& cplSiteName &

Arbor Unveils a Network Security 'DVR'

Sarah Thomas
3/18/2014
50%
50%

Network attacks may be increasingly inevitable, but 83% of enterprises say they are unprepared for them, according to new research from Arbor Networks.

In conjunction with the Economist Intelligence Unit, Arbor Networks surveyed 360 senior business leaders across the globe about the readiness for cyberattacks. The results indicated that they aren't all that ready for attacks, a scary finding since Arbor says that attacks are inevitable and more sophisticated than ever.

In fact, 77% of respondents said they have had an "incident" in the past two years, and 38% have no response plans if future incidents occur. Only 17% of businesses said they were fully prepared for an online security incident, with most leaning on their IT departments to take the lead.

Not surprisingly, security firm Arbor Networks has a way to help enterprises get prepared. The survey results are timed with the launch of Arbor's Prevail Security Analytics, the first product to spring from its acquisition of Packetloop last September.

Arbor describes the big-data platform (cloud-based or on-premises) as a "DVR" for network security, letting enterprises see live network traffic data and play, pause, or rewind it as needed for threat detection, incident response, and security forensics. Tuning in can show them not only when they've been breached, but how they were breached and what systems were affected. (See Defending the Mobile Core.)

Arbor isn't the only one currently making waves in network security:

  • Nokia Networks is opening a Mobile Broadband Security Center in Berlin at which its operator customers, business and research partners, and public authorities can discuss telco-centric security research on mobile broadband. The center will be open for business in the later part of 2014. (See NSN Plans Mobile Broadband Security Center in Berlin.)

  • Deutsche Telekom AG (NYSE: DT) is also jumping on the trend of building a dedicated center for security issues. The carrier is opening an intelligent cyberdefense center at the end of the year to identify cyberattacks "significantly earlier than was previously possible." It's working with Deutsche Telekom's Cyber Emergency Response Team (CERT) to provide network monitoring at the center and with T-Systems International GmbH to develop new cyber-security services.

  • Revenue management vendor CSG Systems International Inc. (Nasdaq: CSGS) has launched CSG Invotas, a new services division focused on enterprise security. The company says Invotas provides "proven automation and orchestration solutions to respond in real time to emerging and ongoing cyber attacks." (See CSG Intros Enterprise Security Business.)

  • Heavy Reading is holding a Mobile Network Security Strategies one-day conference in London on May 21 where senior analyst Patrick Donegan will host a day of discussion and networking devoted to all manner of mobile network security issues. Building on the success of its fall event in New York, the day will focus on how the network can safeguard mobile carriers' network assets while protecting their customers from security attacks. (See Coffee, Tea, or Network Security?, Pics From Mobile Network Security Strategies, and AT&T's Amoroso: LTE, Virtualization & Cloud Mean New Security Challenges.)

    — Sarah Reedy, Senior Editor, Light Reading

    (11)  | 
    Comment  | 
    Print  | 
  • Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
    Page 1 / 2   >   >>
    Sarah Thomas
    50%
    50%
    Sarah Thomas,
    User Rank: Blogger
    3/19/2014 | 12:38:21 PM
    Re: Surprised
    I think IT departments take some steps to protect their data and networks, but the crime is so sophisticated that it's hard to be prepared on their level. Target is a good, high-profile example of that.
    Sarah Thomas
    50%
    50%
    Sarah Thomas,
    User Rank: Blogger
    3/19/2014 | 12:37:21 PM
    Re: AT&T
    And, in case you were wondering, the top 5 most dangerous celebrities are...

    1) Lilly Collins

    2) Avril Lavigne

    3) Kathy Griffin

    4) Zoe Saldana

    5) Katy Perry
    Sarah Thomas
    50%
    50%
    Sarah Thomas,
    User Rank: Blogger
    3/19/2014 | 12:35:25 PM
    AT&T
    Speaking of operators talking about security, I just got an email from AT&T warning about malware from celebrity searches:

    "Cybercriminals use the names of popular celebrities to lure people to sites with malicious software. For instance, when you search for pictures and downloads of Britney Spears or Kathy Griffin you have about a 10% chance of landing on a page that tested positive for spam, adware, viruses, or other malware."

    I think talking about what they are doing to prevent cyber-crime and what you should be doing to do so on your end is only a good thing. If the attitude is that it's inevitable, they should be talking more about how to prevent it or, at least, lessen the impact of it.
    pdonegan67
    50%
    50%
    pdonegan67,
    User Rank: Light Sabre
    3/19/2014 | 9:43:10 AM
    Re: hush hush security
    That would definitely be a step in the right direction but legislative change is also required to loosen up some of the restrictions on carriers sharing attack information Yes it's fraught, yes it can only be done very gingerly, but the status quo is clearly in everybody's worst interests.
    mmmmmj
    50%
    50%
    mmmmmj,
    User Rank: Light Beer
    3/19/2014 | 3:19:39 AM
    Re: hush hush security
    What I see evovling with the likes of solutions from Elastica and others is a way for organizations to share their breaches anonymously and to receive "sanitized"alerts from other organizations. As organizations start to see the benefit of "receiving" they will be more willing to 'giving"
    Mitch Wagner
    50%
    50%
    Mitch Wagner,
    User Rank: Lightning
    3/18/2014 | 6:12:13 PM
    Surprised
    I was surprised to hear 80+ percent of respondents say they're unprepared for security breaches. That's shocking. Although I suppose in the wake of last year's Target and Neiman-Marcus breaches, I ought not to be shocked. 
    Mitch Wagner
    50%
    50%
    Mitch Wagner,
    User Rank: Lightning
    3/18/2014 | 6:10:37 PM
    Re: hush hush security
    Makes sense that businesses would want to keep breaches quiet. They have nothing to gain from that kind of publicity. 
    mendyk
    50%
    50%
    mendyk,
    User Rank: Light Sabre
    3/18/2014 | 4:47:37 PM
    Re: hush hush security
    You should have told me. I would have worn a wire. Just kidding -- but yes, there's a lot to be learned from these sessions.
    Sarah Thomas
    50%
    50%
    Sarah Thomas,
    User Rank: Blogger
    3/18/2014 | 4:44:03 PM
    Re: hush hush security
    For sure. I heard the MWC breakfast was a great, productive discussion, but they locked us media types (even their own!) out to create a safe environment to chat about these issues. 
    mendyk
    50%
    50%
    mendyk,
    User Rank: Light Sabre
    3/18/2014 | 4:34:12 PM
    Re: hush hush security
    There's no doubt that security is something that all network operators want to hear about, but few are willing to talk about. Patrick Donegan is doing a good job of getting at least some operators to open up about mobile security issues. His conferences are well worth attending, even if you aren't ready to step up to the microphone.
    Page 1 / 2   >   >>
    Light Reading’s Upskill U is a FREE, interactive, online educational resource that delivers must-have education on themes that relate to the overall business transformation taking place in the communications industry.
    NEXT COURSE
    Wednesday, August 3, 1:00PM EDT
    The Central Office Re-Architected as a Data Center
    Guru Parulkar, Executive Director, Open Networking Research Center, Open Networking Lab
    UPCOMING COURSE SCHEDULE
    Wednesday, August 10, 1:00PM EDT
    Telcos & Open Source 101
    Phil Robb, Senior Technical Director, OpenDaylight
    Friday, August 12, 1:00PM EDT
    The Role of Open Source in NFV
    Jim Fagan, Director, Cloud Practice, Telstra
    Wednesday, August 17, 1:00PM EDT
    Using Open Source for Data Centers and Cloud Services
    Roz Roseboro, Senior Analyst, Heavy Reading
    in association with:
    From The Founder
    Light Reading today starts a new voyage as part of a larger Enterprise.
    Flash Poll
    Live Streaming Video
    Charting the CSP's Future
    Six different communications service providers join to debate their visions of the future CSP, following a landmark presentation from AT&T on its massive virtualization efforts and a look back on where the telecom industry has been and where it's going from two industry veterans.
    LRTV Custom TV
    Reinventing Operations for a Virtual, Software-Defined World

    7|28|16   |   5:23   |   (0) comments


    Heavy Reading Senior Analyst Jim Hodges speaks with Accenture's Larry Socher and Matt Anderson about what service providers must do to transform their business to get the benefits of SDN and NFV including: leveraging DevOps, introducing real-time OSS and implementing analytics.
    Women in Comms Introduction Videos
    Fujitsu Sales Leader Shares Lessons Learned

    7|27|16   |   5:12   |   (1) comment


    As Fujitsu's only female sales leader, Annie Bogue knows the importance of asking for what you want, being flexible (she's been relocated five times), keeping a meticulous calendar, 'leaning in,' working harder than everyone else around you, being aware and more.
    Telecom Innovators Video Showcase
    VeEX Test & Measurement Solutions

    7|25|16   |   08:57   |   (0) comments


    Cyrille Morelle, president and CEO of VeEX Inc., talks test and measurement with Light Reading's Steve Saunders at BCE 2016. This includes innovative products such as VeSion Cloud-Based platform for network monitoring; MTTplus Modular Test platform for Access, Business, Carrier Ethernet, Transport and Core services; and OPX-BOX+ for Fiber Optics.
    LRTV Custom TV
    VeEX: Live From BCE 2016

    7|25|16   |   03:20   |   (0) comments


    VeEX's Senior Director of Business Development, Perry Romano, explains how VeEX provides tools to help install, maintain, monitor and manage network infrastructure efficiently and effectively. The portfolio of products on display include the RXT-6000, MTTplus and TX300s.
    LRTV Custom TV
    Real-Time Telemetry & Analytics for Intelligent SDN Orchestration

    7|25|16   |   03:09   |   (0) comments


    Packet Design CEO Scott Sherwood discusses how real-time network telemetry and analytics are enabling a new breed of SDN orchestration applications.
    From the Founder
    The Russo Report: Driving Disruption

    7|25|16   |   07:44   |   (0) comments


    In the first episode of a four-part series, Light Reading Founder and CEO Steve Saunders and Calix President and CEO Carl Russo drive around town discussing the disruptive mega-changes in the communications industry and where hope lies for service providers to meet the escalating demands of the cloud.
    LRTV Custom TV
    NetScout: Maximizing Enterprise Cloud for Digital Transformation

    7|20|16   |   04:53   |   (0) comments


    Light Reading Editor Mitch Wagner talks to NetScout CMO Jim McNiel about maximizing the benefits of enterprise cloud and digital transformation while minimizing potential pitfalls with a proper monitoring and instrumentation strategy.
    Women in Comms Introduction Videos
    Ciena's VP Offers a Career Crash Course

    7|20|16   |   4:14   |   (2) comments


    How did Ciena's Vice President of Sales, Angela Finn, carve out her career path? Simple, she tells WiC. She stayed true to her company, customers and principles. She shares her advice for women on how to be authentic and credible, as well as for companies that want to make a real change to their culture and practices.
    LRTV Custom TV
    NFV in 2016: Part 2 – Climbing the Virtualization Maturity Curve

    7|19|16   |   06:56   |   (0) comments


    Many of the initial use case implementations are single-vendor and self-contained. The industry is still climbing the virtualization maturity curve, needing further clarity and stability in the NFV infrastructure (NFVi) and greater availability and choice of virtualized network functions (VNFs). Interoperability between NFVis and VNFs from different vendors ...
    Telecom Innovators Video Showcase
    Versa Networks' Kumar Mehta on SD-WAN Managed Services

    7|19|16   |     |   (0) comments


    In Silicon Valley, Steve Saunders sits down with Versa's Kumar Mehta for an interview focused on why service providers are building SD-WAN managed services, and how Versa's telco customers are innovating.
    LRTV Custom TV
    Juniper Networks & The Evolution of NFV

    7|19|16   |   06:01   |   (0) comments


    Senior Juniper Networks executives talk to Light Reading Founder & CEO Steve Saunders about NFV developments and the recent independent evaluation by test lab EANTC of Juniper's Cloud CPE solution.
    LRTV Interviews
    CenturyLink Goes Beyond Managed WiFi

    7|19|16   |     |   (0) comments


    CenturyLink's managed WiFi allows enterprises, such as retailers and resorts, to track guest WiFi usage in order to help them better communicate with customers.
    Upcoming Live Events
    September 13-14, 2016, The Curtis Hotel, Denver, CO
    November 3, 2016, The Montcalm Marble Arch, London
    November 30, 2016, The Westin Times Square, New York City
    December 6-8, 2016,
    May 16-17, 2017, Austin Convention Center, Austin, TX
    All Upcoming Live Events
    Infographics
    Five of the Top 10 most targeted countries in Check Point Software Technologies' global Malware & Threat Index for Q1 2016 are in Africa.
    Hot Topics
    Verizon Sports Big Plans for Yahoo
    Alan Breznick, Cable/Video Practice Leader, Light Reading, 7/26/2016
    Light Reading Beyond
    Steve Saunders, CEO and founder, Light Reading, 7/28/2016
    Are IP/Optical Integration Initiatives Moving to Silos?
    Faisal Khan, Network Operator Technology Planning Dept., 7/28/2016
    Yahoo Signing Off in $4.83B Sale to Verizon
    Mari Silbey, Senior Editor, Cable/Video, 7/25/2016
    Ericsson Board Has Been Asleep at the Wheel – Consultant
    Ray Le Maistre, Editor-in-chief, 7/25/2016
    Like Us on Facebook
    Twitter Feed
    BETWEEN THE CEOs - Executive Interviews
    There's no question that, come 2020, 5G technology will turn the world's conception of what mobile networking is on its head. Within the world of 5G development, Dr. ...
    I've enjoyed interviewing many interesting people since I rejoined Light Reading, but William A. "Bill" Owens certainly takes the biscuit, as we say where I come from.
    Animals with Phones
    Live Digital Audio

    Our world has evolved through innovation from the Industrial Revolution of the 1740s to the information age, and it is now entering the Fourth Industrial Revolution, driven by technology. Technology is driving a paradigm shift in the way digital solutions deliver a connected world, changing the way we live, communicate and provide solutions. It can have a powerful impact on how we tackle some of the world’s most pressing problems. In this radio show, Caroline Dowling, President of Communications Infrastructure & Enterprise Computing at Flex, will join Women in Comms Director Sarah Thomas to discuss the impact technology has on society and how it can be a game-changer across the globe; improving lives and creating a smarter world. Dowling, a Cork, Ireland, native and graduate of Harvard Business School's Advanced Management Program, will also discuss her experience managing an international team focused on innovation in an age of high-speed change.