280 likes | 430 Views
Towards a next generation secure internet Private Application Ecosystems. Sanjay Deshpande CEO and Chief Innovation Officer. Innovation. Center. So what’s wrong with the Internet!! (Nothing???). It’s almost free! Anyone can use it (no permissions required for accessing it!)
E N D
Towardsa next generation secure internet Private Application Ecosystems Sanjay Deshpande CEO and Chief Innovation Officer Innovation Center
So what’s wrong with the Internet!! (Nothing???) It’s almost free! Anyone can use it (no permissions required for accessing it!) It’s available and pervasive (almost everywhere now) Anyone can create any website, put any content, on any server, with any IP address with absolutely NO GOVERNMENT CONTROL! Its freedom and democracy at its best!
The Inter-networkA US Defense (DARPA) initiative that was commercialized and adopted (blindly) by the mainstream enterprises Source: Wikipedia
Hardware [PC/Mobile/Tablets] Operating Systems User Identity [Login/Password/ OTP/Biometric] Browsers [APP-Viewers] The Trust (?) Model TCP/IP {or UDP} [Data Transport] Certification Authority Ecosystem [Server Identity] DNS [Server Location]
Service and User Categorization on the Internet Services that require security and privacy Services that DO NOT require security and privacy/secrecy Users who do not care for privacy or security Users who CARE about Privacy and Secrecy
The current Internet Application Model is Broken. Period. No matter what you do on top of it, it will remain vulnerable to attacks if it is used for services that it was never designed for!
THE FUNDAMENTAL PROBLEM The current internet/intranet (TCP/IP or UDP) based client-server application model does not provide a trusted ecosystem for authenticated communication between the client and server (or Application to Application authentication and secrecy)
IS IT TIME TO RELOOK AT THE BASIC COMPUTING TECHNOLOGIES THAT CAN CATER TO SPECIFIC NEEDS ARISING OUT OF HIGH SECURITY COMPUTING APPLICATIONS? DO WE NEED A RADICALLY NEW APPROACH TO CREATE A NEXT GENERATION HIGH-SECURITY COMPUTING INFRASTUCTURE?
What if there was a way to create a Private Application Ecosystem which enabled hi-touch and ubiquitous user experience across devices over a massively scalable Private Communication Channels/Circuits with End-to-End Military Grade Security?
The REL-ID ECO - Secure Private Application Ecosystem - isa closed ecosystem wherein the applications (services), enterprise data, devices and underlying communication within this ecosystemare completely private, secure and not accessible (or even visible) to the outside world. Only authorized users, applications and devices can have access to this Private Application Ecosystem. [Note: This break-through technology has been developed and patented, over several years of R&D in the UNIKEN INNOVATION CENTER].
Enterprise HTML5 Quick Apps Desktop/Laptop APPS/Widgets App-Viewer
HYBRID APP TECHNOLOGY Tablets/Smart Phones Device Binding 2-Factor Authentication Containerization Always On Mutual Authentication MITM Proof Encrypted Channels Location Based Services
Additional Smart Card Authentication (optional) Biometric Authentication (optional) Special Purpose Secure Enterprise Computing Appliance DATE | 03042013 TIME | 0030HRS
REL-ID SECURE PORTABLE MEMORY DEVICE Memory device with an invisible secure space. Secure data storage. With the rise in security threats related to theft of critical enterprise information the need for a high-performance portable secure memory device is quite evident. Uniken’s innovation center has developed a secure memory device which ensures that sensitive high-value data and applications are protected.
INDIA PRIVATE (SECURE) INTERNET! A CLOSED PRIVATE APPLICATION ECOSYSTEM FOR CRITICAL NATIONALASSETS AND ENTERPRISES
Meet us at the uniken booth if you want to know more, or Even if you disagree with us!In either case we would like to talk to you.Thank You!
Secure Private Application Ecosystem REL ID GATE Container Secure App-Viewer 3rd Party Apps REL-ID ECO PLATFORM Enterprise Application Data Center Secure Data Store Mutually-Authenticated, Encrypted & Tunneled Pipe Private Communication Channel/Circuit [Internet/Intranet] Device Signature OS 2FA/3FA Command Center Device Desktops/Laptops/Tablets/SmartPhones [Windows, iOS, Android, MacOS, Linux]
REL-ID Private Communication Channel (R-PCC) Mutually Authenticated Communication Handshake (MITM Proof) EncryptedCommunication (optional), High-Speed and Concurrent HorizontallyScalable (Millions of End-Points) Assetsbehind R-PCC are not visible to the Internet and hence protected from various attacks Requires zero admin privileges on end-user devices Is created ON-DEMAND Is agnostic to the underlying NETWORK (Internet or Intranet) RPCC Agent can be embedded in any third party application stack (both software and firmware) REL-ID PCC Agent Internet or Intranet Application Network Application R-PCC (REL-ID Mutually Authenticated and Encrypted Channel)
Massively Scalable Secure Private Communication Circuit/Channel Applications/Services on this channel are NOT visible and accessible outside of this channel/circuit The end-users could be customers, employees and partners The devices could be laptops/desktops, mobile phones, tablets This enables a closed, controlled, highly secure private ecosystem Device Device Secure Private Communication Circuit/Channel (Internet and Intranet) Third Party Services RELI D GATE REL-ID ECO PLATFORM Device Command Center Enterprise Services Device Device
THE REL-ID ECOTM Private Data Center Command Center Enterprise Web-Apps [Virtual Image] 3rd Party Web-Apps [Virtual Image] AppManagement Identity Management REL-ID Widget (Secure Client App Container) Device Management 3rd Party Mobile Apps Enterprise Mobile Apps Authentication (2FA/3FA) Access Management Internet REL-ID GATE REL-ID GATE R-PCC* Over Intranet R-PCC* Over Internet Secure Channel Secure Channel *R-PCC: REL-ID Private Communication Channel (Encrypted) Mobile Phones, Tablets, Desktops and Laptops Customer Employee Partner