7
© CloudShield Technologies Peder Jungck, CTO & Founder

© CloudShield Technologies Peder Jungck, CTO & Founder

Embed Size (px)

Citation preview

Page 1: © CloudShield Technologies Peder Jungck, CTO & Founder

© CloudShield Technologies

Peder Jungck, CTO & Founder

Page 2: © CloudShield Technologies Peder Jungck, CTO & Founder

© CloudShield Technologies

Company Overview

Profile: Founded in 2000 115 Employees, Headquarters in Sunnyvale, CA Locations: DC, Toronto, São Paulo, London, Frankfurt, Singapore 22 technology patents filed with 12 approved to date

Seasoned team: top networking, telecom & government organizations

Solution Focus: Service Management & Security Policy-controlled, network elements that inspect, analyze & control all traffic;

enabling lower costs, secure infrastructure & new revenues streams Large Network Operators: Telecom Service Provider, Defense

Financials: Privately held, fully funded and targeting future IPO

Page 3: © CloudShield Technologies Peder Jungck, CTO & Founder

© CloudShield Technologies

DPPM-800PN41

CS-2000

Solutions Overview & Approach

3

Hardware: CS-2000 & PN41 for IBM BladeCenter• Architected open – only DPI vendor supporting open chassis architectures •100% packet inspection, no sampling; protocol-agnostic• Most scalable solution(10Gbps/chassis & 20Gbps/Blade up to 1 terabit/rack)• Low latency inline active or passive with stealth footprint

Hardware: CS-2000 & PN41 for IBM BladeCenter• Architected open – only DPI vendor supporting open chassis architectures •100% packet inspection, no sampling; protocol-agnostic• Most scalable solution(10Gbps/chassis & 20Gbps/Blade up to 1 terabit/rack)• Low latency inline active or passive with stealth footprint

Software: packetC™, PacketWorks & CPOS™packetC & PacketWorks: Integrated Development Environment• Rapid application development – 4 times faster than other approaches• packetC™ first open network and packet knowledgeable language• Eclipse based IDE with Language Editors, Version Control & Debugger

CPOS™: CloudShield PacketWorks Operating System• Appliance virtualization – only DPI platform supporting multiple applications• Proven secure architecture –strict separation between data & control planes• Full layers 2-7 packet manipulation: inspect, intercept, block, modify, create

Software: packetC™, PacketWorks & CPOS™packetC & PacketWorks: Integrated Development Environment• Rapid application development – 4 times faster than other approaches• packetC™ first open network and packet knowledgeable language• Eclipse based IDE with Language Editors, Version Control & Debugger

CPOS™: CloudShield PacketWorks Operating System• Appliance virtualization – only DPI platform supporting multiple applications• Proven secure architecture –strict separation between data & control planes• Full layers 2-7 packet manipulation: inspect, intercept, block, modify, create

Broadest Set of Deployed Applications• CloudShield Applications (Services Management & Infrastructure Security) • Independent Software Developers (DDoS Mitigation, Lawful Intercept…)• Systems Integrator Solutions (Services Mgmt. & Cross Domain Systems…)• Customer Solutions (BGP Security, BOTS, Government Open Source…)

Broadest Set of Deployed Applications• CloudShield Applications (Services Management & Infrastructure Security) • Independent Software Developers (DDoS Mitigation, Lawful Intercept…)• Systems Integrator Solutions (Services Mgmt. & Cross Domain Systems…)• Customer Solutions (BGP Security, BOTS, Government Open Source…)

Page 4: © CloudShield Technologies Peder Jungck, CTO & Founder

© CloudShield Technologies

Service Providers – Forces at Work

4

Service Providers

Hackers Shareholders

Customers

Must grow by adding new services and revenue streams

Must grow by adding new services and revenue streams

Driving down monthly feesDriving down monthly fees

Demanding increased bandwidthand more value from providersDemanding increased bandwidthand more value from providers

Attacks against networks systems

Attacks against networks systems

Service providers must cut costs, protect their infrastructure & deliver new servicesService providers must cut costs, protect their infrastructure & deliver new services

Page 5: © CloudShield Technologies Peder Jungck, CTO & Founder

© CloudShield Technologies

Content Processing (DPI) Value ProgressionImproving Service Expense Control and Revenue Growth

• Infrastructure Expense Control • P2P Control Systems & Visibility to Usage By User; Remove Network Overloads

• Improved Average Revenue Per User• New Revenue Based Services (Security, Parental Control, Voice, Video)

• Network Monetization• Transition Value of Content Providers Back To Network Provider (Advertising Revenue)

Control Costs

Network Traffic Control

Infrastructure Security

Appliance Virtualization

Increase $/User

Enable New Services

VoIP, VoD, Wireless data

Upgrade on Demand

Hosted Services

Managed Security Services

Monetize Subscribers

New Revenue Streams

Ad Insertion & Targeting

Tailored Information/Access

Monetize Existing Users

Usage CPM Ad Uplift

New Billing Models

Time

Page 6: © CloudShield Technologies Peder Jungck, CTO & Founder

© CloudShield Technologies

ServiceDelivery

Retail/WholesaleCustomer Purchase Portal

User Purchase of Services.•Media Content•NW ServicesBranding•Retail•Wholesale Provisioning

System

Approval of Purchases• Feature• Customer• Account StatusProvisioning•Data Services

Bob JoeSue Sly

ServiceDelivery

METRO / CO

Page 7: © CloudShield Technologies Peder Jungck, CTO & Founder

© CloudShield Technologies

Thank YouPeder Jungck

CTO & Founder

[email protected]