Light Reading

Arbor Unveils a Network Security 'DVR'

Sarah Thomas
3/18/2014
50%
50%

Network attacks may be increasingly inevitable, but 83% of enterprises say they are unprepared for them, according to new research from Arbor Networks.

In conjunction with the Economist Intelligence Unit, Arbor Networks Inc. surveyed 360 senior business leaders across the globe about the readiness for cyberattacks. The results indicated that they aren't all that ready for attacks, a scary finding since Arbor says that attacks are inevitable and more sophisticated than ever.

In fact, 77% of respondents said they have had an "incident" in the past two years, and 38% have no response plans if future incidents occur. Only 17% of businesses said they were fully prepared for an online security incident, with most leaning on their IT departments to take the lead.

Not surprisingly, security firm Arbor Networks has a way to help enterprises get prepared. The survey results are timed with the launch of Arbor's Prevail Security Analytics, the first product to spring from its acquisition of Packetloop last September.

Arbor describes the big-data platform (cloud-based or on-premises) as a "DVR" for network security, letting enterprises see live network traffic data and play, pause, or rewind it as needed for threat detection, incident response, and security forensics. Tuning in can show them not only when they've been breached, but how they were breached and what systems were affected. (See Defending the Mobile Core.)

Arbor isn't the only one currently making waves in network security:

  • Nokia Networks is opening a Mobile Broadband Security Center in Berlin at which its operator customers, business and research partners, and public authorities can discuss telco-centric security research on mobile broadband. The center will be open for business in the later part of 2014. (See NSN Plans Mobile Broadband Security Center in Berlin.)

  • Deutsche Telekom AG (NYSE: DT) is also jumping on the trend of building a dedicated center for security issues. The carrier is opening an intelligent cyberdefense center at the end of the year to identify cyberattacks "significantly earlier than was previously possible." It's working with Deutsche Telekom's Cyber Emergency Response Team (CERT) to provide network monitoring at the center and with T-Systems International GmbH to develop new cyber-security services.

  • Revenue management vendor CSG Systems International Inc. (Nasdaq: CSGS) has launched CSG Invotas, a new services division focused on enterprise security. The company says Invotas provides "proven automation and orchestration solutions to respond in real time to emerging and ongoing cyber attacks." (See CSG Intros Enterprise Security Business.)

  • Heavy Reading is holding a Mobile Network Security Strategies one-day conference in London on May 21 where senior analyst Patrick Donegan will host a day of discussion and networking devoted to all manner of mobile network security issues. Building on the success of its fall event in New York, the day will focus on how the network can safeguard mobile carriers' network assets while protecting their customers from security attacks. (See Coffee, Tea, or Network Security?, Pics From Mobile Network Security Strategies, and AT&T's Amoroso: LTE, Virtualization & Cloud Mean New Security Challenges.)

    — Sarah Reedy, Senior Editor, Light Reading

    (11)  | 
    Comment  | 
    Print  | 
  • Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
    Page 1 / 2   >   >>
    SarahReedy
    50%
    50%
    SarahReedy,
    User Rank: Blogger
    3/19/2014 | 12:38:21 PM
    Re: Surprised
    I think IT departments take some steps to protect their data and networks, but the crime is so sophisticated that it's hard to be prepared on their level. Target is a good, high-profile example of that.
    SarahReedy
    50%
    50%
    SarahReedy,
    User Rank: Blogger
    3/19/2014 | 12:37:21 PM
    Re: AT&T
    And, in case you were wondering, the top 5 most dangerous celebrities are...

    1) Lilly Collins

    2) Avril Lavigne

    3) Kathy Griffin

    4) Zoe Saldana

    5) Katy Perry
    SarahReedy
    50%
    50%
    SarahReedy,
    User Rank: Blogger
    3/19/2014 | 12:35:25 PM
    AT&T
    Speaking of operators talking about security, I just got an email from AT&T warning about malware from celebrity searches:

    "Cybercriminals use the names of popular celebrities to lure people to sites with malicious software. For instance, when you search for pictures and downloads of Britney Spears or Kathy Griffin you have about a 10% chance of landing on a page that tested positive for spam, adware, viruses, or other malware."

    I think talking about what they are doing to prevent cyber-crime and what you should be doing to do so on your end is only a good thing. If the attitude is that it's inevitable, they should be talking more about how to prevent it or, at least, lessen the impact of it.
    pdonegan67
    50%
    50%
    pdonegan67,
    User Rank: Light Sabre
    3/19/2014 | 9:43:10 AM
    Re: hush hush security
    That would definitely be a step in the right direction but legislative change is also required to loosen up some of the restrictions on carriers sharing attack information Yes it's fraught, yes it can only be done very gingerly, but the status quo is clearly in everybody's worst interests.
    mmmmmj
    50%
    50%
    mmmmmj,
    User Rank: Light Beer
    3/19/2014 | 3:19:39 AM
    Re: hush hush security
    What I see evovling with the likes of solutions from Elastica and others is a way for organizations to share their breaches anonymously and to receive "sanitized"alerts from other organizations. As organizations start to see the benefit of "receiving" they will be more willing to 'giving"
    Mitch Wagner
    50%
    50%
    Mitch Wagner,
    User Rank: Lightning
    3/18/2014 | 6:12:13 PM
    Surprised
    I was surprised to hear 80+ percent of respondents say they're unprepared for security breaches. That's shocking. Although I suppose in the wake of last year's Target and Neiman-Marcus breaches, I ought not to be shocked. 
    Mitch Wagner
    50%
    50%
    Mitch Wagner,
    User Rank: Lightning
    3/18/2014 | 6:10:37 PM
    Re: hush hush security
    Makes sense that businesses would want to keep breaches quiet. They have nothing to gain from that kind of publicity. 
    mendyk
    50%
    50%
    mendyk,
    User Rank: Light Sabre
    3/18/2014 | 4:47:37 PM
    Re: hush hush security
    You should have told me. I would have worn a wire. Just kidding -- but yes, there's a lot to be learned from these sessions.
    SarahReedy
    50%
    50%
    SarahReedy,
    User Rank: Blogger
    3/18/2014 | 4:44:03 PM
    Re: hush hush security
    For sure. I heard the MWC breakfast was a great, productive discussion, but they locked us media types (even their own!) out to create a safe environment to chat about these issues. 
    mendyk
    50%
    50%
    mendyk,
    User Rank: Light Sabre
    3/18/2014 | 4:34:12 PM
    Re: hush hush security
    There's no doubt that security is something that all network operators want to hear about, but few are willing to talk about. Patrick Donegan is doing a good job of getting at least some operators to open up about mobile security issues. His conferences are well worth attending, even if you aren't ready to step up to the microphone.
    Page 1 / 2   >   >>
    Flash Poll
    From The Founder
    Last week I dropped in on "Hotlanta," Georgia to moderate Light Reading's inaugural DroneComm conference – a unique colloquium investigating the potential for drone communications to disrupt the world's telecom ecosystem. As you will see, it was a day of exploration and epiphany...
    LRTV Documentaries
    Verizon's Emmons: SDN Key to Cost-Effective Scaling

    5|22|15   |   03:53   |   (0) comments


    For Verizon and other network operators to ramp up available bandwidth cost effectively, they need to move to SDN and agree on how to do that.
    LRTV Documentaries
    Lack of Universal SDN a Challenge

    5|21|15   |   04:51   |   (3) comments


    Heavy Reading Analyst Sterling Perrin talks about how uncertainty about SDN standards and approaches may be slowing deployment.
    LRTV Custom TV
    Steve Vogelsang Interview: Carrier SDN

    5|20|15   |   05:02   |   (0) comments


    Sterling Perrin speaks to Steve Vogelsang, Alcatel-Lucent CTO for IP Routing & Transport business, about the new Carrier SDN-enabling Network Services Platform and the operator challenges it solves.
    LRTV Custom TV
    Carrier SDN: On-Demand Networks for an On-Demand World

    5|20|15   |   20:52   |   (0) comments


    Steve Vogelsang, Alcatel-Lucent CTO for IP Routing & Transport business, talks about requirements and benefits of Carrier SDN during the keynote address at the Light Reading Carrier SDN event May 2015.
    LRTV Documentaries
    The Security Challenge of SDN

    5|19|15   |   02:52   |   (0) comments


    CenturyLink VP James Feger discusses concerns that virtualization could create new vulnerabilities unless network operators build in safeguards.
    LRTV Custom TV
    NFV Elasticity – Highly Available VNF Scale-Out Architectures for the Mobile Edge

    5|18|15   |   5:50   |   (0) comments


    Peter Marek and Paul Stevens from Advantech Networks and Communications Group talk about their NFV Elasticity initiative and the company's latest platforms for deploying virtual network functions at the edge of the network. Packetarium XL and the new Versatile Server Module: 'designed to reach parts of the network that other servers cannot reach.'
    LRTV Huawei Video Resource Center
    Bay Area Spark Meetup 2015

    5|14|15   |   3:54   |   (0) comments


    Developed in 2009, Apache Spark is a powerful open source processing engine built around speed, ease of use and sophisticated analytics. This spring, Huawei hosted a meetup for Spark developers and data scientists in Santa Clara, California. Light Reading spoke with organizers and attendees about Huawei's code contributions and long-term commitment to Spark.
    LRTV Custom TV
    The Transport SDN Buzz

    5|12|15   |   06:01   |   (1) comment


    Sterling Perrin, senior analyst at Heavy Reading, speaks with Peter Ashwood-Smith of Huawei and Guru Parulkar of ON.Lab about the evolution of transport SDN and the integration of technologies.
    LRTV Custom TV
    Next-Generation CCAP: Cisco cBR-8 Evolved CCAP

    5|5|15   |   04:49   |   (0) comments


    John Chapman, Cisco's CTO of Cable Access Business Unit and Cisco Fellow, explained the innovation design of Cisco's cBR-8, the industry's first Evolved CCAP, including DOCSIS 3.1 design from ground-up, distributed CCAP with Remote PHY and path to virtualization. Cisco's cBR-8 Evolved CCAP is the platform that will last through the transitions.
    LRTV Custom TV
    Meeting the Demands of Bandwidth & Service Group Growth

    5|1|15   |   5:35   |   (0) comments


    Jorge Salinger, Comcast's Vice President of Access Architecture, explains how DOCSIS 3.1 and multi-service CCAP can meet the demands of the bandwidth and service group growth.
    LRTV Custom TV
    DOCSIS 3.1: Transforming Cable From Hardware-Defined Network to Software-Defined Network

    4|29|15   |   03:48   |   (0) comments


    John Chapman, Cisco's CTO of Cable Access Business Unit and Cisco Fellow, explains how DOCSIS 3.1 can transform cable HFC network to a more agile software-defined network.
    LRTV Huawei Video Resource Center
    Predicting Traffic Patterns for Quality Mobile Broadband

    4|29|15   |   6:45   |   (0) comments


    Accessing information ubiquitously creates complexity and creates heavy traffic onto the network, especially at large-scale events like sporting events or festivals. In this video, Huawei's Mohammad Hussain speaks to experts about how to predict traffic and improve user experience during periods of heavy traffic.
    Upcoming Live Events
    June 8, 2015, Chicago, IL
    June 9, 2015, Chicago, IL
    June 9-10, 2015, Chicago, IL
    June 10, 2015, Chicago, IL
    September 29-30, 2015, The Westin Grand Müchen, Munich, Germany
    October 6, 2015, Westin Peachtree Plaza, Atlanta, GA
    November 11-12, 2015, The Westin Peachtree Plaza, Atlanta, GA
    All Upcoming Live Events
    Infographics
    Network functions virtualization (NFV) is not the easiest of topics to take on board, so here's a Light Reading infographic, developed following conversations with the folks at HP, that helps make sense of where NFV is taking the industry.
    Hot Topics
    Choosing a Technology Supplier? Consider Changing Your Selection Criteria
    Steve Saunders, CEO and founder, Light Reading, 5/18/2015
    Verizon Saves 60% Swapping Copper for Fiber
    Sarah Thomas, Editorial Operations Director, 5/19/2015
    Chattanooga Charts Killer Gigabit Apps
    Mari Silbey, Senior Editor, Cable/Video, 5/20/2015
    Smarter 'Dumb' TVs Will Drive OTT Adoption
    Mari Silbey, Senior Editor, Cable/Video, 5/18/2015
    Charter, Bright House: The Wedding's Back On
    Mari Silbey, Senior Editor, Cable/Video, 5/19/2015
    Like Us on Facebook
    Twitter Feed
    Webinar Archive
    BETWEEN THE CEOs - Executive Interviews
    With 200 customers in 60 countries, Stockholm-based Net Insight has carved out a solid leadership position in one of the hottest vertical markets going in comms right now: helping service providers and broadcasters deliver video and other multimedia traffic over IP networks. How has Net Insight managed to achieve this success in the face of immense competition from the industry giants?
    My ongoing interview tour of the leading minds of the telecom industry recently took me to Richardson, Texas, where I met with Rod Naphan, CTO and SVP, Solutions, ...
    I recently popped down to Texas to chat with CEO Eric L. Pratt about his company, Taqua.
    Cats with Phones