There was a problem with your video. Another version is available.
Large-scale data breaches are reported in the press almost daily, with devastating consequences for the organizations and individuals involved. Technology innovation—from cloud computing to the Internet of Things (IoT)—is expected to drive a 100x increase in connected devices and a 1,000x increase in data traffic by 2020. This dramatically increases the network attack surface, and cybercriminals are using highly sophisticated methods to exploit this opportunity.
As providers evolve towards a more adaptive network—with increased levels of automation and fewer manual processes, security is paramount to protect the exponential growth in data traffic over the network. It’s crucial to ensure the right security measures are in place to detect and mitigate security breaches. A comprehensive strategy embeds security consciousness across the fabric of your entire organization, minimizes the attack surface of your network, and prepares your people and infrastructure for future regulatory requirements.
Ensure data remains private and secure with optical encryption solutions that protect all in-flight data 24/7 from unauthorized entities.
Deliver data free from unauthorized modifications through secure, established product life cycle processes and controls, coupled with 3rd party regulatory certifications.
Enable the availability of applications and data through an ultra-highly reliable infrastructure that minimizes downtime with up to six-nines (99.9999 percent) reliability.
Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) will provide the next evolution in securing both the network and the in-flight data across the network.
With SDN, various points in the cyber event chain—breach, reconnaissance, and exploitation—become both an indicator of events and a response mechanism. The flexibility and responsiveness of the network actively defend and combat denial-of-service-type attacks, especially as these attacks evolve toward cloud-type services.
Supplemental network capabilities—and sensors coupled with dynamic provisioning capabilities—open the door to an extremely resilient active defense focused at the lower layers. Additionally, the network resource allocation mix can be adjusted in accordance with the threat environment, while flow table policies can be adapted. This creates, in essence, policy-based programmable network defense.
NFV is the ability to virtualize a number of network appliances (e.g., firewalls, DPI, and routers) that were previously instantiated in separate hardware platforms, and to realize these functions using generic x86-based compute hardware. By leveraging NFV, a network operator can instantly distribute and manage these virtual appliances to any location, via the network. This not only saves space, power, and hardware costs, but it also evolves service delivery and ensures consistent security levels across the enterprise.
In response to the rapidly evolving cybersecurity threat landscape, regulations around the world are upping the pressure on organizations to protect their sensitive customer and operational data. So much so, that the maximum fine for a data breach in Europe’s General Data Protection Regulation, for example, could be up to 4 percent of global revenues—enough to put even large organizations out of business.
The right network security partner can help you ensure that all the people, processes, and technology that touch your networking operations are completely trustworthy and security oriented. Ciena’s security capabilities stem from our commitment to secure our business—from protecting our own information assets and those of our partners—to delivering solutions with confidence in the processes and controls that go into the design, deployment, and operation of a Ciena-enabled network.
Effortless in-flight data encryption at 100G and even 200G speeds. Ciena's Patrick Scully details...
Patrick Scully describes Ciena’s new 6500 low-latency 10G wire-speed encryption solution...
Joe Marsella, CTO EMEA at Ciena discusses the implications of optical fibre hacking and why a...
Subscribe to the latest news on network and data security.
Unchecking this box will prevent you from subscribing to Ciena's communications.
I agree to subscribe to Ciena's communications.
I understand I can unsubscribe at any time.
I agree to subscribe to Ciena's communications. I understand I can unsubscribe at any time.