10
Copyright © Ciena Corporation 2016. All rights reserved. Confidential & Proprietary. Network Encryption Needs General Data Protection Regulation (GDPR) by May 2018

Network Encryption Needs - media.gswi.westcon.commedia.gswi.westcon.com/media/Ciena_Encryption_Notes_ita.pdf · Title: Ciena Corporate Presentation Author: Atkinson, Sara Created

  • Upload
    dobao

  • View
    216

  • Download
    3

Embed Size (px)

Citation preview

Copyright © Ciena Corporation 2016. All rights reserved. Confidential & Proprietary.

Network Encryption NeedsGeneral Data Protection Regulation (GDPR) by May 2018

Copyright © Ciena Corporation 2016. All rights reserved. Confidential & Proprietary. 2

Compelling Event – New GPDR Regulation

General Data Protection Regulation (GDPR) set by the European Parliament by May 2018 Replaces existing national and EU data

protection laws all European countries will have to adhere

If an organization regularly transmits big volumes of

data across their network, it’s vital to ensure that the

network transporting data is trusted, reliable, and secure.

Impact on Any organization that

controls personal data (defined as any

information that can identify a living

individual)

Data generated around the world is set to grow 10-fold by 2020. More than a trillion gigabytes of data is expected to

be transmitted this year

Copyright © Ciena Corporation 2016. All rights reserved. Confidential & Proprietary. 3

Why is this important?

• €10,000,000 - or 2% of total worldwide annual turnover - whichever is higher when a company does not adopt encryption and suffers a breach

The Fine

• €3.41 million ($3.79 million) is the average cost of a data breachThe Added Costs

• 80 % of all businesses have encountered cybercrime

• Data generated around the world is set to grow 10-fold by 2020. More than a trillion gigabytes of data is expected to be transmitted this year

The “Hard” Facts

• May 2018 the law must be enforcedThe deadline

Copyright © Ciena Corporation 2016. All rights reserved. Confidential & Proprietary. 4

If it’s encrypted its protected

Optical transport layer encryption protects in-flight data, all the time

Prevents optical fibre hacking as

data is unusable to a hacker

Promotes a holistic security strategy

Copyright © Ciena Corporation 2016. All rights reserved. Confidential & Proprietary. 5

Application

- Transport

Various

Network

IPSec

Data Link

MacSec

Physical

Layer 1

Encryption

Path

end

2

end

end

2

end

hop

by

hop

end

2

end

Complexity

& Cost

$

$$

$$$

$$

Protocol

Support

Limited

IP

only

Ethernet

only

multi-

protocol

Capacity

lost to

Encryption

Overhead

40 – 60% dependent on

packet size

20 – 40%Overhead

capped at ~40

bytes / packet

0% loss,

Overhead

within OTN

wrapper

~2-10%

after

handshake

Scalable

Payload

size

Restricted

RestrictedStandard MAC sizes

Flexible1.25G – 100G

ODUFlex

Restricted

Latency

100’s

msec

µsecs

µsecs@10G /

nsecs@100/200G

100’s

msec

Encryption:

Performance Impact

by Network Layer

Copyright © Ciena Corporation 2016. All rights reserved. Confidential & Proprietary. 6

Ciena’s Wavelogic encryption

24/7 data security

Combines a high degree of flexibility and security, with ease of operation

and administration

Highest security cryptography

algorithms available

2 independent sets of keys for

authentication and data encryption

Secure End-User Control - user

portal ensures full control of security key management

External third-party certification

Copyright © Ciena Corporation 2016. All rights reserved. Confidential & Proprietary. 7

Summary: General Data Protection Regulation (GDPR)

Advocates privacy by Design and by Default - c

http://www.computerweekly.com/news/450296306/10-key-facts-businesses-need-to-note-about-the-GDPR

Copyright © Ciena Corporation 2016. All rights reserved. Confidential & Proprietary. 8

Cyber-security NEEDS to be high on enterprises’ agenda

Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

$162M

business

impact

Copyright © Ciena Corporation 2016. All rights reserved. Confidential & Proprietary. 9

Some Interesting Stats

https://www.htbridge.com/blog/if-2016-was-the-year-of-the-breach-what-will-2017-be.html

https://www.ibm.com/security/data-breach

https://resource.elq.symantec.com/shadow-data-report-20161H

https://www2.trustwave.com/GSR2016.html

10Copyright © Ciena Corporation 2016. All rights reserved. Confidential & Proprietary.