& cplSiteName &

Kontron Capitalizes on Security Jitters

Carolyn Mathas
News Analysis
Carolyn Mathas
2/20/2014
50%
50%

Is it true that telecom equipment companies are basing their purchasing decisions on where the design and development of components and modules takes place?

According to embedded computing platform developer Kontron AG , which undertakes its design and R&D processes in Montreal, Canada, it's already happening: The company, best known for its AdvancedTCA (ATCA) range of modules, claims it's wrestling business away from (unidentified) competitors that have design and development exposure in Asia/Pacific, particularly China.

And if that's more than just a one-off, the implications could be huge for telecom systems vendors and their suppliers.

Sven Freudenfeld, Business Development, Telecom for North America at Kontron, says that, increasingly, customers initiate discussion on where engineering takes place. "As we go further into cloud computing, trust is necessary to build platforms that will be deployed in the cloud. Moving the central office to the cloud where carriers no longer have access to hardware, they're forced to rely on what they don’t control," says Freudenfeld.

"When carriers owned their network hardware, they could handle situations as they arose -- they could see and identify an actual breach," adds Freudenfeld. "Now, with discovery left to third parties, reaction time is stretched out substantially. Carriers are demanding all network platforms -- interfaces, software, firmware, hardware -- be secure."

And for some (many?), China is regarded as posing a security threat, either directly or indirectly. Huawei Technologies Co. Ltd. and ZTE Corp. (Shenzhen: 000063; Hong Kong: 0763) know all about that: They are on the 'not trusted' list in the US, preventing them from supplying telecom equipment to the federal government or US companies. The main concern is that technology developed in China might include hidden back doors that would be used to either eavesdrop or disrupt networks, though no concrete evidence has been forthcoming. (See Nearly Everyone Trusts Us – Huawei CEO, US vs Huawei/ZTE: The Verdict and China Lashes Out at 'Cold War Mentality'.)

Customer concerns are not limited to just steering clear of China, though. Systems vendors are delving deeper into basic design methodology -- how network products are developed. Freudenfeld says there's a need for greater focus on: the design and creation of platforms with security as a central element; regulatory compliance; and the ability to identify weak points in a network.

There are many such weak points, he claims, and these will become more obvious with the introduction of virtualization, for example, or machine-to-machine (M2M) implementations, as each layer and each machine becomes a potential weakness.

And virtualization is going to happen: Indeed, Kontron is embracing it. (See Kontron Integrates OpenStack.)

There's reason to believe that virtualization is a major security concern. At the 2013 RSA Conference in San Francisco, the Cloud Security Alliance identified the Notorious Nine -- the top nine cloud computing threats for 2013. Of the top three concerns, number one is data breaches. In this case, a virtual machine, for example, could use side-channel timing data to extract private cryptographic keys in use by other virtual machines on the same server. The report indicated that one single client application flaw could allow a hacker access to all of the data -- not just that one client's.

The second top concern is data loss -- the kind where data is here and, then, well, it's not. Finally, account or service traffic hijacking. Once a hacker accesses credentials, eavesdropping on transactions and activities, data manipulation, information falsification, and moving clients to illegitimate sites, are all possible.

What cloud computing has done by concentrating a wealth of assets is magnify the consequences of breaches. On one hand, it's a bastion of data sharing -- on the other, a potential nightmare.

"Regulation will be especially important with telecom equipment and delivering the cloud. While there's great potential for software-defined anything --infrastructure, radio, networks -- there’s always a security element," Freudenfeld explained. While working groups and regulatory bodies exist, more progress will be necessary over the near and long term.

The security threat perception isn't limited to China, though, especially amid the NSA headlines and the FBI’s request for Facebook and Google to enable access for US government surveillance. (See Obama Weighs In on NSA Data Collection, Euronews: Merkel's Mad as Hell at NSA and NSA Humor Tops Congressional Hubris.)

Actually implementing back doors, or deliberately compromised telecom equipment, is very rare. It's the accidental vulnerabilities that are more common. But it's not that difficult to believe that Kontron customers are indeed citing security fears for a shift in procurement processes, especially as technology developments move faster than security advances and implementations can keep up with. Technical defenses may still be inadequate or not sufficiently implemented -- and that may leave non-technical ones, such as specifying that design and development take place in a more trusted environment, as the only immediate way to begin to alleviate fears.

— Carolyn Mathas, contributing editor, special to Light Reading

(0)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
From The Founder
Cisco's Conrad Clemson, recently promoted to head up the company's Service Provider Apps & Platforms developments, talks to Light Reading's Founder and CEO Steve Saunders about how he's bringing cloud video, mobile and virtualization together to empower network operators.
Flash Poll
Live Streaming Video
Charting the CSP's Future
Six different communications service providers join to debate their visions of the future CSP, following a landmark presentation from AT&T on its massive virtualization efforts and a look back on where the telecom industry has been and where it's going from two industry veterans.
LRTV Custom TV
ADVA Talks Innovation & the Future of Networking

1|17|17   |     |   (0) comments


Ray Le Maistre and Christoph Glingener, CTO of ADVA Optical Networking, discuss the current state of the industry, cooperation and collaboration, open innovation and the future of networking.
LRTV Custom TV
Cisco's Infinite Video Platform

1|17|17   |     |   (0) comments


Cisco's Infinite Video Platform allows service providers to deliver broadcast-quality video over IP networks. Infinite video supports many devices, from 4K TVs to tablets to game consoles. Join Cisco's Rajeev Raman for a brief tour and live demo.
LRTV Interviews
Masergy: Ability to Adapt Key for NFV

1|16|17   |   6:40   |   (0) comments


Speaking at Light Reading's 2020 Vision in Rome, Masergy's VP, Global Technology, Ray Watson, said agility is key to providing the mix and match NFV-based services that are driving business for the managed service provider today.
LRTV Interviews
Equinix: The Data Explosion

1|13|17   |   4:16   |   (0) comments


At Light Reading's 2020 Vision in Rome, Eric Schwartz, president of EMEA, Equinix, talked about how Equinix is helping its customers manage the influx of data today, and how it's preparing for a future filled with millions of connected IoT devices.
LRTV Interviews
Heavy Reading: The Changing Data Center Landscape

1|12|17   |   6:05   |   (1) comment


At Light Reading's 2020 Vision event in Rome, Heavy Reading's Senior Analyst Roz Roseboro talks about how virtualization is impacting data center evolution and how that evolution is affecting the relationship between service providers, data center operators and public cloud providers.
LRTV Interviews
Boingo: Prepping for Millions of Devices

1|12|17   |   5:07   |   (1) comment


At Light Reading's 2020 Vision in Rome, Boingo's CTO Derek Peterson discusses how wireless operators will address the needs of low-bandwidth and high-bandwidth apps at the same time, the need for more MHz, the impact of IoT and more.
LRTV Interviews
Comcast Shows Off Gig Gateway at CES

1|11|17   |     |   (1) comment


With its largest presence at CES in years, Comcast took the wraps off its long-awaited gigabit gateway and a new platform for managing the home WiFi network. Light Reading Senior Editor Mari Silbey sat down with EVP Chris Satchell to discuss the latest Comcast advance, and met with VP of Product Strategy and Development Andrea Peiro to walk through a demo of the ...
LRTV Interviews
Colt: End-to-End Key for 2017

1|10|17   |   6:21   |   (0) comments


At Light Reading's 2020 Vision Executive Summit in Rome, Nico Fischbach of Colt said having a multi-carrier, end-to-end service proposition is going to be key for 2017 -- and SD-WAN is instrumental in making it happen.
From the Founder
Cisco's Clemson on Mobile Cloud Video

1|9|17   |     |   (1) comment


Cisco's Conrad Clemson, recently promoted to head up the company's Service Provider Apps & Platforms developments, talks to Light Reading's Founder and CEO Steve Saunders about how he's bringing cloud video, mobile and virtualization together to empower network operators. "If you think about where we're going… whether it's a mobile application, or a video ...
LRTV Custom TV
VMware Telco NFV Solutions – Preparing for 5G & IOT

1|9|17   |     |   (0) comments


Shekar Ayyar, EVP & Corporate Strategy/General Manager of Telco for VMware, discusses VMware's Telco NFV solutions role and foundation for the Imminent Arrival of 5G & IOT.
LRTV Interviews
Heavy Reading: Big Video Set to Disrupt

1|6|17   |   4:39   |   (0) comments


At Light Reading's 2020 Vision Executive Summit in Rome, Heavy Reading's Adi Kishore talks about the challenges of managing and monetizing bandwidth-intensive video, and how service providers will need to transform their networks to cope with the big video explosion.
LRTV Interviews
Heavy Reading: IoT Set to Disrupt

1|5|17   |   7:07   |   (0) comments


Heavy Reading's Senior Analyst of IoT, Steve Bell, tells Light Reading how the Internet of Things (IoT) will transform service provider markets, business models and mindsets, and how virtualizing the network core and Fog networking is key to meeting the agility and flexibility demands of IoT in the future.
Upcoming Live Events
May 15-17, 2017, Austin Convention Center, Austin, TX
All Upcoming Live Events
Infographics
Hot Topics
Ericsson: 5G Heralds 'New' New Economy
Mari Silbey, Senior Editor, Cable/Video, 1/12/2017
Next Plugfest Gets G.fast Closer to Market
Brian Santo, Senior editor, Test & Measurement / Components, Light Reading, 1/13/2017
Growing Pains Will Force Telcos to Shape Up
Iain Morris, News Editor, 1/17/2017
TV's Paradox: No HDR Without 4K
Mari Silbey, Senior Editor, Cable/Video, 1/17/2017
IBM, FDA Look to Blockchain to Secure Health Records
Scott Ferguson, Editor, Enterprise Cloud, 1/12/2017
Like Us on Facebook
Twitter Feed
BETWEEN THE CEOs - Executive Interviews
Light Reading founder and CEO Steve Saunders chats with Sportlogiq CEO Craig Buntin about sports data analysis.
Eyal Waldman, CEO of Mellanox Technologies, speaks to Steve Saunders, CEO of Light Reading, for an exclusive interview about the 100 GB cable challenge, cybersecurity and much more.
Animals with Phones
Live Digital Audio

Playing it safe can only get you so far. Sometimes the biggest bets have the biggest payouts, and that is true in your career as well. For this radio show, Caroline Chan, general manager of the 5G Infrastructure Division of the Network Platform Group at Intel, will share her own personal story of how she successfully took big bets to build a successful career, as well as offer advice on how you can do the same. We’ll cover everything from how to overcome fear and manage risk, how to be prepared for where technology is going in the future and how to structure your career in a way to ensure you keep progressing. Chan, a seasoned telecom veteran and effective risk taker herself, will also leave plenty of time to answer all your questions live on the air.