html5-img
1 / 28

Innovation

Towards a next generation secure internet Private Application Ecosystems. Sanjay Deshpande CEO and Chief Innovation Officer. Innovation. Center. So what’s wrong with the Internet!! (Nothing???). It’s almost free! Anyone can use it (no permissions required for accessing it!)

natane
Download Presentation

Innovation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Towardsa next generation secure internet Private Application Ecosystems Sanjay Deshpande CEO and Chief Innovation Officer Innovation Center

  2. So what’s wrong with the Internet!! (Nothing???) It’s almost free! Anyone can use it (no permissions required for accessing it!) It’s available and pervasive (almost everywhere now) Anyone can create any website, put any content, on any server, with any IP address with absolutely NO GOVERNMENT CONTROL! Its freedom and democracy at its best!

  3. The Inter-networkA US Defense (DARPA) initiative that was commercialized and adopted (blindly) by the mainstream enterprises Source: Wikipedia

  4. Hardware [PC/Mobile/Tablets] Operating Systems User Identity [Login/Password/ OTP/Biometric] Browsers [APP-Viewers] The Trust (?) Model TCP/IP {or UDP} [Data Transport] Certification Authority Ecosystem [Server Identity] DNS [Server Location]

  5. Service and User Categorization on the Internet Services that require security and privacy Services that DO NOT require security and privacy/secrecy Users who do not care for privacy or security Users who CARE about Privacy and Secrecy

  6. The current Internet Application Model is Broken. Period. No matter what you do on top of it, it will remain vulnerable to attacks if it is used for services that it was never designed for!

  7. THE FUNDAMENTAL PROBLEM The current internet/intranet (TCP/IP or UDP) based client-server application model does not provide a trusted ecosystem for authenticated communication between the client and server (or Application to Application authentication and secrecy)

  8. IS IT TIME TO RELOOK AT THE BASIC COMPUTING TECHNOLOGIES THAT CAN CATER TO SPECIFIC NEEDS ARISING OUT OF HIGH SECURITY COMPUTING APPLICATIONS? DO WE NEED A RADICALLY NEW APPROACH TO CREATE A NEXT GENERATION HIGH-SECURITY COMPUTING INFRASTUCTURE?

  9. What if there was a way to create a Private Application Ecosystem which enabled hi-touch and ubiquitous user experience across devices over a massively scalable Private Communication Channels/Circuits with End-to-End Military Grade Security?

  10. REL-ID ECO: A SECURE PRIVATE APPLICATION ECOSYSTEM

  11. The REL-ID ECO - Secure Private Application Ecosystem - isa closed ecosystem wherein the applications (services), enterprise data, devices and underlying communication within this ecosystemare completely private, secure and not accessible (or even visible) to the outside world. Only authorized users, applications and devices can have access to this Private Application Ecosystem. [Note: This break-through technology has been developed and patented, over several years of R&D in the UNIKEN INNOVATION CENTER].

  12. Private Application Ecosystem

  13. Private Communication Circuit

  14. Enterprise HTML5 Quick Apps Desktop/Laptop APPS/Widgets App-Viewer

  15. HYBRID APP TECHNOLOGY Tablets/Smart Phones Device Binding 2-Factor Authentication Containerization Always On Mutual Authentication MITM Proof Encrypted Channels Location Based Services

  16. Additional Smart Card Authentication (optional) Biometric Authentication (optional) Special Purpose Secure Enterprise Computing Appliance DATE | 03042013 TIME | 0030HRS

  17. REL-ID SECURE PORTABLE MEMORY DEVICE Memory device with an invisible secure space. Secure data storage. With the rise in security threats related to theft of critical enterprise information the need for a high-performance portable secure memory device is quite evident. Uniken’s innovation center has developed a secure memory device which ensures that sensitive high-value data and applications are protected.

  18. INDIA PRIVATE (SECURE) INTERNET! A CLOSED PRIVATE APPLICATION ECOSYSTEM FOR CRITICAL NATIONALASSETS AND ENTERPRISES

  19. Meet us at the uniken booth if you want to know more, or Even if you disagree with us!In either case we would like to talk to you.Thank You!

  20. Secure Private Application Ecosystem REL ID GATE Container Secure App-Viewer 3rd Party Apps REL-ID ECO PLATFORM Enterprise Application Data Center Secure Data Store Mutually-Authenticated, Encrypted & Tunneled Pipe Private Communication Channel/Circuit [Internet/Intranet] Device Signature OS 2FA/3FA Command Center Device Desktops/Laptops/Tablets/SmartPhones [Windows, iOS, Android, MacOS, Linux]

  21. REL-ID Private Communication Channel (R-PCC) Mutually Authenticated Communication Handshake (MITM Proof) EncryptedCommunication (optional), High-Speed and Concurrent HorizontallyScalable (Millions of End-Points) Assetsbehind R-PCC are not visible to the Internet and hence protected from various attacks Requires zero admin privileges on end-user devices Is created ON-DEMAND Is agnostic to the underlying NETWORK (Internet or Intranet) RPCC Agent can be embedded in any third party application stack (both software and firmware) REL-ID PCC Agent Internet or Intranet Application Network Application R-PCC (REL-ID Mutually Authenticated and Encrypted Channel)

  22. Massively Scalable Secure Private Communication Circuit/Channel Applications/Services on this channel are NOT visible and accessible outside of this channel/circuit The end-users could be customers, employees and partners The devices could be laptops/desktops, mobile phones, tablets This enables a closed, controlled, highly secure private ecosystem Device Device Secure Private Communication Circuit/Channel (Internet and Intranet) Third Party Services RELI D GATE REL-ID ECO PLATFORM Device Command Center Enterprise Services Device Device

  23. THE REL-ID ECOTM Private Data Center Command Center Enterprise Web-Apps [Virtual Image] 3rd Party Web-Apps [Virtual Image] AppManagement Identity Management REL-ID Widget (Secure Client App Container) Device Management 3rd Party Mobile Apps Enterprise Mobile Apps Authentication (2FA/3FA) Access Management Internet REL-ID GATE REL-ID GATE R-PCC* Over Intranet R-PCC* Over Internet Secure Channel Secure Channel *R-PCC: REL-ID Private Communication Channel (Encrypted) Mobile Phones, Tablets, Desktops and Laptops Customer Employee Partner

More Related