches are reported in the press almost daily, with devastating consequences for the organizations and individuals involved. Technology innovation – from cloud computing to the internet of things (IoT) – is expected to drive a 100x increase in connected devices and a 1,000x increase in data traffic by 2020. This is dramatically increasing the network attack surface, and cybercriminals are using highly sophisticated methods to exploit this opportunity.

Organizations that make a conscious effort towards implementing a multi-layer security approach have much to gain in this era of high-stake breaches and security risks.  A comprehensive strategy embeds security consciousness across the fabric of your entire organization; minimizes the attack surface of your network; and prepares your people and infrastructure for future regulatory requirements.

Here are the three key pillars of a comprehensive network security approach that can help minimize cyberthreats and streamline compliance in the era of ever-increasing data breaches and new data protection legislation.

The Big 3

No. 1

CONFIDENTIALITY

Ensure data remains private and secure with optical encryption solutions that protect all in-flight data 24/7 from unauthorized entities.

No. 2

INTEGRITY

Deliver data free from unauthorized modifications through secure, established product life cycle processes and controls, coupled with 3rd party regulatory certifications.

No. 3

AVAILABILITY

Enable the availability of applications and data through an ultra-high reliable infrastructure that minimizes downtime with six-9s (99.9999%) reliability.

What’s next

Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) will provide the next evolution in securing both the network and the in-flight data across the network.  

With SDN, various points in the cyber event chain—breach, reconnaissance, and exploitation—become both an indicator of events and a response mechanism. The flexibility and responsiveness of the network actively defends and combats denial-of-service-type attacks, especially as these attacks evolve toward cloud-type services.

Supplemental network capabilities, and sensors coupled with dynamic provisioning capabilities, open the door to an extremely resilient active defense focused at the lower layers. Additionally, the network resource allocation mix can be adjusted in accordance with the threat environment, while flow table policies can be adapted. This creates, in essence, policy-based—programmable—network defense.   

NFV is the ability to virtualize a number of network appliances (e.g., firewalls, DPI, and routers) that were previously instantiated in separate hardware platforms, and to realize these functions using generic x86-based compute hardware. By leveraging NFV, a network operator can instantly distribute and manage these virtual appliances to any location, via the network. This not only saves space, power, and hardware costs, but it also evolves service delivery and ensures consistent security levels across the enterprise.

Industry insights

In response to the rapidly evolving cybersecurity threat landscape, regulations around the world, are upping the pressure on organizations to protect their sensitive customer and operational data. So much so that the maximum fine for a data breach, in the upcoming General Data Protection Regulation in Europe for example, could be up to 4% of global revenues; enough to put even large organizations out of business.

Ciena Insights

The right network security partner can help you ensure that all the people, processes and technology that touch your networking operations are completely trustworthy and security oriented. Ciena’s security capabilities stem from our commitment to secure our business; from protecting our own information assets and those of our partners, to delivering solutions with confidence in the processes and controls that go into the design, deployment and operation of a Ciena-enabled network.

All network and data security insights

Get the insights you want.

Subscribe to the latest news on network and data security.

Subscribe

Unchecking this box will prevent you from subscribing to Ciena's communications.

Can we help you answer a question?
Questions?
Are you a current Ciena customer?
Do you need support on an existing product?
We're happy to help!
Do you want to learn more about Ciena's products?
Here's some useful information
Do you want to learn more about Ciena's products?
Do you need support on an existing product?
Here's some useful information
Subscribe now for the latest Network Insights.
Subscribe
Back
Thank you! You have subscribed successfully.