& cplSiteName &

AT&T's Amoroso: Perimeter Security No Longer Enough

Ray Le Maistre
6/12/2014
50%
50%

The days of networks being adequately protected by "perimeter" security infrastructure are over, according to AT&T Chief Security Officer Ed Amoroso.

In a special video presentation recorded by AT&T Inc. (NYSE: T) for Light Reading's recent Mobile Network Security Strategies event in London, Amoroso provided a detailed insight into the different stages "we're going through as a community -- a mobility community, telecom community, and as users."

In the past, perimeter security that was built using devices such as firewalls and intrusion detection systems "sufficed," and served us well as a community, notes the AT&T expert, but in those days mobility wasn't an issue.

The mass use of mobile phones led to the concept of network-based security, though this was driven more initially by the exploits of "advanced hackers" breaching perimeters and "being able to muck around with things inside the enterprise." This resulted in security strategies that involved thwarting attacks before they reached the edge of the enterprise network.

Now we're in a new phase, says Amoroso, where mobility-enabled cloud is enabling user-defined services for individuals and companies, and "mobility is how we breathe life into that." And the key issue now is "how can we not be a tether" -- there is no point in constraining smartphone users and tethering them to the enterprise if perimeter security strategies are no longer working, he states.

AT&T's Ed Amoroso has a firm grasp on the security challenges faced by mobile network operators.
AT&T's Ed Amoroso has a firm grasp on the security challenges faced by mobile network operators.

As we enter the era of the mobility-enabled cloud, the technologies that will be important, and which will enable user freedom in a secure environment, are:

  • Encryption: "Why not encrypt everything?" asks Amoroso. That comes with the burden to get public key infrastructure and single key infrastructure correct, but "that's very difficult to do."

  • Containerized technology: Enabling secure authorized access whereby a "session" protects the integrity of an access (for example, an employee accessing an online paycheck stub) and then provides the ability to wipe data from a device once it has been accessed and used, so that evidence of the session no longer exists on the device.

  • Proxy: A mediation layer between the cloud and users, where certain types of things can be mediated. Amoroso certainly believes denial of service should be included in that proxy.

  • Run-time virtualization: This is probably more important than anything, believes Amoroso. As you virtualize an entity into the cloud -- an app, for example -- then you need to virtualize security in a virtual environment, not try to protect it with old-fashioned security devices. The idea that network operators will dynamically provision security along with the other objects that are being provisioned into the cloud is "really exciting," says the AT&T security chief.

    "Put all those things together and I fundamentally believe you can protect the mobility-enabled cloud environment better than we can protect information inside perimeters today," proclaims Amoroso. "That's a controversial statement… [but] -- there will be those that believe compliance is most important but we need to get everyone on board here -- perimeter is not working today, advanced persistence threats are making their way through, denial of service attacks render edge computing difficult to maintain."

    He adds that embedding security into the object's run-time systems is something "we hope that compliance officers and regulators will become comfortable with, because the whole idea here is to make computing safer. It's not about checklists -- it's about using the checklists to make computing support the different missions that are important to all of us. That's our vision for the future -- this futuristic prediction that's becoming real now, going from perimeter, through network-based, to a mobility-enabled cloud where we feel more comfortable pushing our information out into something more ubiquitous and more separated and hopefully protected by run-time virtualized security functionality."

    Amoroso goes on to discuss further mobile cloud security and analytics issues with his colleagues Gus De Los Reyes, executive director, security R&D at AT&T, who runs the security research group, and executive director of technology security Brian Rexroad. Find out what they had to say, and see the full presentation by Amoroso by watching the video, AT&T's Ed Amoroso on Mobile Security.

    You can also find out what else happened at the Mobile Network Security Strategies event in London by checking out our dedicated industry show site.

    — Ray Le Maistre, Circle me on Google+ Follow me on TwitterVisit my LinkedIn profile, Editor-in-Chief, Light Reading

    (0)  | 
    Comment  | 
    Print  | 
  • Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
    From The Founder
    NFV's promises of automation and virtualization are intriguing, but what really excites service providers is the massive amount of money they could save.
    Flash Poll
    Live Streaming Video
    Charting the CSP's Future
    Six different communications service providers join to debate their visions of the future CSP, following a landmark presentation from AT&T on its massive virtualization efforts and a look back on where the telecom industry has been and where it's going from two industry veterans.
    LRTV Documentaries
    Three Gets Smart(y), BT Invokes Twitter – The Recap

    8|21|17   |     |   (0) comments


    From Telecoms.com, a recap of the week's telecoms talking points. It's been a week of gimmicks as Three tests out a pay-as-you-go sub-brand called Smarty; Comcast
    Women in Comms Introduction Videos
    VMWare VP Brings Women Up With Her

    8|16|17   |   6:49   |   (1) comment


    It's an art and a science to make mentorship, inclusive leadership, diversity and promotion of high-potential women work, says Honore' LaBourdette, vice president of Global Market Development at VMWare.
    LRTV Documentaries
    5G Spectrum Wars – The Recap

    8|15|17   |   2:22   |   (0) comments


    Service provider 3 has filed a lawsuit against Ofcom over 5G spectrum auction in the UK.
    LRTV Custom TV
    Say What? Facebook Unleashes AI Anarchy – The Recap

    8|7|17   |     |   (0) comments


    A recap of the week's talking points on Light Reading's sister site, telecoms.com. Facebook AI programmers had a bit of a brain-fade as they allowed one of its AI applications to invent its ...
    Women in Comms Introduction Videos
    Fujitsu's Women Band Together to Help Girls Do STEM

    8|2|17   |   9:35   |   (1) comment


    Supporting women both inside and outside of Fujitsu is a top priority of the telecom vendor. Yanbing Li, Fujitsu Network Communication's director of System Software Development & Delivery, shares why it's important, but why there's still a long road ahead.
    LRTV Custom TV
    If You're Not First, You're Last – The Recap

    7|31|17   |   08:18   |   (1) comment


    In case you missed it, Amazon's 1% stock increase helped Jeff Bezos dethrone Bill Gates as the richest man in the world. Also, Taiwanese electronics manufacturer
    Women in Comms Introduction Videos
    AT&T's Tech President Preps Workforce for the Future

    7|26|17   |   5:47   |   (10) comments


    AT&T is focused on the software-defined network of the future and is reskilling its workforce to get ready too, according to AT&T's President of Technology Development Melissa Arnoldi.
    Women in Comms Introduction Videos
    Cisco: Mentoring Critical to Attract & Retain Women

    7|19|17   |   6:40   |   (1) comment


    Liz Centoni, senior vice president and general manager of Cisco's Computing System Product Group, shares why mentoring in all its forms is important for women and what Cisco is doing that's made a difference for women in tech.
    LRTV Custom TV
    Gigabit LTE With Snapdragon 835

    7|12|17   |     |   (1) comment


    At an event in Wembley stadium, EE used its live network to demonstrate gigabit LTE using a Sony Xperia XZ Premium smartphone with a Qualcomm Snapdragon 835 chip.
    LRTV Custom TV
    Implementing Machine Intelligence With Guavus

    7|12|17   |     |   (0) comments


    Guavus unites big data and machine intelligence, enabling many of the the largest service providers in the world to save money and drive measureable revenue. Learn how applying Machine Intelligence substantially reduces operational costs and in many cases can eliminate subscriber impact, meaning a better subscriber experience and higher NPS.
    LRTV Custom TV
    Unlocking Customer Experience Insights With Machine Intelligence

    7|12|17   |     |   (0) comments


    When used to analyze operational data and to drive operational decisions, machine intelligence reduces the number of tasks which require human intervention. Guavus invested in Machine Intelligence early. Learn about the difference between Machine Learning and Machine Intelligence.
    Women in Comms Introduction Videos
    Verizon VP Talks Network, Career Planning

    7|12|17   |   4:49   |   (0) comments


    Heidi Hemmer, vice president of Technology, Strategy & Planning at Verizon, shares how bold bets and the future of tech define her career.
    Upcoming Live Events
    September 28, 2017, Denver, CO
    October 18, 2017, Colorado Convention Center - Denver, CO
    November 1, 2017, The Royal Garden Hotel
    November 1, 2017, The Montcalm Marble Arch
    November 2, 2017, 8 Northumberland Avenue, London, UK
    November 30, 2017, The Westin Times Square
    All Upcoming Live Events
    Infographics
    With the mobile ecosystem becoming increasingly vulnerable to security threats, AdaptiveMobile has laid out some of the key considerations for the wireless community.
    Hot Topics
    Intel CEO Leaves Trump Biz Advisory Board
    Dan Jones, Mobile Editor, 8/15/2017
    Orchestration Startup UBiqube Pivots Away From NFV
    Carol Wilson, Editor-at-large, 8/15/2017
    WiCipedia: Dolly Babes, Manifesto Backlash & 'Brotastic' Failures
    Eryn Leavens, Special Features & Copy Editor, 8/18/2017
    T-Mobile Turns On First 600MHz 4G Sites
    Dan Jones, Mobile Editor, 8/16/2017
    Stream or Split, Says Amazon
    Aditya Kishore, Practice Leader, Video Transformation, Telco Transformation, 8/16/2017
    Like Us on Facebook
    Twitter Feed
    Animals with Phones
    We Know a Tough Day When We See One Click Here
    Live Digital Audio

    Understanding the full experience of women in technology requires starting at the collegiate level (or sooner) and studying the technologies women are involved with, company cultures they're part of and personal experiences of individuals.

    During this WiC radio show, we will talk with Nicole Engelbert, the director of Research & Analysis for Ovum Technology and a 23-year telecom industry veteran, about her experiences and perspectives on women in tech. Engelbert covers infrastructure, applications and industries for Ovum, but she is also involved in the research firm's higher education team and has helped colleges and universities globally leverage technology as a strategy for improving recruitment, retention and graduation performance.

    She will share her unique insight into the collegiate level, where women pursuing engineering and STEM-related degrees is dwindling. Engelbert will also reveal new, original Ovum research on the topics of artificial intelligence, the Internet of Things, security and augmented reality, as well as discuss what each of those technologies might mean for women in our field. As always, we'll also leave plenty of time to answer all your questions live on the air and chat board.