& cplSiteName &

Deutsche Telekom Aims for Security Advantage

Michelle Donegan
News Analysis
Michelle Donegan
4/15/2014
50%
50%

Long before anyone knew who Edward Snowden was, Deutsche Telekom had been one of the most vocal and active telecom operators on network security and data privacy issues. Now the operator wants to turn its security experience into a service advantage.

Deutsche Telekom AG (NYSE: DT) was one of the first operators to implement IPSec in its LTE networks, ahead of operators in South Korea and the US, and it also led the way with deploying the latest A5/3 encryption standard in all its mobile networks in Germany.

The revelation of extensive US government surveillance activities was an extra impetus for Deutsche Telekom to bang the security drum even louder. For an operator that is still 32% owned by the German government (the state directly owns 14.5% of the company and state-owned bank KfW owns 17.4%), the allegation that even Chancellor Angela Merkel's mobile phone was being monitored is a mighty big deal. So much so that the company is the chief proponent of the controversial proposal to create what it calls an "Internet of Short Distances," in which Internet traffic with senders and receivers in Europe (specifically, the Schengen Area) stays in Europe. (See Euronews: Merkel Moots US Data Bypass and Euronews: Prism a Wake-up Call, Says DT.)

But one of the results of Snowden's revelations is greater awareness among the general public about privacy and security. And that's what Deutsche Telekom is hoping to tap into with new products and services that are aimed at alleviating the growing security concerns of its customers.

"As we see a much higher sensitivity for security issues among our customers, we are convinced that we can make data privacy and security a unique selling point," says Thomas Tschersich, senior vice president technical security at Deutsche Telekom, in an emailed reply to Light Reading.

To that end, the operator has started offering an encrypted e-mail service through the "E-mail Made in Germany" initiative. It has also been working with Mozilla for the last year on a project called "Future of Mobile Privacy," whereby the Firefox OS is customized so that users can individually define their privacy settings and determine their level of data protection. Users can decide how much location data is given to app vendors, for instance. Some of these types of functions will be embedded in upcoming versions of the OS, although the operator did not specify when the features would be available.

And judging from the operator's showing at last month's CeBIT technology fair in Hanover, Germany, there are more security services and devices up its sleeve, including early warning systems for customers; the CipherCloud encryption tool for enterprises to protect their data before it is sent to the cloud; a malware protection app for smartphones, a so-called "two-sphere" smartphone that operates in either a secure, closed mode, or open mode, an encryption app for business users; as well as the "SiMKo3" super-secure smartphone that has a security level of "Classified -- for official use only" as certified by the Federal Office for Information Security (BSI).

"We've made security a design principle," says Tschersich. "We integrate security and privacy into the early stage of the product and system development."

Attacks arise everywhere; no need to panic
When it comes to the day-to-day task of defending its networks, Tschersich explains that DT has a Security Dashboard that monitors output from 180 sensors -- so-called "honeypots" -- that it has deployed worldwide in order to attract attacks onto systems that are isolated from its actual network infrastructure. In this way, the operator can monitor the risk situation on the Internet.

According to Tschersich, the Security Dashboard shows that attacks arrives from all over the globe.

"They appear every second, daily up to 800,000 times," he says. "The latest novelty in trends is the rising number of attacks against smartphones."

Using its sensor network, DT simulated a "jailbroken" iPhone (that is, an iPhone without security limitations, he explains) that was connected to the sensor network. The iPhone was attacked 300,000 times per year, and once per day with success, according to Tschersich, with attackers trying to extract contact information from the address book.

Tschersich said that the main reasons for all attacks are outdated software products.

"Too many users still don't consider their smartphones as high performance devices which have to be protected like the computer at home," he says. "There's no need to panic, though: 90% of the attacks can be averted successfully through properly maintained, updated systems."

— Michelle Donegan, contributing editor, Light Reading

(5)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
Mitch Wagner
50%
50%
Mitch Wagner,
User Rank: Lightning
4/16/2014 | 4:32:49 PM
Re: DT's heartbleed
SarahReedy - Still, it's a marketing failure. If you just had a plane crash, it's a bad time to advertise based on safety, even if your overall safety record is good. 
Sarah Thomas
50%
50%
Sarah Thomas,
User Rank: Blogger
4/15/2014 | 6:22:42 PM
Re: DT's heartbleed
Or smart marketing to divert attention from the fact that he works for T-Systems, a DT division. He didn't work for DT when it happened though, and he was working to protect the platform, so it's possible the two are entirely unrelated. Timing seems suspect though.
Mitch Wagner
50%
50%
Mitch Wagner,
User Rank: Lightning
4/15/2014 | 5:25:37 PM
Re: DT's heartbleed
I see this as less a matter of trying to get ahead of the Heartbleed issue, and more a marketing failure. If one of your engineers released the worst vulnerability in the history of the Internet, now's not the time to tout your own security. 
Phil_Britt
50%
50%
Phil_Britt,
User Rank: Light Sabre
4/15/2014 | 2:39:30 PM
Re: DT's heartbleed
Could be a little quick covering by DT, which is a lot smarter than trying to hide the Heartbleed issue and having someone else uncover it. But Hearbleed notwithstanding, anything that can aid privacy these days is welcome.
Sarah Thomas
50%
50%
Sarah Thomas,
User Rank: Blogger
4/15/2014 | 12:47:12 PM
DT's heartbleed
Hmm. DT's messaging is kind of funny coming at the same time it was revealed that hte programmer who (accidentially) caused the Heartbleed bug works at DT now... http://www.4-traders.com/DEUTSCHE-TELEKOM-AG-444661/news/Deutsche-Telekom--Programmer-Says-Flub-Not-Ill-Intent-Behind-Heartbleed-Bug-18247889/
From The Founder
Kicking off BCE 2017, Light Reading founder Steve Saunders lays blame for NFV's slow ramp-up and urges telecom to return to old-fashioned standards building and interoperability.
Flash Poll
Live Streaming Video
Charting the CSP's Future
Six different communications service providers join to debate their visions of the future CSP, following a landmark presentation from AT&T on its massive virtualization efforts and a look back on where the telecom industry has been and where it's going from two industry veterans.
LRTV Interviews
CenturyLink: Let's Get Past SD-WAN Hype

6|23|17   |   04:02   |   (0) comments


Technology becomes a "shiny object" unless it's properly focused on solving business needs for enterprise customers, says Bill Grubbs, network solutions architect for CenturyLink. He explains to Light Reading why SD-WAN deployments have to be tailored to specific needs – and more.
Women in Comms Introduction Videos
Infinera's Sales Director Paints Tech's Big Picture

6|21|17   |   4:14   |   (1) comment


Shannon Williams, Infinera's director of sales, shares how she achieves work's many balancing acts -- between her role and the broader company, today and tomorrow's tech and more.
LRTV Custom TV
SD-WAN Innovation & Trends

6|20|17   |     |   (0) comments


Versa CEO Kelly Ahuja discusses with Carol Wilson the current status and trends in the SD-WAN market, Versa's innovation around building a software platform with broad contextualization, and the advantages that startups can bring to the SD-WAN market.
LRTV Interviews
Ovum's Dario Talmesio on 5G in Europe

6|20|17   |   02:16   |   (0) comments


At 5G World 2017, Dario Talmesio, principal analyst and practice leader on Ovum's fixed and mobile telecoms European team, explains the emerging trends amongst European operators as they prepare for 5G.
LRTV Custom TV
Putting Power on a Pedestal

6|19|17   |     |   (0) comments


ARRIS's John Ulm says a major accomplishment of SCTE•ISBE's Energy 2020 program is increased focus on power cost and consumption, including inclusion of energy requirements in operators' RFPs and RFIs.
LRTV Custom TV
Gigabit Access: The Last-Mile Pipe for All Future Services

6|19|17   |     |   (0) comments


A Gigabit access platform being deployed today must be able to deliver all types of services to an increasing number of devices. A non-blocking architecture is necessary to support the ever-increasing growth in bandwidth demand. The Huawei Gigabit access solution is based on a distributed design that is fully scalable to deliver a unprecedented performance.
LRTV Custom TV
Key Factors to Successfully Deploy an SD-WAN Service

6|19|17   |     |   (0) comments


As service providers transition their SD-WAN solution from trials and limited deployments into production at large scale, there are important considerations to successfully operationalize these solutions and realize their full potential, without adding complexity, introducing uncertainty or disrupting current business operations. Sunil Khandekar, CEO and Founder ...
LRTV Custom TV
IoT Solutions: Rational Exuberance

6|19|17   |     |   (0) comments


IoT solutions are morphing from hype into viable business opportunities. Huawei has the platform and ecosystem support to help carriers successfully address new business opportunities in the IoT space.
LRTV Custom TV
Realizing ICN as a Network Slice for Mobile Data Distribution

6|19|17   |     |   (1) comment


Network slicing in 5G allows the potential introduction of new network architectures such as Information-centric Networks (ICN) as a slice, managed over a shared pool of compute, storage and bandwidth resource. Services over an ICN slice can benefit from many architectural features such as Name Based Networking, Security, Multicasting, Multi-homing, Mobility, ...
LRTV Interviews
Ovum's Mike Roberts on 5G Uptake

6|19|17   |   04:08   |   (0) comments


Mike Roberts, research director for Ovum's service provider markets group, explains why he has boosted his 5G subscriptions forecast.
LRTV Interviews
AT&T's Hubbard on Intersection of SD-WAN & MPLS

6|15|17   |     |   (0) comments


Rick Hubbard, SVP of Network Product Management for AT&T Business Solutions, discusses how AT&T's approach to SD-WAN fits in with its overall virtualization strategy, explains how SD-WAN can improve enterprise customers' use of the cloud and addresses the intersection of SD-WAN and MPLS.
Telecom Innovators Video Showcase
Keep Connected IoT Devices Under Control With Allot

6|15|17   |     |   (0) comments


Allot AVP of International Pre-Sales, Daniel Keidar, explains how communications service providers can protect infrastructure and service availability from flooding attacks caused by malfunctioning or bot-infected devices connected to their network.
Upcoming Live Events
October 18, 2017, Colorado Convention Center - Denver, CO
November 1, 2017, The Montcalm Marble Arch
November 1, 2017, The Montcalm Marble Arch
November 30, 2017, The Westin Times Square
All Upcoming Live Events
Infographics
With the mobile ecosystem becoming increasingly vulnerable to security threats, AdaptiveMobile has laid out some of the key considerations for the wireless community.
Hot Topics
Netflix's Lesson in Culture Expectation Settings
Sarah Thomas, Director, Women in Comms, 6/21/2017
No Imagination: UK Chip Biz Goes Up for Sale
Iain Morris, News Editor, 6/22/2017
Kalanick Steps Down as Uber CEO
Sarah Thomas, Director, Women in Comms, 6/21/2017
BT Tech Chief Makes Plea to 5G Chip Vendors
Ray Le Maistre, International Group Editor, 6/20/2017
Like Us on Facebook
Twitter Feed
BETWEEN THE CEOs - Executive Interviews
Following a recent board meeting, the New IP Agency (NIA) has a new strategy to help accelerate the adoption of NFV capabilities, explains the Agency's Founder and Secretary, Steve Saunders.
One of the nice bits of my job (other than the teeny tiny salary, obviously) is that I get to pick and choose who I interview for this slot on the Light Reading home ...
Animals with Phones
Some of You Can Relate Click Here
Latest Comment
Live Digital Audio

Playing it safe can only get you so far. Sometimes the biggest bets have the biggest payouts, and that is true in your career as well. For this radio show, Caroline Chan, general manager of the 5G Infrastructure Division of the Network Platform Group at Intel, will share her own personal story of how she successfully took big bets to build a successful career, as well as offer advice on how you can do the same. We’ll cover everything from how to overcome fear and manage risk, how to be prepared for where technology is going in the future and how to structure your career in a way to ensure you keep progressing. Chan, a seasoned telecom veteran and effective risk taker herself, will also leave plenty of time to answer all your questions live on the air.