Upload
iotuk
View
176
Download
1
Embed Size (px)
Citation preview
SECURING DATA,NOT NETWORKS
29/02/2016 1
Roderick HodgsonHead of R&DSQR Systems
OVERVIEWWhy a different approach?
Benefits
Challenges
Our approach
29/02/2016 2
WHY A DIFFERENT APPROACH?
29/02/2016 3
29/02/2016 4
Secure connections can drop-out.Devices can get lost.
BENEFITS
29/02/2016 5
Use any network.
Encrypt once
Use existing systems
29/02/2016 6
CHALLENGES
29/02/2016 7
How do you do end-to-end encryption, in networks with constantly changing bandwidth capabilities?
29/02/2016 8
APPROACH
29/02/2016 9
Open interfaces
Standards compliant
29/02/2016 10
Combined encryption and compression
Optimise data at any point in the network chain
APPLICATIONS
29/02/2016 11
flickr.com/astragony
29/02/2016 12
CCTV for smart cities, protection of CNI.
Car to Car communications.
UAV communications.
Satellite comms.
WHAT NEXT?
29/02/2016 13