Light Reading

Arbor Unveils a Network Security 'DVR'

Sarah Thomas
3/18/2014
50%
50%

Network attacks may be increasingly inevitable, but 83% of enterprises say they are unprepared for them, according to new research from Arbor Networks.

In conjunction with the Economist Intelligence Unit, Arbor Networks Inc. surveyed 360 senior business leaders across the globe about the readiness for cyberattacks. The results indicated that they aren't all that ready for attacks, a scary finding since Arbor says that attacks are inevitable and more sophisticated than ever.

In fact, 77% of respondents said they have had an "incident" in the past two years, and 38% have no response plans if future incidents occur. Only 17% of businesses said they were fully prepared for an online security incident, with most leaning on their IT departments to take the lead.

Not surprisingly, security firm Arbor Networks has a way to help enterprises get prepared. The survey results are timed with the launch of Arbor's Prevail Security Analytics, the first product to spring from its acquisition of Packetloop last September.

Arbor describes the big-data platform (cloud-based or on-premises) as a "DVR" for network security, letting enterprises see live network traffic data and play, pause, or rewind it as needed for threat detection, incident response, and security forensics. Tuning in can show them not only when they've been breached, but how they were breached and what systems were affected. (See Defending the Mobile Core.)

Arbor isn't the only one currently making waves in network security:

  • Nokia Networks is opening a Mobile Broadband Security Center in Berlin at which its operator customers, business and research partners, and public authorities can discuss telco-centric security research on mobile broadband. The center will be open for business in the later part of 2014. (See NSN Plans Mobile Broadband Security Center in Berlin.)

  • Deutsche Telekom AG (NYSE: DT) is also jumping on the trend of building a dedicated center for security issues. The carrier is opening an intelligent cyberdefense center at the end of the year to identify cyberattacks "significantly earlier than was previously possible." It's working with Deutsche Telekom's Cyber Emergency Response Team (CERT) to provide network monitoring at the center and with T-Systems International GmbH to develop new cyber-security services.

  • Revenue management vendor CSG Systems International Inc. (Nasdaq: CSGS) has launched CSG Invotas, a new services division focused on enterprise security. The company says Invotas provides "proven automation and orchestration solutions to respond in real time to emerging and ongoing cyber attacks." (See CSG Intros Enterprise Security Business.)

  • Heavy Reading is holding a Mobile Network Security Strategies one-day conference in London on May 21 where senior analyst Patrick Donegan will host a day of discussion and networking devoted to all manner of mobile network security issues. Building on the success of its fall event in New York, the day will focus on how the network can safeguard mobile carriers' network assets while protecting their customers from security attacks. (See Coffee, Tea, or Network Security?, Pics From Mobile Network Security Strategies, and AT&T's Amoroso: LTE, Virtualization & Cloud Mean New Security Challenges.)

    — Sarah Reedy, Senior Editor, Light Reading

    (11)  | 
    Comment  | 
    Print  | 
  • Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
    Page 1 / 2   >   >>
    SarahReedy
    50%
    50%
    SarahReedy,
    User Rank: Blogger
    3/19/2014 | 12:38:21 PM
    Re: Surprised
    I think IT departments take some steps to protect their data and networks, but the crime is so sophisticated that it's hard to be prepared on their level. Target is a good, high-profile example of that.
    SarahReedy
    50%
    50%
    SarahReedy,
    User Rank: Blogger
    3/19/2014 | 12:37:21 PM
    Re: AT&T
    And, in case you were wondering, the top 5 most dangerous celebrities are...

    1) Lilly Collins

    2) Avril Lavigne

    3) Kathy Griffin

    4) Zoe Saldana

    5) Katy Perry
    SarahReedy
    50%
    50%
    SarahReedy,
    User Rank: Blogger
    3/19/2014 | 12:35:25 PM
    AT&T
    Speaking of operators talking about security, I just got an email from AT&T warning about malware from celebrity searches:

    "Cybercriminals use the names of popular celebrities to lure people to sites with malicious software. For instance, when you search for pictures and downloads of Britney Spears or Kathy Griffin you have about a 10% chance of landing on a page that tested positive for spam, adware, viruses, or other malware."

    I think talking about what they are doing to prevent cyber-crime and what you should be doing to do so on your end is only a good thing. If the attitude is that it's inevitable, they should be talking more about how to prevent it or, at least, lessen the impact of it.
    pdonegan67
    50%
    50%
    pdonegan67,
    User Rank: Light Sabre
    3/19/2014 | 9:43:10 AM
    Re: hush hush security
    That would definitely be a step in the right direction but legislative change is also required to loosen up some of the restrictions on carriers sharing attack information Yes it's fraught, yes it can only be done very gingerly, but the status quo is clearly in everybody's worst interests.
    mmmmmj
    50%
    50%
    mmmmmj,
    User Rank: Light Beer
    3/19/2014 | 3:19:39 AM
    Re: hush hush security
    What I see evovling with the likes of solutions from Elastica and others is a way for organizations to share their breaches anonymously and to receive "sanitized"alerts from other organizations. As organizations start to see the benefit of "receiving" they will be more willing to 'giving"
    Mitch Wagner
    50%
    50%
    Mitch Wagner,
    User Rank: Lightning
    3/18/2014 | 6:12:13 PM
    Surprised
    I was surprised to hear 80+ percent of respondents say they're unprepared for security breaches. That's shocking. Although I suppose in the wake of last year's Target and Neiman-Marcus breaches, I ought not to be shocked. 
    Mitch Wagner
    50%
    50%
    Mitch Wagner,
    User Rank: Lightning
    3/18/2014 | 6:10:37 PM
    Re: hush hush security
    Makes sense that businesses would want to keep breaches quiet. They have nothing to gain from that kind of publicity. 
    mendyk
    50%
    50%
    mendyk,
    User Rank: Light Sabre
    3/18/2014 | 4:47:37 PM
    Re: hush hush security
    You should have told me. I would have worn a wire. Just kidding -- but yes, there's a lot to be learned from these sessions.
    SarahReedy
    50%
    50%
    SarahReedy,
    User Rank: Blogger
    3/18/2014 | 4:44:03 PM
    Re: hush hush security
    For sure. I heard the MWC breakfast was a great, productive discussion, but they locked us media types (even their own!) out to create a safe environment to chat about these issues. 
    mendyk
    50%
    50%
    mendyk,
    User Rank: Light Sabre
    3/18/2014 | 4:34:12 PM
    Re: hush hush security
    There's no doubt that security is something that all network operators want to hear about, but few are willing to talk about. Patrick Donegan is doing a good job of getting at least some operators to open up about mobile security issues. His conferences are well worth attending, even if you aren't ready to step up to the microphone.
    Page 1 / 2   >   >>
    Flash Poll
    From The Founder
    Network architects aiming to upgrade their networks to support agile, open, virtualized services in the 21st century need to consider new criteria when choosing between technology suppliers.
    Live Streaming Video
    BTE 2015 Sponsor Keynote: HP
    Dr. Prodip Sen, CTO, Network Functions Virtualization, HP
    LRTV Custom TV
    Red Hat Demo

    7|2|15   |   10:53   |   (0) comments


    Red Hat's Nicolas Lemieux demonstrates how Red Hat is driving innovation through open source communities.
    LRTV Custom TV
    Red Hat's Approach to OpenStack Adoption

    7|2|15   |   5:17   |   (0) comments


    Red Hat's Radhesh Balakrishnan outlines his company's open source strategy for both enterprises and telcos.
    LRTV Custom TV
    The New IP Goes Mobile With vEPC

    7|2|15   |   1:12   |   (0) comments


    Heavy Reading's Gabriel Brown discusses results of a Light Reading survey sponsored by Brocade that shows a clear commitment by mobile operators to move quickly to virtual EPC deployment.
    LRTV Custom TV
    Making Business Sense of SDN

    7|2|15   |   1:42   |   (0) comments


    Results of a Brocade-sponsored survey show that CSPs have a clear sense of SDN use cases but are wrestling with the business case. Sterling Perrin of Heavy Reading looks behind the numbers.
    LRTV Custom TV
    NFV Will Be Here Sooner Than You Think

    7|2|15   |   2:22   |   (0) comments


    Forget the usual ten-year cycle for new technologies – NFV will be a core part of CSP networks in five years, based on results of a Brocade-sponsored survey, says Heavy Reading's Caroline Chappell.
    LRTV Custom TV
    The New IP Gains Traction With CSPs

    7|2|15   |   1:42   |   (0) comments


    Roz Roseboro of Heavy Reading analyzes results of a Light Reading survey sponsored by Brocade showing that CSPs are getting serious about making the transition to the New IP era.
    LRTV Custom TV
    It's (Real) Time for Analytics

    7|2|15   |   1:42   |   (0) comments


    Heavy Reading's Jim Hodges looks at how CSPs say they plan to use analytics to deploy new services in real time as part of The New IP, based on results of a survey sponsored by Brocade.
    LRTV Documentaries
    IoT in Action

    6|30|15   |   1:39   |   (8) comments


    Two co-workers discuss the benefits of IoT technology.
    LRTV Interviews
    Ericsson Opens Up on OPNFV

    6|30|15   |   14:16   |   (2) comments


    Martin Bäckström, VP and head of industry area Datacom at Ericsson, talks to Light Reading founder and CEO Steve Saunders about the emergence of OPNFV, the importance of standards and Ericsson's OPNFV plans.
    LRTV Custom TV
    NetNumber Founder Discusses NFV/SDN Impact on SP Networks

    6|26|15   |   4:15   |   (0) comments


    NetNumber Founder Doug Ranalli examines why SPs need a new network infrastructure for service agility. While NFV and SDN are the tools, the old ways of thinking about signaling control are inhibitors. Doug provides his recommendations.
    LRTV Custom TV
    Orchestrating NFV vCPE Services Across Multivendor Networks

    6|26|15   |   5:46   |   (0) comments


    Nirav Modi provides an overview of vCPE, the fastest-growing NFV use case, showing how Cyan's Blue Planet orchestrates vCPE services across a multivendor infrastructure to rapidly deliver new managed services for business customers.
    LRTV Custom TV
    ZTE at LTE Summit Amsterdam 2015

    6|26|15   |     |   (0) comments


    As one of the leading global telecommunications providers, ZTE presented its cutting-edge technology at LTE World Summit 2015 in Amsterdam. On display at ZTE's booth were the latest R&D achievements in wireless, 5G development, HetNet, deep convergence of FDD and TDD, and RCS/IMD/iSDN/vCN.
    Upcoming Live Events
    September 16-17, 2015, The Westin Galleria Dallas, Dallas, TX
    September 29-30, 2015, The Westin Grand Müchen, Munich, Germany
    October 6, 2015, The Westin Peachtree Plaza, Atlanta, GA
    October 6, 2015, Westin Peachtree Plaza, Atlanta, GA
    October 14-15, 2015, New Orleans Ernest N. Morial Convention Center, New Orleans, LA
    November 5, 2015, Hilton Santa Clara, Santa Clara, CA
    All Upcoming Live Events
    Infographics
    Hot Topics
    Who's Feeding Fiber to LinkNYC Hotspots?
    Mari Silbey, Senior Editor, Cable/Video, 6/29/2015
    What's a Gigabit Good For?
    Carol Wilson, Editor-at-large, 7/1/2015
    Colt to Jettison Ailing IT Business
    Iain Morris, News Editor, 6/30/2015
    Eurobites: Activist Investor Takes Stake in AlcaLu
    Paul Rainford, Assistant Editor, Europe, 6/30/2015
    Like Us on Facebook
    Twitter Feed
    Webinar Archive
    BETWEEN THE CEOs - Executive Interviews
    Casa Systems has been going from strength to strength over the last couple of years. In 2013, it became the first vendor to ship an integrated CCAP device -- the ...
    Cedrik Neike, SVP of Global Service Provider, Service Delivery, at Cisco, talks to Light Reading founder and CEO Steve Saunders about solving service provider customer problems in a virtualized, DevOps world, including multivendor support and the future of network procurement.
    Cats with Phones