Sie sind auf Seite 1von 19

Verizon Business

Data Security and QOS-based Network Solutions

Presented to:

CCAP
TechNet Quarterly Meeting

global capability. personal accountability.


Proprietary and Confidential.
© 2007 Verizon. All Rights Reserved. PTEXXXXX XX/07
Verizon Business and Cybertrust Join Forces
A Global Security Powerhouse

+ =
Operating unit of Verizon Global leader with full range of Largest global provider of managed
Communications – ranked 13th in security & compliance services information security services
U.S. Fortune 500 18+ years of focused experience Over 1,100 security professionals
Advanced voice, data, securing critical data and worldwide
IP, IT and wireless solutions for protecting identities Mature solutions to address: -
large business and governments Mature set of managed & all layers of technology stack -
One of the largest and most secure professional services for threat, security/compliance processes -
global IP networks serving 2,700 compliance, vulnerability, forensics enterprise risk management -
cities in 150 countries & identity management cloud-to-core security
Manage networks and/or security for Client-driven approach: - Practical & customized approach with
over 4,000 enterprises and product-neutral - solutions tailored to your
government agencies around the sourcing-neutral environment and needs
world ICSA Labs – in-depth security Global delivery capability
Global network security intelligence product testing & certification Global infrastructure (7 SOCs, large IP
network)
Deep security intelligence sources

Managed security solutions for large businesses and governments


Proprietary and Confidential.
Value to the Customers:
Securing the Technology Stack

Application
Business Applications Security
Services
Applications
Management
Services Application Servers
(Remote/Smart Center)

Data Privacy
Managed
Database/Data Privacy services
Hosting
Services
HW Platform, OS, Storage
Identity
Services
Managed
Network LAN/WAN Network Access Managed
Services Security
Services
Colocation
Services Facility/Infrastructure

IT Services Risk/Compliance Security

Proprietary and Confidential.


Sample Security Client List

Proprietary and Confidential.


Security & Compliance Solutions

global capability. personal accountability.


Proprietary and Confidential.
© 2007 Verizon. All Rights Reserved. PTEXXXXX XX/07
Cybertrust Offering Categories

Managed Security Professional Enabling


Programs Services Technologies

Full-cycle security / Project-based, Business process


compliance programs expert-delivered services automation technologies

Establish and maintain Assess, design, build, or augment Improve the efficiency & accuracy
key portions of a security and critical components of a security of automatable, high-volume
compliance program and compliance program components of security program
(outsourcing or co-sourcing)

 Regulatory Compliance
 Vulnerability Management  Planning & Decision Support
 Vulnerability Management
 Security Monitoring / Mgmt  Vulnerability Management
 Identity and Access Mgmt
 Regulatory Compliance  Identity and Access Mgmt
(Digital Certificates, PKI)
 User Authentication/PKI  User Authentication/PKI
 Business Partner Security
 Forensics and IR  Regulatory Compliance

Proprietary and Confidential.


Verizon Business Value
Solution Offerings

Security Strategy Threat and Vulnerability Identity and


and Consultation Management Access Management
• Risk assessments • 24x7x365 security management, • Strategy, assessment, design,
– infrastructure, regulatory, enterprise monitoring and alerts and road mapping
• Security design, architecture, – Firewall / Router / VPN • Multi-factor authentication
development, and implementation – IDS / IPS
• Digital certificates
– Asset, vulnerability, & threat correlation
• Asset discovery & classification • Encryption solutions
• In-the-cloud security
• Quantitative risk modeling • Managed PKI / credentials
(DDoS, email & web content filtering)
and remediation planning
• Managed network scanning • Federated Identity
• Operational roadmap creation
• Application Security • Third-party technologies:
• Third-party technology review &
– Inventory & risk assessments – Evaluation
implementation
– Application reviews – Implementation
• Staff augmentation
– SDLC training – Ongoing management
(executive & operational levels)
• Forensics & Investigative Response
• Merger & Acquisition support

Security and Compliance Programs


Security Management Program • Business Partner Security Program • PCI compliance

Proprietary and Confidential.


Capabilities & Solution Areas
Operational Functions

Application Security

Forensics & IR

Strategic & Planning Business Partner Security

3rd party validation / certification


Functions

Strategic Planning Vulnerability Management

Risk Assessments
Security Monitoring & Logging
Quantitative Risk Modeling
Policy Development & Enforcement
Operational Roadmapping

M&A Support Identity & Access Management

Compliance, Audit & PCI

Data Flow & Privacy

In-the-Cloud Security (DDoS, Email)


Proprietary and Confidential.
Case Study: City Public Safety Departments

Objective: Internet Access for City officials, PSAP and remote


access for Police force.

• Redundant Internet Access with Verizon Business

• Active - Active Solution using two 4xT1 Circuits to deliver 6MB IP


Ports.

• Managed Firewall Service with Cisco ASA 5520 Firewalls

• High Availability – 24/7 Monitoring

• Remote Access for Patrol Cars with Wireless Aircards

Proprietary and Confidential.


Verizon Business
Private IP

global capability. personal accountability.


Proprietary and Confidential.
© 2007 Verizon. All Rights Reserved. PTEXXXXX XX/07
Drivers to MPLS-Based Services

New Applications • Any-to-any, peer-to-peer applications


• Supports new technologies (i.e., multicasting, VoIP,
e-learning, e-everything)
• Move to network-based applications
Network Enhancement • Any-to-any, restricted access available:
and Simplification – Fast and economical with direct interconnection to enterprise locations
and business partner sites
– Reliable IP routing that provides more flexibility
– Reduced network administrative burden
– Investment protection for enterprise IT buyers

Flexible Network • Highly scalable:


Resources – Rapidly scales in bandwidth and number of sites

Leverages Existing • Provides voice, video, and data network convergence


Network Resources • Retains current network interfaces
• Employs existing CPE and labor skill set
• Helps improve network utilization
• Frame Relay/ATM PVCs can co-exist with direct and indirect
access to MPLS-based network
• Evolutionary or revolutionary transition

Proprietary and Confidential.


Technology Definition of MPLS
• Multi-protocol label switching
(MPLS) integrates layer 2 (L2)
switching and layer 3 (L3) routing
Customer Edge Network Core
using RFC 4364 (formerly 2547) Router (CE) Router (P)
– Enables network edge routers
to apply simple MPLS labels
to packets or frames
– Switches packets according
to labels
• Virtual network tables maintained
in PE routers: MPLS
– Not customer configurable Core

• Customer edge (CE) router


does not run MPLS
Provider Edge Private
Router (PE) Backbone

Proprietary and Confidential.


Private IP Enhanced Traffic Management
• Private IP with IP QoS:
– Six classes with ten queues:
° Real Time/Voice (EF Class)
° Video/Priority Data (AF4 Class)
° Mission Critical Data (AF3 Class)
° Business Data (AF2 Class)
° General Data (AF1 Class)
° Default Class
– Access to five Data classes is included
in the port charge.
– Congestion Management offers multiple levels of
prioritization within each of the four Data queues.
– Customer subscribes to Real Time/Voice (EF) CAR.

Proprietary and Confidential.


Secure Gateway Services

Secure Gateway Services is a suite of advanced, network-based


communications services that deliver a broad range of features
to Verizon Private network services customers (i.e., Private IP,
vBNS+, Frame Relay, or ATM).
• Secure Gateway – Firewall
– Provides enterprise employees secure access to the Internet from customer
locations connected to a Verizon Private network service via a network-based
firewall. Secure Gateway – Firewall bundles Internet access with a stateful firewall
to help protect against a range of network security threats.

• Secure Gateway – Retail and Remote Office


– A wide area network service that provides secure, encrypted, low cost,
connectivity to the corporate network from small office/home office and remote
office locations. This service can be used as the primary site connection at remote
locations or as a cost effective backup for access to the company’s Verizon
Private network (e.g., Private IP) service at corporate sites.

Proprietary and Confidential.


Secure Gateway Services (cont’d)
• Secure Gateway – Mobile User
– Provides secure, encrypted, remote access for a customer’s mobile
workforce and remote employees and allows these users to securely
connect to corporate data resources hosted on computers within their company’s
Verizon Private network service.

Proprietary and Confidential.


Private IP Dynamic Bandwidth
• Web-based access through the Verizon Business customer portal
• Port and Committed Access Rate Analysis
• Automated Access Change Requests
• Can change between Private IP Standard and Enhanced Traffic
Management (ETM)
• Near-real-time port upgrade/downgrade functionality

Proprietary and Confidential.


Application and Packet – Marking Optimization
Helping Counties Make the Most of Their MPLS VPN
• Evaluate the performance
of network applications at
the desktop and user level “Applications are real-time and more
complex, and users require LAN-like
• Extend CoS into a customer’s performance over WANs. This all
LAN segment puts more pressure on the network
manager to ensure adequate
• Ability to manage CoS down application performance. This
to the user and application requires a different approach within
levels specifically the NOC. Performance management
needs to be at the center of
• Help enterprise ensure priorities operations along with fault, which
and bandwidth are being allocated will give network managers better
visibility to respond to the most
to support their business needs business-critical events.”
“Enterprise Network Management
Tools Get Application-Aware”
Yankee, 12/05

Proprietary and Confidential.


Case Study: County WAN Connectivity Solution with Verizon’s
IP Networking Services

County’s Objective:

Update bandwidth on WAN that will accommodate Video and a phone


system that will allow 4 digit dialing and centralized Voice Mail at their
remote offices.

Proposed Solutions: Verizon Business Private IP (PIP) and Hosted IP


Centrex (HIPC)

-The county currently has a Frame Relay network with various


PVC speeds from 256K to 768K. The county will replace this network with
Verizon Business’s PIP (MPLS). The PIP Network will have T1’s (1.544MB)
at each remote office. The host locations will have a 22MB (DS3) as will
their backup Data Center. This will give the remote offices sufficient
bandwidth to run Video, carry their county government voice traffic and be
a gateway to the VOIP network.

Proprietary and Confidential.


Case Study: County WAN Connectivity

-Each remote location will be configured with Polycom IP301 or IP501


Phones. The number of simultaneous callers will vary per location but we
are using 8 to 1 to determine the number of paths needed. Typically these
offices have between 8 and 25 users. The number of simultaneous for 8
was determined to be 4. The number of an office with 25 users was 6. All
local calling is included with HIPC. Each office will receive 1,500 minutes
of Long Distance calling per the number of simultaneous calls ordered.

Conclusion:

The county will see an increase in production with a more efficient WAN
that allows them provide Video, give them better functionality with 4-digit
dialing between locations and gives them a centralized Voice Mail system.
They will see a decrease in Telco cost as their Local and Long Distance
usage will become a fixed cost.

Proprietary and Confidential.

Das könnte Ihnen auch gefallen