& cplSiteName &

Arbor Unveils a Network Security 'DVR'

Sarah Thomas
3/18/2014
50%
50%

Network attacks may be increasingly inevitable, but 83% of enterprises say they are unprepared for them, according to new research from Arbor Networks.

In conjunction with the Economist Intelligence Unit, Arbor Networks surveyed 360 senior business leaders across the globe about the readiness for cyberattacks. The results indicated that they aren't all that ready for attacks, a scary finding since Arbor says that attacks are inevitable and more sophisticated than ever.

In fact, 77% of respondents said they have had an "incident" in the past two years, and 38% have no response plans if future incidents occur. Only 17% of businesses said they were fully prepared for an online security incident, with most leaning on their IT departments to take the lead.

Not surprisingly, security firm Arbor Networks has a way to help enterprises get prepared. The survey results are timed with the launch of Arbor's Prevail Security Analytics, the first product to spring from its acquisition of Packetloop last September.

Arbor describes the big-data platform (cloud-based or on-premises) as a "DVR" for network security, letting enterprises see live network traffic data and play, pause, or rewind it as needed for threat detection, incident response, and security forensics. Tuning in can show them not only when they've been breached, but how they were breached and what systems were affected. (See Defending the Mobile Core.)

Arbor isn't the only one currently making waves in network security:

  • Nokia Networks is opening a Mobile Broadband Security Center in Berlin at which its operator customers, business and research partners, and public authorities can discuss telco-centric security research on mobile broadband. The center will be open for business in the later part of 2014. (See NSN Plans Mobile Broadband Security Center in Berlin.)

  • Deutsche Telekom AG (NYSE: DT) is also jumping on the trend of building a dedicated center for security issues. The carrier is opening an intelligent cyberdefense center at the end of the year to identify cyberattacks "significantly earlier than was previously possible." It's working with Deutsche Telekom's Cyber Emergency Response Team (CERT) to provide network monitoring at the center and with T-Systems International GmbH to develop new cyber-security services.

  • Revenue management vendor CSG Systems International Inc. (Nasdaq: CSGS) has launched CSG Invotas, a new services division focused on enterprise security. The company says Invotas provides "proven automation and orchestration solutions to respond in real time to emerging and ongoing cyber attacks." (See CSG Intros Enterprise Security Business.)

  • Heavy Reading is holding a Mobile Network Security Strategies one-day conference in London on May 21 where senior analyst Patrick Donegan will host a day of discussion and networking devoted to all manner of mobile network security issues. Building on the success of its fall event in New York, the day will focus on how the network can safeguard mobile carriers' network assets while protecting their customers from security attacks. (See Coffee, Tea, or Network Security?, Pics From Mobile Network Security Strategies, and AT&T's Amoroso: LTE, Virtualization & Cloud Mean New Security Challenges.)

    — Sarah Reedy, Senior Editor, Light Reading

    (11)  | 
    Comment  | 
    Print  | 
  • Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
    Page 1 / 2   >   >>
    Sarah Thomas
    50%
    50%
    Sarah Thomas,
    User Rank: Blogger
    3/19/2014 | 12:38:21 PM
    Re: Surprised
    I think IT departments take some steps to protect their data and networks, but the crime is so sophisticated that it's hard to be prepared on their level. Target is a good, high-profile example of that.
    Sarah Thomas
    50%
    50%
    Sarah Thomas,
    User Rank: Blogger
    3/19/2014 | 12:37:21 PM
    Re: AT&T
    And, in case you were wondering, the top 5 most dangerous celebrities are...

    1) Lilly Collins

    2) Avril Lavigne

    3) Kathy Griffin

    4) Zoe Saldana

    5) Katy Perry
    Sarah Thomas
    50%
    50%
    Sarah Thomas,
    User Rank: Blogger
    3/19/2014 | 12:35:25 PM
    AT&T
    Speaking of operators talking about security, I just got an email from AT&T warning about malware from celebrity searches:

    "Cybercriminals use the names of popular celebrities to lure people to sites with malicious software. For instance, when you search for pictures and downloads of Britney Spears or Kathy Griffin you have about a 10% chance of landing on a page that tested positive for spam, adware, viruses, or other malware."

    I think talking about what they are doing to prevent cyber-crime and what you should be doing to do so on your end is only a good thing. If the attitude is that it's inevitable, they should be talking more about how to prevent it or, at least, lessen the impact of it.
    pdonegan67
    50%
    50%
    pdonegan67,
    User Rank: Light Sabre
    3/19/2014 | 9:43:10 AM
    Re: hush hush security
    That would definitely be a step in the right direction but legislative change is also required to loosen up some of the restrictions on carriers sharing attack information Yes it's fraught, yes it can only be done very gingerly, but the status quo is clearly in everybody's worst interests.
    mmmmmj
    50%
    50%
    mmmmmj,
    User Rank: Light Beer
    3/19/2014 | 3:19:39 AM
    Re: hush hush security
    What I see evovling with the likes of solutions from Elastica and others is a way for organizations to share their breaches anonymously and to receive "sanitized"alerts from other organizations. As organizations start to see the benefit of "receiving" they will be more willing to 'giving"
    Mitch Wagner
    50%
    50%
    Mitch Wagner,
    User Rank: Lightning
    3/18/2014 | 6:12:13 PM
    Surprised
    I was surprised to hear 80+ percent of respondents say they're unprepared for security breaches. That's shocking. Although I suppose in the wake of last year's Target and Neiman-Marcus breaches, I ought not to be shocked. 
    Mitch Wagner
    50%
    50%
    Mitch Wagner,
    User Rank: Lightning
    3/18/2014 | 6:10:37 PM
    Re: hush hush security
    Makes sense that businesses would want to keep breaches quiet. They have nothing to gain from that kind of publicity. 
    mendyk
    50%
    50%
    mendyk,
    User Rank: Light Sabre
    3/18/2014 | 4:47:37 PM
    Re: hush hush security
    You should have told me. I would have worn a wire. Just kidding -- but yes, there's a lot to be learned from these sessions.
    Sarah Thomas
    50%
    50%
    Sarah Thomas,
    User Rank: Blogger
    3/18/2014 | 4:44:03 PM
    Re: hush hush security
    For sure. I heard the MWC breakfast was a great, productive discussion, but they locked us media types (even their own!) out to create a safe environment to chat about these issues. 
    mendyk
    50%
    50%
    mendyk,
    User Rank: Light Sabre
    3/18/2014 | 4:34:12 PM
    Re: hush hush security
    There's no doubt that security is something that all network operators want to hear about, but few are willing to talk about. Patrick Donegan is doing a good job of getting at least some operators to open up about mobile security issues. His conferences are well worth attending, even if you aren't ready to step up to the microphone.
    Page 1 / 2   >   >>
    From The Founder
    Either we perform a complete 'factory reset' on the way the telecom industry creates and deploys virtualization, or we face the consequences.
    Flash Poll
    Live Streaming Video
    Charting the CSP's Future
    Six different communications service providers join to debate their visions of the future CSP, following a landmark presentation from AT&T on its massive virtualization efforts and a look back on where the telecom industry has been and where it's going from two industry veterans.
    Women in Comms Introduction Videos
    How Diversity Helps Comcast Mirror Its Customer Base

    4|26|17   |   2:55   |   (0) comments


    Diversity brings innovation, creative ideas and a way to reflect the broad spectrum of your customer base, Comcast Director of Customer Experience Jenelle Champlin says.
    LRTV Huawei Video Resource Center
    Mobile Operators & Video

    4|25|17   |     |   (0) comments


    Ovum's Ed Barton discusses the latest mobile operator strategies for mobile video.
    LRTV Custom TV
    Infinera Introduces Instant Network

    4|20|17   |     |   (1) comment


    Mike Capuano, vice president of marketing at Infinera, discusses the advancement from Instant Bandwidth to new Instant Network capabilities, which include Bandwidth License Pools, Moveable Licenses and Automated Capacity Engineering (ACE).
    Women in Comms Introduction Videos
    Vodafone's Eubank on Sponsors, Mentors & Moving On Up

    4|19|17   |   4:25   |   (0) comments


    Vodafone America's Head of Operations Kimberly Eubank breaks down the difference between a sponsor and a mentor and shares why both made a big difference in her career.
    LRTV Custom TV
    NYC Auto Show: Are We Smart Yet?

    4|18|17   |     |   (0) comments


    The auto industry is facing some big transformations as electric vehicles, autonomous technology and connected cars are seen as the future of the industry. During the much-anticipated NY international auto show, there was an emergence of new technology and mobility service on the show floor. Aside from performance, brands like Lincoln, Hyundai, Honda, Mercedes and ...
    LRTV Huawei Video Resource Center
    The Impact of Video

    4|18|17   |     |   (0) comments


    David Mercer from Strategy Analytics discusses the impact of video on current strategies.
    LRTV Custom TV
    Pardeep Kohli Discusses Network Transformation & the Market Opportunity for the 'New' Mavenir Systems

    4|13|17   |     |   (0) comments


    In a brief discussion at MWC 2017, Heavy Reading analyst Adi Kishore talks to Pardeep Kohli, CEO, Mavenir Systems about the creation of the 'new Mavenir' and some of the key challenges facing operators in today's market. A key theme of the discussion centers around operator need for software-only, virtualized solutions and how they will need to adapt to ...
    Women in Comms Introduction Videos
    Tech Maverick Shares Her Tips for Gender Inclusivity

    4|12|17   |   7:28   |   (0) comments


    Wendy Hall Bohling, a corporate escapee, author and gender exclusivity consultant, tells her story of sexism, bias and progress along the road to gender equality in the workforce.
    LRTV Huawei Video Resource Center
    Huawei at MWC 2017

    4|11|17   |     |   (0) comments


    At Mobile World Congress 2017, the biggest mobile industry gathering of the year, Huawei showcased its new innovations and solutions with the theme "Open Road," which focuses on cloud, 5G, operation transformation, videos and consumer-oriented products. Its campaign has been recognized by three awards given by GSMA.
    LRTV Custom TV
    China Telecom NFV Infrastructure on RSD

    4|6|17   |     |   (0) comments


    Lynn Comp, senior director of market development of Intel, is joined by Chong Zhang, storage engineer at Inspur and Ou Li Yan, architect for technology strategies of China Telecom, for a discussion of what NFV brings.
    LRTV Custom TV
    Nokia's IMPACT Software Demo

    4|6|17   |     |   (0) comments


    Khamis Abulgubein of IoT market development at Nokia demonstrates IMPACT (intelligent management platform for all connected things), a software solution with a horizontal approach to managing any device on any application.
    LRTV Custom TV
    Nokia Introduces Virtual Service Router for More Rapid Service

    4|6|17   |     |   (0) comments


    James Cumming, product line manager for virtualized service routers at Nokia, demonstrates how the virtual router based off the Nokia ecosystem changes the network function experience.
    Upcoming Live Events
    May 15-17, 2017, Austin Convention Center, Austin, TX
    May 15, 2017, Brazos Hall - Austin, TX
    May 15, 2017, Austin Convention Center - Austin, TX
    June 6, 2017, The Joule Hotel, Dallas, TX
    All Upcoming Live Events
    Infographics
    With the mobile ecosystem becoming increasingly vulnerable to security threats, AdaptiveMobile has laid out some of the key considerations for the wireless community.
    Hot Topics
    Time for a Telecom Reboot
    Steve Saunders, CEO and founder, Light Reading, 4/19/2017
    Surprise! AT&T Markets 4G Advances as '5G Evolution'
    Dan Jones, Mobile Editor, 4/25/2017
    Did Verizon Outbid AT&T for Straight Path?
    Dan Jones, Mobile Editor, 4/25/2017
    First Year TIPs the Scale Toward Success
    Denise Culver, 4/24/2017
    Unlicensed: It's What's Next for US Mobile Operators
    Dan Jones, Mobile Editor, 4/19/2017
    Like Us on Facebook
    Twitter Feed
    BETWEEN THE CEOs - Executive Interviews
    One of the nice bits of my job (other than the teeny tiny salary, obviously) is that I get to pick and choose who I interview for this slot on the Light Reading home ...
    TEOCO Founder and CEO Atul Jain talks to Light Reading Founder and CEO Steve Saunders about the challenges around cost control and service monetization in the mobile and IoT sectors.
    Live Digital Audio

    Playing it safe can only get you so far. Sometimes the biggest bets have the biggest payouts, and that is true in your career as well. For this radio show, Caroline Chan, general manager of the 5G Infrastructure Division of the Network Platform Group at Intel, will share her own personal story of how she successfully took big bets to build a successful career, as well as offer advice on how you can do the same. We’ll cover everything from how to overcome fear and manage risk, how to be prepared for where technology is going in the future and how to structure your career in a way to ensure you keep progressing. Chan, a seasoned telecom veteran and effective risk taker herself, will also leave plenty of time to answer all your questions live on the air.