Light Reading
Security concerns are changing procurement strategies, claims ATCA platform vendor.

Kontron Capitalizes on Security Jitters

Carolyn Mathas
News Analysis
Carolyn Mathas
2/20/2014
50%
50%

Is it true that telecom equipment companies are basing their purchasing decisions on where the design and development of components and modules takes place?

According to embedded computing platform developer Kontron AG , which undertakes its design and R&D processes in Montreal, Canada, it's already happening: The company, best known for its AdvancedTCA (ATCA) range of modules, claims it's wrestling business away from (unidentified) competitors that have design and development exposure in Asia/Pacific, particularly China.

And if that's more than just a one-off, the implications could be huge for telecom systems vendors and their suppliers.

Sven Freudenfeld, Business Development, Telecom for North America at Kontron, says that, increasingly, customers initiate discussion on where engineering takes place. "As we go further into cloud computing, trust is necessary to build platforms that will be deployed in the cloud. Moving the central office to the cloud where carriers no longer have access to hardware, they're forced to rely on what they don’t control," says Freudenfeld.

"When carriers owned their network hardware, they could handle situations as they arose -- they could see and identify an actual breach," adds Freudenfeld. "Now, with discovery left to third parties, reaction time is stretched out substantially. Carriers are demanding all network platforms -- interfaces, software, firmware, hardware -- be secure."

And for some (many?), China is regarded as posing a security threat, either directly or indirectly. Huawei Technologies Co. Ltd. and ZTE Corp. (Shenzhen: 000063; Hong Kong: 0763) know all about that: They are on the 'not trusted' list in the US, preventing them from supplying telecom equipment to the federal government or US companies. The main concern is that technology developed in China might include hidden back doors that would be used to either eavesdrop or disrupt networks, though no concrete evidence has been forthcoming. (See Nearly Everyone Trusts Us – Huawei CEO, US vs Huawei/ZTE: The Verdict and China Lashes Out at 'Cold War Mentality'.)

Customer concerns are not limited to just steering clear of China, though. Systems vendors are delving deeper into basic design methodology -- how network products are developed. Freudenfeld says there's a need for greater focus on: the design and creation of platforms with security as a central element; regulatory compliance; and the ability to identify weak points in a network.

There are many such weak points, he claims, and these will become more obvious with the introduction of virtualization, for example, or machine-to-machine (M2M) implementations, as each layer and each machine becomes a potential weakness.

And virtualization is going to happen: Indeed, Kontron is embracing it. (See Kontron Integrates OpenStack.)

There's reason to believe that virtualization is a major security concern. At the 2013 RSA Conference in San Francisco, the Cloud Security Alliance identified the Notorious Nine -- the top nine cloud computing threats for 2013. Of the top three concerns, number one is data breaches. In this case, a virtual machine, for example, could use side-channel timing data to extract private cryptographic keys in use by other virtual machines on the same server. The report indicated that one single client application flaw could allow a hacker access to all of the data -- not just that one client's.

The second top concern is data loss -- the kind where data is here and, then, well, it's not. Finally, account or service traffic hijacking. Once a hacker accesses credentials, eavesdropping on transactions and activities, data manipulation, information falsification, and moving clients to illegitimate sites, are all possible.

What cloud computing has done by concentrating a wealth of assets is magnify the consequences of breaches. On one hand, it's a bastion of data sharing -- on the other, a potential nightmare.

"Regulation will be especially important with telecom equipment and delivering the cloud. While there's great potential for software-defined anything --infrastructure, radio, networks -- there’s always a security element," Freudenfeld explained. While working groups and regulatory bodies exist, more progress will be necessary over the near and long term.

The security threat perception isn't limited to China, though, especially amid the NSA headlines and the FBI’s request for Facebook and Google to enable access for US government surveillance. (See Obama Weighs In on NSA Data Collection, Euronews: Merkel's Mad as Hell at NSA and NSA Humor Tops Congressional Hubris.)

Actually implementing back doors, or deliberately compromised telecom equipment, is very rare. It's the accidental vulnerabilities that are more common. But it's not that difficult to believe that Kontron customers are indeed citing security fears for a shift in procurement processes, especially as technology developments move faster than security advances and implementations can keep up with. Technical defenses may still be inadequate or not sufficiently implemented -- and that may leave non-technical ones, such as specifying that design and development take place in a more trusted environment, as the only immediate way to begin to alleviate fears.

— Carolyn Mathas, contributing editor, special to Light Reading

(0)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View
Flash Poll
From The Founder
It's clear to me that the communications industry is divided into two types of people, and only one is living in the real world.
LRTV Custom TV
Razorsight Expert's Advice on Real-Time Analytics

11|27|14   |   1:43   |   (0) comments


Razorsight's powerful cloud-based Predictive Analytics solutions are used by the world's leading communications and media brands to drive smarter decisions, enable faster actions and optimize outcomes. Get expert advice.
LRTV Interviews
From 4G to 5G: Alcatel-Lucent's Dave Geary

11|25|14   |   09:09   |   (1) comment


Dave Geary, President of Wireless at Alcatel-Lucent, talks about the evolution of the 4G market, small cells, partnerships, 5G and the IoT.
LRTV Huawei Video Resource Center
Building a Secure Telefonica Network With Huawei's High-End Firewall

11|24|14   |   4:37   |   (0) comments


Andrew Davies, IP architect of the Telefonica, a leading digital communications company, discusses the Huawei security gateway solution and putting the solution into the testbed.
LRTV Huawei Video Resource Center
Huawei Partners with Spirent to Verify CE12816's 10GE Port & TRILL Networking Capabilities

11|24|14   |   2:50   |   (0) comments


Spirent Communications is the world's leading supplier for telecom testing appliances and solutions. Spirent has been in a close partnership with Huawei for a long time.
LRTV Huawei Video Resource Center
Saudi Airlines & Its ICT Transformation

11|24|14   |   2:07   |   (0) comments


In this video, Saudi Airlines discusses its network problems and how Huawei's Agile Network is its all-in-one solution.
LRTV Huawei Video Resource Center
Huawei's Agile Switch Benefiting Saudi Arabia's Yamamah Hospital

11|24|14   |   2:40   |   (0) comments


Saudi Arabia's Yamamah Hospital speaks about how Huawei's Agile Switch has improved the medical service's network infrastructure.
LRTV Huawei Video Resource Center
FanPlay & Huawei Build a Wireless Agile Smart Stadium

11|24|14   |   2:13   |   (0) comments


FanPlay is a cloud-based white label service, which is effectively a football fan engagement platform underpinned by mobile payment technology.
LRTV Huawei Video Resource Center
Building an Agile Stadium

11|24|14   |   3:54   |   (0) comments


Stadiums may be thousands of tons of concrete and steel, but they now need to be agile. Being at the stadium may not be as alluring as it once was. Sports franchises and stadium operators discuss how to get fans back.
LRTV Huawei Video Resource Center
Huawei Helps ChinaCache Tackle Challenges in the Internet Industry

11|24|14   |   3:09   |   (0) comments


ChinaCache is China's largest content distribution network supplier. Huawei's CE12800 has provided ChinaCache with very strong support in its establishment of an infrastructure network.
LRTV Huawei Video Resource Center
Cefinity on Managed Security Services & Next-Generation Firewall

11|24|14   |   7:05   |   (0) comments


Cefinity is a cloud management service provider in Southeast Asia. Ivan Zhang, CEO of the company, discusses the implementation of security service management in the cloud era.
LRTV Huawei Video Resource Center
Huawei's Agile Gateway in the Eyes of Cefinity

11|24|14   |   2:11   |   (0) comments


Cefinity is a managed service provider for enterprise networks. The company currently uses Huawei's AR series routers for the most complete range of functions. CEO Ivan Zhang speaks about the advantages of the AR series routers.
LRTV Huawei Video Resource Center
CTO of Bus-Online Talks About Huawei's Agile Gateway

11|24|14   |   2:53   |   (0) comments


Bus-Online covers around 100 million users everyday. In addition to providing mobile TV, and advertising services to the public, Bus-Online has also entered the field of mobile Internet.
Upcoming Live Events
December 2, 2014, New York City
December 3, 2014, New York City
December 8-10, 2014, Reykjavik, Iceland
February 10, 2015, Atlanta, GA
April 14, 2015, New York City, NY
May 6, 2015, McCormick Convention Center, Chicago, IL
May 13-14, 2015, The Westin Peachtree, Atlanta, GA
June 9-10, 2015, Chicago, IL
Infographics
Irish Telecom outlines the rise of VoIP technology, including its adoption within businesses and their perception of its quality.
Hot Topics
Net Neutrality Even Mark Cuban Could Love
Mitch Wagner, West Coast Bureau Chief, Light Reading, 11/26/2014
Eurobites: Net Neutrality Battle Looms
Paul Rainford, Assistant Editor, Europe, 11/27/2014
Why 5G Is a Different Beast
Robert Clark, 11/26/2014
New Juniper CEO Can Be Thankful for $14.5M
Mitch Wagner, West Coast Bureau Chief, Light Reading, 11/25/2014
Amazon Eyes Ad-Supported Video – NY Post
Mari Silbey, Independent Technology Editor, 11/25/2014
Like Us on Facebook
Twitter Feed