Light Reading
AT&T's chief security officer explains why a whole new approach to mobile network security is needed in a world of smartphones, the cloud, and virtualization.

AT&T's Amoroso: Perimeter Security No Longer Enough

Ray Le Maistre
6/12/2014
50%
50%

The days of networks being adequately protected by "perimeter" security infrastructure are over, according to AT&T Chief Security Officer Ed Amoroso.

In a special video presentation recorded by AT&T Inc. (NYSE: T) for Light Reading's recent Mobile Network Security Strategies event in London, Amoroso provided a detailed insight into the different stages "we're going through as a community -- a mobility community, telecom community, and as users."

In the past, perimeter security that was built using devices such as firewalls and intrusion detection systems "sufficed," and served us well as a community, notes the AT&T expert, but in those days mobility wasn't an issue.

The mass use of mobile phones led to the concept of network-based security, though this was driven more initially by the exploits of "advanced hackers" breaching perimeters and "being able to muck around with things inside the enterprise." This resulted in security strategies that involved thwarting attacks before they reached the edge of the enterprise network.

Now we're in a new phase, says Amoroso, where mobility-enabled cloud is enabling user-defined services for individuals and companies, and "mobility is how we breathe life into that." And the key issue now is "how can we not be a tether" -- there is no point in constraining smartphone users and tethering them to the enterprise if perimeter security strategies are no longer working, he states.

AT&T's Ed Amoroso has a firm grasp on the security challenges faced by mobile network operators.
AT&T's Ed Amoroso has a firm grasp on the security challenges faced by mobile network operators.

As we enter the era of the mobility-enabled cloud, the technologies that will be important, and which will enable user freedom in a secure environment, are:

  • Encryption: "Why not encrypt everything?" asks Amoroso. That comes with the burden to get public key infrastructure and single key infrastructure correct, but "that's very difficult to do."

  • Containerized technology: Enabling secure authorized access whereby a "session" protects the integrity of an access (for example, an employee accessing an online paycheck stub) and then provides the ability to wipe data from a device once it has been accessed and used, so that evidence of the session no longer exists on the device.

  • Proxy: A mediation layer between the cloud and users, where certain types of things can be mediated. Amoroso certainly believes denial of service should be included in that proxy.

  • Run-time virtualization: This is probably more important than anything, believes Amoroso. As you virtualize an entity into the cloud -- an app, for example -- then you need to virtualize security in a virtual environment, not try to protect it with old-fashioned security devices. The idea that network operators will dynamically provision security along with the other objects that are being provisioned into the cloud is "really exciting," says the AT&T security chief.

    "Put all those things together and I fundamentally believe you can protect the mobility-enabled cloud environment better than we can protect information inside perimeters today," proclaims Amoroso. "That's a controversial statement… [but] -- there will be those that believe compliance is most important but we need to get everyone on board here -- perimeter is not working today, advanced persistence threats are making their way through, denial of service attacks render edge computing difficult to maintain."

    He adds that embedding security into the object's run-time systems is something "we hope that compliance officers and regulators will become comfortable with, because the whole idea here is to make computing safer. It's not about checklists -- it's about using the checklists to make computing support the different missions that are important to all of us. That's our vision for the future -- this futuristic prediction that's becoming real now, going from perimeter, through network-based, to a mobility-enabled cloud where we feel more comfortable pushing our information out into something more ubiquitous and more separated and hopefully protected by run-time virtualized security functionality."

    Amoroso goes on to discuss further mobile cloud security and analytics issues with his colleagues Gus De Los Reyes, executive director, security R&D at AT&T, who runs the security research group, and executive director of technology security Brian Rexroad. Find out what they had to say, and see the full presentation by Amoroso by watching the video, AT&T's Ed Amoroso on Mobile Security.

    You can also find out what else happened at the Mobile Network Security Strategies event in London by checking out our dedicated industry show site.

    — Ray Le Maistre, Circle me on Google+ Follow me on TwitterVisit my LinkedIn profile, Editor-in-Chief, Light Reading

    (0)  | 
    Comment  | 
    Print  | 
  • Newest First  |  Oldest First  |  Threaded View
    Flash Poll
    From The Founder
    It's clear to me that the communications industry is divided into two types of people, and only one is living in the real world.
    LRTV Huawei Video Resource Center
    Interview With Rick Talbot, Principal Analyst, Current Analysis

    10|31|14   |   2:12   |   (0) comments


    At the NFV Open Cloud Forum 2014, Rick Talbot shared his positive feedback about the holistic and open approach that Huawei adopts for SDN and NFV. He also found the open sharing at the event valuable as it features different perspectives from Huawei experts, telecom operators, industry analysts as well as security experts.
    LRTV Huawei Video Resource Center
    Interview With David Snow, Principal Analyst, Current Analysis

    10|31|14   |   2:24   |   (0) comments


    David Snow talked about his understanding of Huawei and its SoftCOM strategy at the NFV Open Cloud Forum 2014, saying that Huawei's wide approach combining IT and CT expertise, introducing big data and analytics into solutions and contributing to the OpenStack community particularly resonate with him and make the company stand out in the industry.
    LRTV Huawei Video Resource Center
    Interview With Roz Roseboro, Senior Analyst, Heavy Reading

    10|31|14   |   3:13   |   (0) comments


    Roz Roseboro commented on Huawei's data center capabilities and NFV solutions at the NFV Open Cloud Forum 2014, saying that in addition to covering all three key domains of compute, storage and networking, the company also emphasizes the importance of management capabilities and professional services, which are essential in making NFV a reality.
    LRTV Huawei Video Resource Center
    Interview With Michael Howard, Co-founder & Principal Analyst, Infonetics Research

    10|31|14   |   5:25   |   (0) comments


    Michael Howard talked about SDN, NFV, and OpenStack adoption at Huawei's NFV Open Cloud Forum 2014. Particularly, he pointed out that Virtual Enterprise CPE is the top NFV use case that operators plan to invest in over 2014 and 2015 to deliver new enterprise services through virtualized functions.
    LRTV Huawei Video Resource Center
    Interview With Jerry Caron, Senior Vice President, Current Analysis

    10|31|14   |   3:11   |   (0) comments


    At Huawei's NFV Open Cloud Forum 2014, Jerry Caron from Current Analysis said that orchestration and management are key to realizing SDN and NFV for global carriers, and the approach that Huawei is taking, with its FusionSphere Cloud OS at the core, is in the right direction to address the challenges.
    LRTV Documentaries
    Broadband Battles

    10|31|14   |   01:39   |   (0) comments


    This year's Broadband World Forum featured a number of show floor battles focused on access gear, components and coffee.
    Jonestown
    Mobile Backhaul: Going to the Dark Side?

    10|30|14   |   2:26   |   (1) comment


    Heavy Reading's Patrick Donegan shares his view on a dark trend that bubbled up at Light Reading's annual backhaul conference in NYC.
    LRTV Huawei Video Resource Center
    2014 Huawei Electric Power Industry Summit: Interview With CEO of SwitchCom

    10|30|14   |   4:13   |   (0) comments


    SwitchCom, an IT company based in Angola, recommends a variety of Huawei solutions and hardware to their customers in the energy industry.
    LRTV Huawei Video Resource Center
    2014 Huawei Electric Power Industry Summit: Interview With Ethiopia's Ministry of Water Irrigation & Energy

    10|30|14   |   4:08   |   (0) comments


    Gosaye Mengistie of Ethiopia's Ministry of Water Irrigation & Energy discusses the collaboration with Huawei in that country.
    LRTV Huawei Video Resource Center
    2014 Huawei Electric Power Industry Summit: Interview with Dongfang Electronics Corporation

    10|30|14   |   5:46   |   (0) comments


    Dongfang Electronics Corporation, headquartered in Chengdu, China, is one of China's largest manufacturers of power generators and contractors of power station projects.
    LRTV Huawei Video Resource Center
    2014 Huawei Electric Power Industry Summit: Interview with Zimbabwe's Customers

    10|30|14   |   3:31   |   (0) comments


    Representatives of Zimbabwe's Ministry of Power and Development discuss the energy needs of their country as well as new areas of improvement due to enhanced ICT capabilities.
    LRTV Huawei Video Resource Center
    2014 Huawei Electric Power Industry Summit: Interview With Colbún Chile

    10|30|14   |   4:29   |   (0) comments


    In Chile, an aging energy infrastructure was in dire need of a modern update. Claudio Valenzuela of Colbún discusses how Huawei's ICT solutions continue to provide crucial information to improve the grid and how an in-country engineer is a cricial asset.
    Upcoming Live Events
    November 6, 2014, Santa Clara
    November 11, 2014, Atlanta, GA
    December 2, 2014, New York City
    December 3, 2014, New York City
    December 9-10, 2014, Reykjavik, Iceland
    February 10, 2015, Atlanta, GA
    May 6, 2015, McCormick Convention Center, Chicago, IL
    May 30, 2015, The Westin Peachtree, Atlanta, GA
    June 9-10, 2015, Chicago, IL
    Infographics
    WhoIsHostingThis.com presents six of the world's most extreme WiFi hotspots, enabling the most epic selfies you can imagine.
    Hot Topics
    Microsoft's Skype Embraces WebRTC on IE
    Sarah Reedy, Senior Editor, 10/27/2014
    FTC Slaps AT&T With Throttling Lawsuit
    Sarah Reedy, Senior Editor, 10/28/2014
    Wheeler Gets Down With OTT
    Mari Silbey, Independent Technology Editor, 10/29/2014
    China's MVNOs Hit the Wall
    Robert Clark, 10/27/2014
    Let's Not Kill SDN & NFV With Silos
    Francois Locoh-Donou, Senior VP, Global Products Group, Ciena, 10/28/2014
    Like Us on Facebook
    Twitter Feed