Light Reading
Also: NSN and DT open security center; CSG offers crime-fighting software; Heavy Reading hosts a security show.

Arbor Unveils a Network Security 'DVR'

Sarah Reedy
3/18/2014
50%
50%

Network attacks may be increasingly inevitable, but 83% of enterprises say they are unprepared for them, according to new research from Arbor Networks.

In conjunction with the Economist Intelligence Unit, Arbor Networks Inc. surveyed 360 senior business leaders across the globe about the readiness for cyberattacks. The results indicated that they aren't all that ready for attacks, a scary finding since Arbor says that attacks are inevitable and more sophisticated than ever.

In fact, 77% of respondents said they have had an "incident" in the past two years, and 38% have no response plans if future incidents occur. Only 17% of businesses said they were fully prepared for an online security incident, with most leaning on their IT departments to take the lead.

Not surprisingly, security firm Arbor Networks has a way to help enterprises get prepared. The survey results are timed with the launch of Arbor's Prevail Security Analytics, the first product to spring from its acquisition of Packetloop last September.

Arbor describes the big-data platform (cloud-based or on-premises) as a "DVR" for network security, letting enterprises see live network traffic data and play, pause, or rewind it as needed for threat detection, incident response, and security forensics. Tuning in can show them not only when they've been breached, but how they were breached and what systems were affected. (See Defending the Mobile Core.)

Arbor isn't the only one currently making waves in network security:

  • Nokia Networks is opening a Mobile Broadband Security Center in Berlin at which its operator customers, business and research partners, and public authorities can discuss telco-centric security research on mobile broadband. The center will be open for business in the later part of 2014. (See NSN Plans Mobile Broadband Security Center in Berlin.)

  • Deutsche Telekom AG (NYSE: DT) is also jumping on the trend of building a dedicated center for security issues. The carrier is opening an intelligent cyberdefense center at the end of the year to identify cyberattacks "significantly earlier than was previously possible." It's working with Deutsche Telekom's Cyber Emergency Response Team (CERT) to provide network monitoring at the center and with T-Systems International GmbH to develop new cyber-security services.

  • Revenue management vendor CSG Systems International Inc. (Nasdaq: CSGS) has launched CSG Invotas, a new services division focused on enterprise security. The company says Invotas provides "proven automation and orchestration solutions to respond in real time to emerging and ongoing cyber attacks." (See CSG Intros Enterprise Security Business.)

  • Heavy Reading is holding a Mobile Network Security Strategies one-day conference in London on May 21 where senior analyst Patrick Donegan will host a day of discussion and networking devoted to all manner of mobile network security issues. Building on the success of its fall event in New York, the day will focus on how the network can safeguard mobile carriers' network assets while protecting their customers from security attacks. (See Coffee, Tea, or Network Security?, Pics From Mobile Network Security Strategies, and AT&T's Amoroso: LTE, Virtualization & Cloud Mean New Security Challenges.)

    — Sarah Reedy, Senior Editor, Light Reading

    (11)  | 
    Comment  | 
    Print  | 
  • Newest First  |  Oldest First  |  Threaded View
    Page 1 / 2   >   >>
    SarahReedy
    50%
    50%
    SarahReedy,
    User Rank: Blogger
    3/19/2014 | 12:38:21 PM
    Re: Surprised
    I think IT departments take some steps to protect their data and networks, but the crime is so sophisticated that it's hard to be prepared on their level. Target is a good, high-profile example of that.
    SarahReedy
    50%
    50%
    SarahReedy,
    User Rank: Blogger
    3/19/2014 | 12:37:21 PM
    Re: AT&T
    And, in case you were wondering, the top 5 most dangerous celebrities are...

    1) Lilly Collins

    2) Avril Lavigne

    3) Kathy Griffin

    4) Zoe Saldana

    5) Katy Perry
    SarahReedy
    50%
    50%
    SarahReedy,
    User Rank: Blogger
    3/19/2014 | 12:35:25 PM
    AT&T
    Speaking of operators talking about security, I just got an email from AT&T warning about malware from celebrity searches:

    "Cybercriminals use the names of popular celebrities to lure people to sites with malicious software. For instance, when you search for pictures and downloads of Britney Spears or Kathy Griffin you have about a 10% chance of landing on a page that tested positive for spam, adware, viruses, or other malware."

    I think talking about what they are doing to prevent cyber-crime and what you should be doing to do so on your end is only a good thing. If the attitude is that it's inevitable, they should be talking more about how to prevent it or, at least, lessen the impact of it.
    pdonegan67
    50%
    50%
    pdonegan67,
    User Rank: Light Sabre
    3/19/2014 | 9:43:10 AM
    Re: hush hush security
    That would definitely be a step in the right direction but legislative change is also required to loosen up some of the restrictions on carriers sharing attack information Yes it's fraught, yes it can only be done very gingerly, but the status quo is clearly in everybody's worst interests.
    mmmmmj
    50%
    50%
    mmmmmj,
    User Rank: Light Beer
    3/19/2014 | 3:19:39 AM
    Re: hush hush security
    What I see evovling with the likes of solutions from Elastica and others is a way for organizations to share their breaches anonymously and to receive "sanitized"alerts from other organizations. As organizations start to see the benefit of "receiving" they will be more willing to 'giving"
    Mitch Wagner
    50%
    50%
    Mitch Wagner,
    User Rank: Lightning
    3/18/2014 | 6:12:13 PM
    Surprised
    I was surprised to hear 80+ percent of respondents say they're unprepared for security breaches. That's shocking. Although I suppose in the wake of last year's Target and Neiman-Marcus breaches, I ought not to be shocked. 
    Mitch Wagner
    50%
    50%
    Mitch Wagner,
    User Rank: Lightning
    3/18/2014 | 6:10:37 PM
    Re: hush hush security
    Makes sense that businesses would want to keep breaches quiet. They have nothing to gain from that kind of publicity. 
    mendyk
    50%
    50%
    mendyk,
    User Rank: Light Sabre
    3/18/2014 | 4:47:37 PM
    Re: hush hush security
    You should have told me. I would have worn a wire. Just kidding -- but yes, there's a lot to be learned from these sessions.
    SarahReedy
    50%
    50%
    SarahReedy,
    User Rank: Blogger
    3/18/2014 | 4:44:03 PM
    Re: hush hush security
    For sure. I heard the MWC breakfast was a great, productive discussion, but they locked us media types (even their own!) out to create a safe environment to chat about these issues. 
    mendyk
    50%
    50%
    mendyk,
    User Rank: Light Sabre
    3/18/2014 | 4:34:12 PM
    Re: hush hush security
    There's no doubt that security is something that all network operators want to hear about, but few are willing to talk about. Patrick Donegan is doing a good job of getting at least some operators to open up about mobile security issues. His conferences are well worth attending, even if you aren't ready to step up to the microphone.
    Page 1 / 2   >   >>
    Flash Poll
    From The Founder
    It's clear to me that the communications industry is divided into two types of people, and only one is living in the real world.
    LRTV Custom TV
    Using Service Quality to Drive WiFi Monetization

    10|22|14   |   6:51   |   (0) comments


    Live from the SCTE conference: Heavy Reading's Alan Breznick explores the forces shaping the WiFi opportunity in an interview with CableLabs' Justin Colwell and Amdocs' Ken Roulier.
    LRTV Custom TV
    Distributed Access Architectures – 2

    10|21|14   |   8:51:00 AM   |   (0) comments


    ARRIS CTO Network Solutions Tom Cloonan discusses why many if not most MSOs will continue with integrated CCAP, while addressing why some are also looking at two futuristic, distributed access architectures: Remote PHY and Remote CCAP.
    LRTV Custom TV
    Distributed Access Architectures – 1

    10|21|14   |   9:01   |   (0) comments


    SCTE Sr. Director of Engineering Dean Stoneback discusses the pros and cons of distributed access architecture (DAA) and its various forms, which range from basic Remote PHY to full CMTS functionality in the node.
    LRTV Custom TV
    The WiFi Road to Riches – 2

    10|21|14   |   3:58   |   (0) comments


    ARRIS Senior Solution Architect Eli Baruch talks about how MSOs can enable public and community WiFi through 1) outdoor access points, 2) businesses seeking to offer WiFi to customers, and 3) residential WiFi gateway extensions.
    LRTV Custom TV
    The WiFi Road to Riches – 1

    10|21|14   |   10:15   |   (0) comments


    SCTE Director of Advanced Technologies Steve Harris discusses WiFi deployments, drivers, challenges and advances, including 802.11ac, carrier-grade WiFi, community WiFi, Hotspot 2.0, Passpoint, WiFi-First and voice-over-WiFi.
    LRTV Custom TV
    Advantech Accelerates 100G Traffic Handling

    10|17|14   |   7:56   |   (0) comments


    Paul Stevens from Advantech explains why handling 100GbE needs a whole new platform design approach and how Advantech is addressing the needs of equipment providers and carriers to give them the flexibility and performance they will need for SDN and NFV deployment.
    LRTV Huawei Video Resource Center
    Holland's Imtech Traffic & Infra Discusses Huawei's ICT Solution and Services

    10|16|14   |   4:49   |   (0) comments


    Dimitry Theebe is from the business unit at Imtech Traffic & Infra which delivers communications solutions for transportations. His partnershp with Huawei began about a years ago. In this video, Theebe speaks more about this partnership and what he hopes to accomplish with Huawei.
    LRTV Huawei Video Resource Center
    Huawei's Comprehensive Storage Solutions Vital for SVR

    10|16|14   |   6:16   |   (0) comments


    SVR Information Technology provides cloud services for academic and special sectors. With Huawei's support, SVR and Yildiz Technical University has established Turkey's largest and most advanced High Performance Computing system. CSO Ismail Cem Aslan talks about what he hopes Huawei's OceanStor storage system will bring for him.
    LRTV Huawei Video Resource Center
    Mexico's Servitron's Impression of Huawei at CCW 2014

    10|16|14   |   6:35   |   (0) comments


    Servitron is a network operator in Mexico that has been in the trunking industry for the past 20 years. Its COO, Ing. Ragnar Trillo O., explains at Critical Communications World 2014 that his company has been interested in the long-term evolution of LTE technology and its adoption for TETRA.
    LRTV Huawei Video Resource Center
    Building a Better Dubai

    10|16|14   |   2:06   |   (0) comments


    Abdulla Ahmed Al Falasi is the director of commercial affairs, a telecommunications coordinator for the government of Dubai. Their areas of service span across multiple industries, including police, safety, shopping malls and more. In this video, Abdulla talks about his department's work with Huawei.
    LRTV Huawei Video Resource Center
    Huawei Lights Up Malaysia Partner Maju Nusa

    10|16|14   |   1:59   |   (0) comments


    Malaysia's Maju Nusa is an enterprise partner to Huawei in networking, route switches and telco equipment. At this year's Critical Communications World in Singapore, CTO Pushpender Singh talks about what Huawei's eLTE solutions mean to his company and for Malaysia.
    LRTV Custom TV
    Evolving From HFC to FTTH Networks

    10|15|14   |   2:19   |   (0) comments


    Cisco's Todd McCrum delves into the future of cable's HFC plant, examining how DOCSIS 3.1 and advanced video compression will extend its life and how the IP video transition will usher in GPON and EPON over FTTH.
    Upcoming Live Events
    October 29, 2014, New York City
    November 6, 2014, Santa Clara
    November 11, 2014, Atlanta, GA
    December 2, 2014, New York City
    December 3, 2014, New York City
    December 9-10, 2014, Reykjavik, Iceland
    February 10, 2015, Atlanta, GA
    June 9-10, 2015, Chicago, IL
    Infographics
    WhoIsHostingThis.com presents six of the world's most extreme WiFi hotspots, enabling the most epic selfies you can imagine.
    Hot Topics
    Analysts Warn of Major NFV Gaps
    Carol Wilson, Editor-at-large, 10/22/2014
    Is Health the Killer App for the IoT?
    Jason Meyers, Senior Editor, Gigabit Cities/IoT, 10/22/2014
    Drones Hover Over the IoT Sector
    Jason Meyers, Senior Editor, Gigabit Cities/IoT, 10/23/2014
    1959 Newsreel: Make Phone Calls – From Cars!
    Mitch Wagner, West Coast Bureau Chief, Light Reading, 10/24/2014
    Meet the Phantom Network for NFV
    Ray Le Maistre, Editor-in-chief, 10/23/2014
    Like Us on Facebook
    Twitter Feed