34
Secured Invisible Private Network Securing Communications

SIPN Business Overview

Embed Size (px)

Citation preview

Page 1: SIPN Business Overview

Secured Invisible Private Network

Securing Communications

Page 2: SIPN Business Overview

What Do Businesses Think When It Comes To

Security?

Fatigue Business Disruption

Exposure Helplessness

Lack Of Confidence

Defeat

Anger

Frustration

Violated

Futility

Empty Promises

Expensive

Snake Oil

Page 3: SIPN Business Overview

Online Security Is Broken

15,000 Vulnerabilities Found in over 4,000 Apps

Volatile Cedar: Ongoing since 2012, 10 countries infected

Rootpipe: Infects all Apple products; No patch available

Sandworm: Launched in 2009; Discovered in 2014; Infected major utilities throughout West

Shellshock: Core flaw for over a decade; 1.1M attacks in one week of monitoring

Poodle: Obsoleted new version of HTTPS overnight

Page 4: SIPN Business Overview

The Cost Of Insecurity

Page 5: SIPN Business Overview

Your World Today

Home Field

Office

Internet

Corporate

Gateway

Corporate

Servers

Quasi-SecuredUnsecured

Confidential and Proprietary Property of SIPN, LLC

NOTE THE 95% UNPROTECTED COMMUNICATION LINES

Page 6: SIPN Business Overview

2018 Cybersecurity Market: $101BWhat Is The Market?

2019 Mobile

Security Market

Size:$5.8B

2019 Global

Network Security Market

Size:$7.5B

2020 SSL VPN Market Size:

$26.62B

2016 IP VPN Market Size:$81B

2015 Cybersecurity Market: $77B

Page 7: SIPN Business Overview

So What Are The Issues?

SECURITY IS TOO VISIBLE• Changing it causes disruptions to

businesses and users• Sitting up high restricts its

capabilities

SECURITY FOCUSES ON DEVICES• Building digital fortresses is great• But what is protecting data

between those fortresses?

(Click To Continue)

Page 8: SIPN Business Overview

Fatigue THE NEXT BIG THING

• Surely something will work…right?• But how many major disruptions does a company

need to suffer?

WHEN WILL SECURITY LAST?• Even if something works today, it is usually obsolete

tomorrow• Why can’t technology ever adapt?

AT SOME POINT WHEN DOES THE PAIN OF PROTECTION OUTWEIGH THE BENEFITS?

Page 9: SIPN Business Overview

A New Approach FOUNDATION FIRST

• Prior to solving current demands, a better framework is needed

SECURITY SHOULD BE INVISIBLE• You are not ask to packet your data for transmissions,

so why are you tasked with securing those packets?

WORKING TOGETHER• Security is hard and no one provider will ever solve it

all by themselves• Any truly effective foundation will enable others

Page 10: SIPN Business Overview

Core SIPN Difference

SIPN SITS BETWEEN AN OPERATING SYSTEM AND THE NETWORK

Confidential and Proprietary Property of SIPN, LLC

ComputerComputer

Network

SIPN

Virtualization Layer

SIPN

Virtualization Layer

Page 11: SIPN Business Overview

How This HelpsSECURITY IS TRANSPARENT• Updates do not cause business

disruption In fact, adding SIPN does not disrupt business

• Security Is Always On Experts control security, not users

• Enables A Multitude Of Security Capabilities By removing the operating system, security becomes unbound

Page 12: SIPN Business Overview

Operating System Freedom

OPERATING SYSTEMS ARE SLOW TO RESPOND• All current security relies on operating system-

provided features• Most such features cannot change for decades due to

compatibility issues

SIPN ADAPTS IN REAL TIME• Customers control security, not Microsoft• Security is highly personalized as needed• Protection can be changed at any time with no

disruption

Page 13: SIPN Business Overview

Enabling OthersSIPN WILL BUILD SOME• SIPN will secure data between devices• SIPN will plug holes in some basic services

SIPN WILL ENABLE MORE• SIPN will overcome limitations in

numerous network security platforms• SIPN will plug holes in major options such

as VPNs

Page 14: SIPN Business Overview

A New (Secure) World

SECURITY BECOMES NETWORK• Security moves out of sight – where it should

be• Security can adapt without disruption

SIPN WILL ENABLE AN ENTIRE INDUSTRY• Underlay Networks• Counter Intrusion/DDoS Systems• Numerous remote security solutions

Page 15: SIPN Business Overview

Not Just Communications

SIPN PROTECTS MODERN INTERNET• SIPN is currently the only solution that can protect

modern forms of transport over the Internet (IPv6)

SIPN OVERCOMES BYOD CHALLENGES• SIPN removes basic flaws in current overlay network

solutions

SIPN CAN EVEN MAKE MALWARE MEANINGLESS• But that is another story…

Page 16: SIPN Business Overview

Personalized Protection

SIPN WORKS WITH, NOT AGAINST• SIPN is an adaptable solution meant to work

with other options already in place SIPN plugs the holes in VPNs SIPN overcomes limitations in popular options available today

SIPN IS MODULAR• Customers only use what they want without

having to ramp up on everything at once

Page 17: SIPN Business Overview

Complete Security

NOTE THE 100% PROTECTION

Home Field

Office

Internet

SIPNGateway

Corporate

Servers

SecuredUnsecured

Confidential and Proprietary Property of SIPN, LLC

Page 18: SIPN Business Overview

Let’s Talk SonyCOMMUNICATIONS KILLED• 77M accounts stolen from Sony,

costing them $100M• Two Main Failures:

Point Of Sale Unit Was Able To Talk With Deployment Server

Nobody Was Watching For Outbound FTP Traffic

SIPN CONTROLS COMMUNICATIONS• SIPN Enables Control Over Who Is Talking With

Whom, When, What Direction and Even How Devices Can Talk

Confidential and Proprietary Property of SIPN, LLC

Page 19: SIPN Business Overview

Chasing Intruders CHASE HAS SUFFERED EXTENSIVELY

• In 2014, 83 million accounts were hacked• In 2015, Chase was part of $1B banking theft that ran for years

SAME ATTACK PRINCIPLE• While the attacks appear to evolve, they all use the same

principle• Install software, send communications to unauthorized

locations, reap the benefits

CONTROL COMMUNICATIONS• If banks controlled their communications at a fine-enough level,

these attacks would all fail• SIPN can proactively stop data from ever being transmitting to

unsecure locations

Page 20: SIPN Business Overview

The Epic OPM Disaster

Page 21: SIPN Business Overview

Problems And The Solution

THE PROBLEMS UNDERLYING OPM ARE VAST• Outdated software• Improper contractor behavior• Partially-completed, incongruous security systems

THE SOLUTION IS SIPN• Regardless of device, controlling communications

controls the flow of data• Centralizing communications security simplifies

complex, often disparate, on device systems• SIPN provides new framework that consolidates

seemingly disparate solutions

Page 22: SIPN Business Overview

SIPN TodayDESKTOP APPLICATION• Runs on Windows and Linux• Mixes two of the best security options

together (AES 256-Bit and Triple DES Encryption) on same communication channel

CORE ECOSYSTEM• Major components of new foundation are built

out• Key new identification processes have been

completed

Page 23: SIPN Business Overview

Social SIPNFOCUSED ON CONSUMER APPS• Secure Skype, Private Messenger, Impregnable

iChat• Build structure once and reuse it for all apps• Critical U.S. ISP limitation requires root access on

mobile devices

SHORT DURATION, HIGH POTENTIAL• $150,000 and 3 months for Secure Skype• Each subsequent app requires 1-2 weeks for testing• Identified several target groups with 10K to 30K

members each

Page 24: SIPN Business Overview

Enterprise SIPNENTERPRISE EFFORT CONCURRENT• Building management team now• Technology roadmap already

developed

LEVERAGING MODULARITY• Initial targets are mid-level

organizations• Will target protection of critical

pathways first• Goal to implement customer-driven

product build out

Page 25: SIPN Business Overview

Ready To Go SIPN?TIP OF THE ICEBERG• SIPN goes well beyond communications security to

provide a comprehensive enterprise solution• SIPN provides an adaptable framework that enables a

range of new opportunities for other providers

SECURITY NEEDS SIPN• SIPN is transparent to operating systems, business and

users• SIPN resolves core problems that enable hackers today• SIPN can provide immediate solutions for pressing

business demands

Confidential and Proprietary Property of SIPN, LLC

Page 26: SIPN Business Overview

For The Tech Folks

Page 27: SIPN Business Overview

3 ProngsOPERATING SYSTEM ISSUES• Constrain how encryption is implemented• Prevents adaptation to ever-changing security needs

SESSION INITIATION• Trying to pass secrets over unsecure lines does not

work

OVERLAY NIGHTMARES• Overlay networks have potential• User disruption and gateway bottlenecks are major

obstacles

Page 28: SIPN Business Overview

Common Flaws ALL ENCRYPTION TO DATE IS BASED WITHIN

AN OPERATING SYSTEM• SSL, IPSec are just layers in an OS

IF A VULNERABILITY IS FOUND IN ONE PRODUCT, ALL SUFFER• Thus when Heartbleed hit, all SSL VPN customers suffered

CORRECTING ISSUES IS DISRUPTIVE• Operating system upgrades, system overhauls and yet more

intrusive security• It seems that these approaches are digging ever-deeper holes

Confidential and Proprietary Property of SIPN, LLC

Page 29: SIPN Business Overview

SIPN Sits Below An OS

SIPN IS ADDING A NEW VIRTUAL LAYER

SIPN SITS BETWEEN AN OS AND THE UNDERLYING NETWORK HARDWARE

Application Layer (Http/s, FTP, DNS,…)Presentation Layer

(MIME, XDR)Session Layer (PPTP, SOCKS, NetBIOS)Transport Layer (TCP,

UDP, SCTP)Network Layer (IP (v4/6), IPsec)

Data Link Layer (mini-Port Driver)Physical Layer

(Network Card)

SIPN Virtualization Layer

Ope

rati

ng S

yste

mPh

ysic

alOSI

Sta

ck

Confidential and Proprietary Property of SIPN, LLC

Page 30: SIPN Business Overview

Operating System Freedom

NO MORE LIMITATIONS• Mix and match encryptions• Reduce communication protection to centrally-

administrated policies• Change encryption at any time without major

installs

TRANSPARENT• Works under network/system admin tools• Transparent to operating systems, applications,

users and businesses• SIPN has run under application security and VPNs

Confidential and Proprietary Property of SIPN, LLC

Confidential and Proprietary Property of SIPN, LLC

Page 31: SIPN Business Overview

Out Of BandMODERN PKE IS FLAWED• Trying to pass messages over unsecure lines does not work• Almost all major flaws stem from some sort of public key

exchange issue

SIPN WORKS OUT OF BAND• Using a patent-pending n-level authentication mechanism,

SIPN separately authenticates devices and users• Then leveraging Kerberos in a cross platform manner, SIPN

establishes secure sessions without ever sharing secrets in an insecure manner

(Animations available upon request)

Confidential and Proprietary Property of SIPN, LLC

Page 32: SIPN Business Overview

Underlay NetworkOVERLAY NETWORK LOGIC

• Premise is to provide higher-level cohesiveness to account for challenges such as BYOD

• Sitting on top of a network requires visible single points of failure

SIPN SITS UNDERNEATH• SIPN provides the ability for overlay networks to become

transparent• By sitting underneath, SIPN uses a centrally-managed,

distributed peer model to eliminate bottlenecks and user disruption

• Current overlay providers can plug into this system and utilize their expertise to provide a new type of enterprise solution

Page 33: SIPN Business Overview

Underlay Benefits AUTHENTICATION

• Imagine being able to authenticate by user and device• Imagine creating rules based on dynamic options such

as connected network and/or geographic location

AUTHORIZATION• Imagine treating communications like another resource• SIPN provides the ability to control when, where and

how devices can talk with one another

ACCOUNTING• Imagine being able to guarantee delivery – especially

important in QoA environments

Page 34: SIPN Business Overview

True Security Platform

OPEN ENCRYPTION PLATFORM• SIPN can support any type of encryption – both now and in

the future

PLUGGABLE FRAMEWORK• SIPN can support a myriad of solution providers:

Counter Intrusion Vendors VPN Providers Overlay Network Providers

SIPN WORKS WITHIN BOUNDARIES• SIPN provides a unique ability to support network and

system admin tools without having to turn of encryption