There was a problem with your video. Another version is available.
Large-scale data breaches are reported in the press almost daily, with devastating consequences for the organizations and individuals involved. Technology innovation – from cloud computing to the internet of things (IoT) – is expected to drive a 100x increase in connected devices and a 1,000x increase in data traffic by 2020. This is dramatically increasing the network attack surface, and cybercriminals are using highly sophisticated methods to exploit this opportunity.
Organizations that make a conscious effort towards implementing a multi-layer security approach have much to gain in this era of high-stake breaches and security risks. A comprehensive strategy embeds security consciousness across the fabric of your entire organization; minimizes the attack surface of your network; and prepares your people and infrastructure for future regulatory requirements.
Here are the three key pillars of a comprehensive network security approach that can help minimize cyberthreats and streamline compliance in the era of ever-increasing data breaches and new data protection legislation.
Ensure data remains private and secure with optical encryption solutions that protect all in-flight data 24/7 from unauthorized entities.
Deliver data free from unauthorized modifications through secure, established product life cycle processes and controls, coupled with 3rd party regulatory certifications.
Enable the availability of applications and data through an ultra-high reliable infrastructure that minimizes downtime with six-9s (99.9999%) reliability.
Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) will provide the next evolution in securing both the network and the in-flight data across the network.
With SDN, various points in the cyber event chain—breach, reconnaissance, and exploitation—become both an indicator of events and a response mechanism. The flexibility and responsiveness of the network actively defends and combats denial-of-service-type attacks, especially as these attacks evolve toward cloud-type services.
Supplemental network capabilities, and sensors coupled with dynamic provisioning capabilities, open the door to an extremely resilient active defense focused at the lower layers. Additionally, the network resource allocation mix can be adjusted in accordance with the threat environment, while flow table policies can be adapted. This creates, in essence, policy-based—programmable—network defense.
NFV is the ability to virtualize a number of network appliances (e.g., firewalls, DPI, and routers) that were previously instantiated in separate hardware platforms, and to realize these functions using generic x86-based compute hardware. By leveraging NFV, a network operator can instantly distribute and manage these virtual appliances to any location, via the network. This not only saves space, power, and hardware costs, but it also evolves service delivery and ensures consistent security levels across the enterprise.
In response to the rapidly evolving cybersecurity threat landscape, regulations around the world, are upping the pressure on organizations to protect their sensitive customer and operational data. So much so that the maximum fine for a data breach, in the upcoming General Data Protection Regulation in Europe for example, could be up to 4% of global revenues; enough to put even large organizations out of business.
The right network security partner can help you ensure that all the people, processes and technology that touch your networking operations are completely trustworthy and security oriented. Ciena’s security capabilities stem from our commitment to secure our business; from protecting our own information assets and those of our partners, to delivering solutions with confidence in the processes and controls that go into the design, deployment and operation of a Ciena-enabled network.
Even as the threat of security breaches rises, the traffic flow across the network is growing. Bandwidth demands driven by web-scale applications continue to climb, necessitating a network that can elegantly scale to handle higher capacities with
Effortless in-flight data encryption at 100G and even 200G speeds. Ciena's Patrick Scully details the latest step you can take to secure the critical data on your network.
In a world where the risks to your data lurk everywhere and the stakes to your future, it's essential to protect the lifeblood of your business with optical encryption.
Patrick Scully describes Ciena’s new 6500 low-latency 10G wire-speed encryption solution introduced via the 4x10G OTR with encryption module, for highly secure and transparent end-to-end communications.
Joe Marsella, CTO EMEA at Ciena discusses the implications of optical fibre hacking and why a holistic security strategy is essential, especially in the wake of the upcoming European General Data Protection Regulation (GDPR).
Subscribe to the latest news on network and data security.
Unchecking this box will prevent you from subscribing to Ciena's communications.
I agree to subscribe to Ciena's communications.
I understand I can unsubscribe at any time.
I agree to subscribe to Ciena's communications. I understand I can unsubscribe at any time.