& cplSiteName &

AT&T's Amoroso: Perimeter Security No Longer Enough

Ray Le Maistre
6/12/2014
50%
50%

The days of networks being adequately protected by "perimeter" security infrastructure are over, according to AT&T Chief Security Officer Ed Amoroso.

In a special video presentation recorded by AT&T Inc. (NYSE: T) for Light Reading's recent Mobile Network Security Strategies event in London, Amoroso provided a detailed insight into the different stages "we're going through as a community -- a mobility community, telecom community, and as users."

In the past, perimeter security that was built using devices such as firewalls and intrusion detection systems "sufficed," and served us well as a community, notes the AT&T expert, but in those days mobility wasn't an issue.

The mass use of mobile phones led to the concept of network-based security, though this was driven more initially by the exploits of "advanced hackers" breaching perimeters and "being able to muck around with things inside the enterprise." This resulted in security strategies that involved thwarting attacks before they reached the edge of the enterprise network.

Now we're in a new phase, says Amoroso, where mobility-enabled cloud is enabling user-defined services for individuals and companies, and "mobility is how we breathe life into that." And the key issue now is "how can we not be a tether" -- there is no point in constraining smartphone users and tethering them to the enterprise if perimeter security strategies are no longer working, he states.

AT&T's Ed Amoroso has a firm grasp on the security challenges faced by mobile network operators.
AT&T's Ed Amoroso has a firm grasp on the security challenges faced by mobile network operators.

As we enter the era of the mobility-enabled cloud, the technologies that will be important, and which will enable user freedom in a secure environment, are:

  • Encryption: "Why not encrypt everything?" asks Amoroso. That comes with the burden to get public key infrastructure and single key infrastructure correct, but "that's very difficult to do."

  • Containerized technology: Enabling secure authorized access whereby a "session" protects the integrity of an access (for example, an employee accessing an online paycheck stub) and then provides the ability to wipe data from a device once it has been accessed and used, so that evidence of the session no longer exists on the device.

  • Proxy: A mediation layer between the cloud and users, where certain types of things can be mediated. Amoroso certainly believes denial of service should be included in that proxy.

  • Run-time virtualization: This is probably more important than anything, believes Amoroso. As you virtualize an entity into the cloud -- an app, for example -- then you need to virtualize security in a virtual environment, not try to protect it with old-fashioned security devices. The idea that network operators will dynamically provision security along with the other objects that are being provisioned into the cloud is "really exciting," says the AT&T security chief.

    "Put all those things together and I fundamentally believe you can protect the mobility-enabled cloud environment better than we can protect information inside perimeters today," proclaims Amoroso. "That's a controversial statement… [but] -- there will be those that believe compliance is most important but we need to get everyone on board here -- perimeter is not working today, advanced persistence threats are making their way through, denial of service attacks render edge computing difficult to maintain."

    He adds that embedding security into the object's run-time systems is something "we hope that compliance officers and regulators will become comfortable with, because the whole idea here is to make computing safer. It's not about checklists -- it's about using the checklists to make computing support the different missions that are important to all of us. That's our vision for the future -- this futuristic prediction that's becoming real now, going from perimeter, through network-based, to a mobility-enabled cloud where we feel more comfortable pushing our information out into something more ubiquitous and more separated and hopefully protected by run-time virtualized security functionality."

    Amoroso goes on to discuss further mobile cloud security and analytics issues with his colleagues Gus De Los Reyes, executive director, security R&D at AT&T, who runs the security research group, and executive director of technology security Brian Rexroad. Find out what they had to say, and see the full presentation by Amoroso by watching the video, AT&T's Ed Amoroso on Mobile Security.

    You can also find out what else happened at the Mobile Network Security Strategies event in London by checking out our dedicated industry show site.

    — Ray Le Maistre, Circle me on Google+ Follow me on TwitterVisit my LinkedIn profile, Editor-in-Chief, Light Reading

    (0)  | 
    Comment  | 
    Print  | 
  • Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
    From The Founder
    The independent evaluation of Nokia's key virtual network functions (VNFs) was a defining moment for the Finnish giant.
    Flash Poll
    Live Streaming Video
    Charting the CSP's Future
    Six different communications service providers join to debate their visions of the future CSP, following a landmark presentation from AT&T on its massive virtualization efforts and a look back on where the telecom industry has been and where it's going from two industry veterans.
    LRTV Custom TV
    Energy 2020: Growing Services, Not Consumption

    6|24|16   |   07:18   |   (0) comments


    Management of power requirements needs to be a key consideration as cable operators deploy new services, says Dan Cooper, vice president of critical infrastructure for Charter Communications and chair of the SCTE/ISBE Standards Program's Energy Management Subcommittee. In this video, Cooper discusses the importance of cable operators and technology partners ...
    LRTV Huawei Video Resource Center
    Huawei & TDC First to Launch DOCSIS 3.1 Trial in Europe

    6|24|16   |     |   (0) comments


    To meet the rising demands for high-speed broadband and to tackle fierce competition for 1.5 million household, TDC wanted to upgrade its network to use the latest technology. Using Huawei's DOCSIS 3.1 solution, TDC is now able to offer gigabit speeds to its customers.
    LRTV Documentaries
    OPNFV Summit: Key Takeaways

    6|22|16   |   03:28   |   (0) comments


    MANO shortfalls, an increasingly bloated open source ecosystem and the cultural challenges for network operators were among the key takeaways from the OPNFV Summit in Berlin.
    LRTV Huawei Video Resource Center
    Bringing Ultra Broadband to the South Pacific

    6|22|16   |   7:55   |   (0) comments


    At Singapore's UBBS 2016 summit, Light Reading speaks to Lim Chee Siong, Huawei's CMO in the South Pacific Region.
    LRTV Custom TV
    Juniper's NFV Platform

    6|22|16   |     |   (0) comments


    A telco cloud is a key enabler for service providers to deliver virtualized services to their customers. Juniper has a differentiated approach with an open and comprehensive NFV platform to build the cloud of the future for multiple use cases.
    Women in Comms Introduction Videos
    Infinera: The Glass Ceiling's Been Broken

    6|22|16   |   4:34   |   (0) comments


    Shannon Williams, an engineer by trade and now the director of sales for Infinera's major accounts, draws confidence from being a female in a male-dominated industry and hopes other women will too as industry dynamics swing in our favor.
    LRTV Custom TV
    RAD Demonstrates SD-WAN Functionality at BCE 2016

    6|22|16   |     |   (0) comments


    In conjunction with Versa Networks, RAD demos a joint solution for SD-WAN implementation. The solution uses RAD's ETX-2i, a vCPE platform integrating a powerful IP and Carrier Ethernet NID/NTU with a field-pluggable x86 NFV module that runs Versa's FlexVNF for SD-WAN functionality. The demo implements SD-WAN over a simulated service provider footprint by deploying ...
    LRTV Custom TV
    Radware on Virtualizing Network Security

    6|21|16   |     |   (0) comments


    Radware's Michael O'Malley highlights the benefits for service providers of virtualizing network security.
    LRTV Huawei Video Resource Center
    Huawei 2016 UBBS World Tour: Singapore

    6|21|16   |   02:39   |   (0) comments


    Highlights from Huawei's UBBS World Tour event in Singapore.
    LRTV Custom TV
    The FlowBROKER Solution

    6|21|16   |     |   (0) comments


    During a demo at the Big Communications Event 2016, Accedian director of product line solutions Greg Spear demonstrates how the FlowBROKER distributed packet capture solution (part of Accedian's SkyLIGHT platform) can be used to troubleshoot and resolve QoE issues.

    FlowBROKER is the industry's first lossless remote packet capture solution, which uses ...

    LRTV Documentaries
    BCE 2016: Dell & the New World Order

    6|21|16   |   22:48   |   (0) comments


    Dell's Jim Ganthier on how the very essence of enterprise is being affected by digital disruption – and how the cloud can help companies find a path forward.
    LRTV Documentaries
    BCE 2016: The CSP of the Future

    6|20|16   |     |   (0) comments


    Traditional telecom operators have been adopting new ways of doing business from the IT sector and emulating web-scale companies in their technology adoption. Are these strategies succeeding? A panel of experts at BCE considered the evidence...
    Upcoming Live Events
    September 13-14, 2016, The Curtis Hotel, Denver, CO
    November 3, 2016, The Montcalm Marble Arch, London
    November 30, 2016, The Westin Times Square, New York City
    December 6-8, 2016,
    May 16-17, 2017, Austin Convention Center, Austin, TX
    All Upcoming Live Events
    Infographics
    A new survey conducted by Heavy Reading and TM Forum shows that CSPs around the world see the move to digital operations as a necessary part of their overall virtualization strategies.
    Hot Topics
    FCC to Vote on 5G Spectrum on July 14
    Dan Jones, Mobile Editor, 6/20/2016
    'Brexit' Vote Hits BT, Vodafone
    Iain Morris, News Editor, 6/24/2016
    Twitter Buys Magic Pony... Not That Kind
    Mari Silbey, Senior Editor, Cable/Video, 6/20/2016
    AT&T Settles on LTE for Cellular IoT
    Dan Jones, Mobile Editor, 6/22/2016
    Google Fiber Buys Webpass in Wireless Play
    Iain Morris, News Editor, 6/23/2016
    Like Us on Facebook
    Twitter Feed
    BETWEEN THE CEOs - Executive Interviews
    At the BCE 2016 show in Austin, ECI Telecom CEO Darryl Edwards tells Light Reading founder and CEO about the Elastic Network concept and the company's NFV and cybersecurity developments.
    Mark Dzuban, president and CEO of SCTE/ISBE, sits down with Steve Saunders in Light Reading's New York office to discuss the society's Energy 2020 campaign, including its mission to benefit the environment, enable economic benefits and the key challenges facing cable operators wanting to reduce energy consumption.
    Animals with Phones
    Live Digital Audio

    Our world has evolved through innovation from the Industrial Revolution of the 1740s to the information age, and it is now entering the Fourth Industrial Revolution, driven by technology. Technology is driving a paradigm shift in the way digital solutions deliver a connected world, changing the way we live, communicate and provide solutions. It can have a powerful impact on how we tackle some of the world’s most pressing problems. In this radio show, Caroline Dowling, President of Communications Infrastructure & Enterprise Computing at Flex, will join Women in Comms Director Sarah Thomas to discuss the impact technology has on society and how it can be a game-changer across the globe; improving lives and creating a smarter world. Dowling, a Cork, Ireland, native and graduate of Harvard Business School's Advanced Management Program, will also discuss her experience managing an international team focused on innovation in an age of high-speed change.