& cplSiteName &

Deutsche Telekom Aims for Security Advantage

Michelle Donegan
News Analysis
Michelle Donegan
4/15/2014
50%
50%

Long before anyone knew who Edward Snowden was, Deutsche Telekom had been one of the most vocal and active telecom operators on network security and data privacy issues. Now the operator wants to turn its security experience into a service advantage.

Deutsche Telekom AG (NYSE: DT) was one of the first operators to implement IPSec in its LTE networks, ahead of operators in South Korea and the US, and it also led the way with deploying the latest A5/3 encryption standard in all its mobile networks in Germany.

The revelation of extensive US government surveillance activities was an extra impetus for Deutsche Telekom to bang the security drum even louder. For an operator that is still 32% owned by the German government (the state directly owns 14.5% of the company and state-owned bank KfW owns 17.4%), the allegation that even Chancellor Angela Merkel's mobile phone was being monitored is a mighty big deal. So much so that the company is the chief proponent of the controversial proposal to create what it calls an "Internet of Short Distances," in which Internet traffic with senders and receivers in Europe (specifically, the Schengen Area) stays in Europe. (See Euronews: Merkel Moots US Data Bypass and Euronews: Prism a Wake-up Call, Says DT.)

But one of the results of Snowden's revelations is greater awareness among the general public about privacy and security. And that's what Deutsche Telekom is hoping to tap into with new products and services that are aimed at alleviating the growing security concerns of its customers.

"As we see a much higher sensitivity for security issues among our customers, we are convinced that we can make data privacy and security a unique selling point," says Thomas Tschersich, senior vice president technical security at Deutsche Telekom, in an emailed reply to Light Reading.

To that end, the operator has started offering an encrypted e-mail service through the "E-mail Made in Germany" initiative. It has also been working with Mozilla for the last year on a project called "Future of Mobile Privacy," whereby the Firefox OS is customized so that users can individually define their privacy settings and determine their level of data protection. Users can decide how much location data is given to app vendors, for instance. Some of these types of functions will be embedded in upcoming versions of the OS, although the operator did not specify when the features would be available.

And judging from the operator's showing at last month's CeBIT technology fair in Hanover, Germany, there are more security services and devices up its sleeve, including early warning systems for customers; the CipherCloud encryption tool for enterprises to protect their data before it is sent to the cloud; a malware protection app for smartphones, a so-called "two-sphere" smartphone that operates in either a secure, closed mode, or open mode, an encryption app for business users; as well as the "SiMKo3" super-secure smartphone that has a security level of "Classified -- for official use only" as certified by the Federal Office for Information Security (BSI).

"We've made security a design principle," says Tschersich. "We integrate security and privacy into the early stage of the product and system development."

Attacks arise everywhere; no need to panic
When it comes to the day-to-day task of defending its networks, Tschersich explains that DT has a Security Dashboard that monitors output from 180 sensors -- so-called "honeypots" -- that it has deployed worldwide in order to attract attacks onto systems that are isolated from its actual network infrastructure. In this way, the operator can monitor the risk situation on the Internet.

According to Tschersich, the Security Dashboard shows that attacks arrives from all over the globe.

"They appear every second, daily up to 800,000 times," he says. "The latest novelty in trends is the rising number of attacks against smartphones."

Using its sensor network, DT simulated a "jailbroken" iPhone (that is, an iPhone without security limitations, he explains) that was connected to the sensor network. The iPhone was attacked 300,000 times per year, and once per day with success, according to Tschersich, with attackers trying to extract contact information from the address book.

Tschersich said that the main reasons for all attacks are outdated software products.

"Too many users still don't consider their smartphones as high performance devices which have to be protected like the computer at home," he says. "There's no need to panic, though: 90% of the attacks can be averted successfully through properly maintained, updated systems."

— Michelle Donegan, contributing editor, Light Reading

(5)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
Mitch Wagner
50%
50%
Mitch Wagner,
User Rank: Lightning
4/16/2014 | 4:32:49 PM
Re: DT's heartbleed
SarahReedy - Still, it's a marketing failure. If you just had a plane crash, it's a bad time to advertise based on safety, even if your overall safety record is good. 
Sarah Thomas
50%
50%
Sarah Thomas,
User Rank: Blogger
4/15/2014 | 6:22:42 PM
Re: DT's heartbleed
Or smart marketing to divert attention from the fact that he works for T-Systems, a DT division. He didn't work for DT when it happened though, and he was working to protect the platform, so it's possible the two are entirely unrelated. Timing seems suspect though.
Mitch Wagner
50%
50%
Mitch Wagner,
User Rank: Lightning
4/15/2014 | 5:25:37 PM
Re: DT's heartbleed
I see this as less a matter of trying to get ahead of the Heartbleed issue, and more a marketing failure. If one of your engineers released the worst vulnerability in the history of the Internet, now's not the time to tout your own security. 
Phil_Britt
50%
50%
Phil_Britt,
User Rank: Light Sabre
4/15/2014 | 2:39:30 PM
Re: DT's heartbleed
Could be a little quick covering by DT, which is a lot smarter than trying to hide the Heartbleed issue and having someone else uncover it. But Hearbleed notwithstanding, anything that can aid privacy these days is welcome.
Sarah Thomas
50%
50%
Sarah Thomas,
User Rank: Blogger
4/15/2014 | 12:47:12 PM
DT's heartbleed
Hmm. DT's messaging is kind of funny coming at the same time it was revealed that hte programmer who (accidentially) caused the Heartbleed bug works at DT now... http://www.4-traders.com/DEUTSCHE-TELEKOM-AG-444661/news/Deutsche-Telekom--Programmer-Says-Flub-Not-Ill-Intent-Behind-Heartbleed-Bug-18247889/
Educational Resources
sponsor supplied content
Educational Resources Archive
Light Reading’s Upskill U is a FREE, interactive, online educational resource that delivers must-have education on themes that relate to the overall business transformation taking place in the communications industry.
NEXT COURSE
Friday, September 30, 1:00PM EDT
Gigabit & the Great Migration
Robert Howald, Vice President, Network Architecture, Comcast
UPCOMING COURSE SCHEDULE
Wednesday, October 5, 1:00PM EDT
Gigabit & Smart Cities
Joe Kochan, COO & Co-Founder, US Ignite
Friday, October 7, 1:00PM EDT
Gigabit & DOCSIS 3.1
Ty Pearman, Director, Access Architecture, Comcast
Wednesday, October 19, 1:00PM EDT
Securing a Virtual World
Rita Marty, Executive Director, Mobility and Cloud Security, Chief Security Office, AT&T
in association with:
From The Founder
Light Reading today starts a new voyage as part of a larger Enterprise.
Flash Poll
Live Streaming Video
Charting the CSP's Future
Six different communications service providers join to debate their visions of the future CSP, following a landmark presentation from AT&T on its massive virtualization efforts and a look back on where the telecom industry has been and where it's going from two industry veterans.
LRTV Interviews
CenturyLink: SDN/NFV Pose New Interconnection Possibilities

9|28|16   |   04:37   |   (0) comments


Network operators should develop new APIs and business processes for reselling virtual assets to each other, says CenturyLink's Bill Walker. That will enable them to build digital business portfolios that help them avoid becoming commodity transport providers.
LRTV Interviews
Level 3: Overcoming Terror of Being Supplier, Integrator & Developer

9|28|16   |     |   (0) comments


At Light Reading's NFV & Carrier SDN event in Denver, Travis Ewert of Level 3 Communications said there is terror in becoming supplier, integrator and developer, but it can be overcome and be cost effective.
LRTV Custom TV
Introducing IoT World News

9|27|16   |   01:43   |   (0) comments


Self-driving cars, medical sensors, smart cities... and refrigerators. In order to address the huge scope of IoT, KNect365 has created a unique online community that will help businesses to understand and monetize the opportunities that live within the IoT market. We look forward to welcoming you to IoT World News -- your gateway to a better connected future.
LRTV Interviews
AT&T: Re-usable Functions Next NFV Key

9|27|16   |   06:03   |   (0) comments


The next generation of NFV has to break functions down into re-usable software chunks, making everything much more cloud-like.
LRTV Interviews
Masergy on Security: Attackers Gaining Upper Hand

9|27|16   |   5:10   |   (2) comments


At Light Reading's NFV & Carrier SDN event in Denver, Ray Watson, vice president of Global Technology at Masergy, says that because of the growth in virtualization, the threat landscape is shifting in favor of the attackers. As a result, service providers need to think beyond just defending the perimeter and take a more holistic approach to security.
LRTV Interviews
Verizon Takes Next Step on Biz Virtualization Journey

9|26|16   |   4:38   |   (2) comments


At September's NFV & Carrier SDN event in Denver, Light Reading sat down with Victoria Lonker, director of Product and New Business Innovation at Verizon, to chat about where the carrier is with delivering virtualized services to business customers.
LRTV Interviews
Global Services: The $40B Face-Off

9|26|16   |   05:53   |   (1) comment


More service providers than ever before are battling it out to win a slice of what is now a $40 billion global communications services pie, explains Ovum Principal Analyst David Molony.
LRTV Documentaries
MEC Congress: The Key Takeaways

9|22|16   |   03:25   |   (3) comments


Three key takeaways from the Mobile Edge Computing (MEC) Congress in Munich, Germany.
Wagner’s Ring
Time to Shut Up About 'Dumb Pipes'

9|22|16   |     |   (12) comments


Service providers can't compete with OTT players. It just isn't in their DNA. Instead, service providers need to embrace what they're good at -- providing reliable, secure connectivity.
Wagner’s Ring
Keeping Your Tech Career Going After 50

9|21|16   |     |   (13) comments


How do you keep your career moving forward when you're past the half-century mark?
LRTV Interviews
Peering Into the Digital Future

9|20|16   |   04:25   |   (0) comments


Nick Thomas, practice leader of digital media at Ovum, talks about how digital transformation in the technology, media and telecom sectors will enable the development of a new range of applications and services for enterprises and consumers and how the upcoming Digital Futures event in London will examine ...
LRTV Custom TV
Napatech Tackles NFV's Major Challenge

9|7|16   |   08:42   |   (0) comments


One of the main challenges for network operators introducing NFV is to combine performance and flexibility in a cost-effective way, but there is a solution, explains Napatech's Dan Joe Barry.
Upcoming Live Events
November 3, 2016, The Montcalm Marble Arch, London
November 30, 2016, The Westin Times Square, New York City
December 1, 2016, The Westin Times Square, New York, NY
December 6-8, 2016, The Westin Excelsior, Rome
May 16-17, 2017, Austin Convention Center, Austin, TX
All Upcoming Live Events
Infographics
Hot Topics
Verizon CFO: Eat Our (Fixed) 5G Dust!
Dan Jones, Mobile Editor, 9/22/2016
WiCipedia: The Women Helping Women Edition
Eryn Leavens, Special Features & Copy Editor, 9/23/2016
Eurobites: Telefónica Taps Juniper for Network Security
Paul Rainford, Assistant Editor, Europe, 9/26/2016
Open Source Getting on My Nerves
Carol Wilson, Editor-at-large, 9/26/2016
Google, Facebook Gaining Network Equipment Clout
Patrick Donegan, Chief Analyst, Heavy Reading, 9/26/2016
Like Us on Facebook
Twitter Feed
BETWEEN THE CEOs - Executive Interviews
Light Reading CEO Steve Saunders and UXP Systems CEO Gemini Waghmare discuss the strategic importance of digital identity for operators in the midst of transformation.
Join us for an in-depth interview between Steve Saunders of Light Reading and Alexis Black Bjorlin of Intel as they discuss the release of the company's Silicon Photonics platform, its performance, long-term prospects, customer expectations and much more.
Animals with Phones
There's Nothing Like Missing a Full Minute of Pokémon Go Click Here
Live Digital Audio

A vital part of increasing the number of women in comms is transforming the ways companies can support and empower women. While progressive company policies that support both men and women in achieving work-life balance are a step in the right direction, creating a company culture that supports those policies can at times be more challenging.

During this show, we'll talk to Lynn Comp, Senior Director of Industry and Sales Enabling (ISE) in the Network Platforms Group at Intel, about why those challenges exist and how companies can overcome them. She'll provide insight into how Intel has worked to create a culture that supports work-life balance, and provide steps and guidance for other companies wishing to do the same. We will also leave plenty of time to get your questions answered live on the air.