Light Reading

AT&T's Amoroso: Perimeter Security No Longer Enough

Ray Le Maistre

The days of networks being adequately protected by "perimeter" security infrastructure are over, according to AT&T Chief Security Officer Ed Amoroso.

In a special video presentation recorded by AT&T Inc. (NYSE: T) for Light Reading's recent Mobile Network Security Strategies event in London, Amoroso provided a detailed insight into the different stages "we're going through as a community -- a mobility community, telecom community, and as users."

In the past, perimeter security that was built using devices such as firewalls and intrusion detection systems "sufficed," and served us well as a community, notes the AT&T expert, but in those days mobility wasn't an issue.

The mass use of mobile phones led to the concept of network-based security, though this was driven more initially by the exploits of "advanced hackers" breaching perimeters and "being able to muck around with things inside the enterprise." This resulted in security strategies that involved thwarting attacks before they reached the edge of the enterprise network.

Now we're in a new phase, says Amoroso, where mobility-enabled cloud is enabling user-defined services for individuals and companies, and "mobility is how we breathe life into that." And the key issue now is "how can we not be a tether" -- there is no point in constraining smartphone users and tethering them to the enterprise if perimeter security strategies are no longer working, he states.

AT&T's Ed Amoroso has a firm grasp on the security challenges faced by mobile network operators.
AT&T's Ed Amoroso has a firm grasp on the security challenges faced by mobile network operators.

As we enter the era of the mobility-enabled cloud, the technologies that will be important, and which will enable user freedom in a secure environment, are:

  • Encryption: "Why not encrypt everything?" asks Amoroso. That comes with the burden to get public key infrastructure and single key infrastructure correct, but "that's very difficult to do."

  • Containerized technology: Enabling secure authorized access whereby a "session" protects the integrity of an access (for example, an employee accessing an online paycheck stub) and then provides the ability to wipe data from a device once it has been accessed and used, so that evidence of the session no longer exists on the device.

  • Proxy: A mediation layer between the cloud and users, where certain types of things can be mediated. Amoroso certainly believes denial of service should be included in that proxy.

  • Run-time virtualization: This is probably more important than anything, believes Amoroso. As you virtualize an entity into the cloud -- an app, for example -- then you need to virtualize security in a virtual environment, not try to protect it with old-fashioned security devices. The idea that network operators will dynamically provision security along with the other objects that are being provisioned into the cloud is "really exciting," says the AT&T security chief.

    "Put all those things together and I fundamentally believe you can protect the mobility-enabled cloud environment better than we can protect information inside perimeters today," proclaims Amoroso. "That's a controversial statement… [but] -- there will be those that believe compliance is most important but we need to get everyone on board here -- perimeter is not working today, advanced persistence threats are making their way through, denial of service attacks render edge computing difficult to maintain."

    He adds that embedding security into the object's run-time systems is something "we hope that compliance officers and regulators will become comfortable with, because the whole idea here is to make computing safer. It's not about checklists -- it's about using the checklists to make computing support the different missions that are important to all of us. That's our vision for the future -- this futuristic prediction that's becoming real now, going from perimeter, through network-based, to a mobility-enabled cloud where we feel more comfortable pushing our information out into something more ubiquitous and more separated and hopefully protected by run-time virtualized security functionality."

    Amoroso goes on to discuss further mobile cloud security and analytics issues with his colleagues Gus De Los Reyes, executive director, security R&D at AT&T, who runs the security research group, and executive director of technology security Brian Rexroad. Find out what they had to say, and see the full presentation by Amoroso by watching the video, AT&T's Ed Amoroso on Mobile Security.

    You can also find out what else happened at the Mobile Network Security Strategies event in London by checking out our dedicated industry show site.

    — Ray Le Maistre, Circle me on Google+ Follow me on TwitterVisit my LinkedIn profile, Editor-in-Chief, Light Reading

    (0)  | 
    Comment  | 
    Print  | 
  • Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
    Educational Resources
    sponsor supplied content
    Educational Resources Archive
    From The Founder
    Steve Saunders provides an overview of white box networking and introduces a new "slim line" version of the OSI 7-layer model.
    Flash Poll
    Live Streaming Video
    CLOUD / MANAGED SERVICES: Prepping Ethernet for the Cloud
    Moderator: Ray LeMaistre Panelists: Jeremy Bye, Leonard Sheahan
    LRTV Custom TV
    Delivering Service Agility in the Virtualization Era

    11|25|15   |   5.41   |   (0) comments

    Interview with Massimo Fatato, WW OSS Business Lead, Hewlett Packard Enterprise.
    Wagner’s Ring
    How Might Open Source Fail?

    11|24|15   |     |   (7) comments

    Open source, SDN, and NFV are looking inevitable – but performance, standards proliferation and regulatory capture could derail the movement.
    LRTV Custom TV
    NFV Lifecycle Orchestration – a Fresh Vision for Telco

    11|23|15   |   6.40   |   (0) comments

    Simon Osborne, CTO Comptel, and Heavy Reading's Caroline Chappell reveal the business impacts of new SDN and NFV, and what the term service orchestration actually means. Together they define Lifecycle Service Orchestration and how the virtualized future will look for telecoms operators.
    Between the CEOs
    Cisco's Virtual Role in Saudi

    11|20|15   |   12:15   |   (1) comment

    Light Reading founder and CEO Steve Saunders talks with Zayan Sadek, Regional Manager at Cisco Systems, about the competitive communications services market and advance of virtualization in Saudi Arabia.
    LRTV Huawei Video Resource Center
    Huawei Leads With Kubernetes for Cloud PaaS

    11|19|15   |   08:26   |   (0) comments

    Huawei is looking to Kubernetes as a key tool for building robust open source technologies for customers and partners, said Ying Xiong, chief architect of cloud platform at Huawei, in an interview with Light Reading West Coast Bureau Chief Mitch Wagner at the recent Kubecon conference.
    Women in Comms Introduction Videos
    WiC in London: The Highlight Reel

    11|19|15   |   5:33   |   (1) comment

    NetCracker's Mervat El Dabae headlines an inspiring morning in London with help from leading women from Vodafone, TalkTalk, Hyperoptics and Ciena.
    LRTV Documentaries
    Why Saudi's So Hot for New Tech

    11|19|15   |   05:07   |   (0) comments

    Light Reading's Steve Saunders reports from Saudi Arabia, a hyper-competitive market desperate to embrace the next generation of communications technologies and services.
    LRTV Custom TV
    Why Data Models Deliver More Value Than Information Models

    11|19|15   |   5.08   |   (0) comments

    Stefan Vallin argues that more automation is needed to manage end-to-end services and the hybrid networks they run on, and that data models are key to achieving this.
    Telecom Innovators Video Showcase
    SDN Management & Orchestration in the WAN

    11|17|15   |   7.20   |   (0) comments

    Carol Wilson and Packet Design CTO Cengiz Alaettinoglu discuss CSPs' SDN service delivery and assurance requirements. Learn about a modular approach to building automated control, orchestration and management functions for the WAN that are policy- and analytics-driven.
    LRTV Custom TV
    Flash Networks: Optimizing for Radio Spectral Efficiency

    11|17|15   |   3:34   |   (0) comments

    Today most optimization vendors only focus on optimizing voice or data. Ofer Gottfried, Flash Networks' CTO, shows how improving data throughput and maximizing spectral efficiency reduces capital and operating expenses while also providing a platform for user engagement.
    LRTV Custom TV
    Making Pay-TV User Experiences Millennial-Friendly

    11|16|15   |   6:42   |   (0) comments

    The unique challenge of reaching and engaging Millennials is driving pay-TV video experience transformation that can include higher quality UIs, viewing of multiple content streams at once and seamless transitions between handheld devices and the television.
    LRTV Huawei Video Resource Center
    Huawei Electric Power Summit 2015 – Addis Ababa, Ethiopia

    11|16|15   |   1:28   |   (0) comments

    Huawei, together with Ethiopia's Ministry of Water, Irrigation and Electricity, hosted the Huawei Electric Power Summit 2015 in Addis Ababa, Ethiopia. The event gathered industry experts and senior executives of global electric power companies to discuss emerging industry trends including: improvements in new energy conversion efficiency, reduction of line losses ...
    Allot MobileTrends Report H2/2015 reveals how daily online behavior can be used to discover smarter ways to profile customers and propose valuable, real-time offers to them.
    Hot Topics
    Samsung to Sell Wireless Networking Unit?
    Dan Jones, Mobile Editor, 11/23/2015
    Sprint, Verizon Face Reorganization, Job Cuts
    Dan Jones, Mobile Editor, 11/20/2015
    Sprint to Get $1.2B From New Leasing Venture
    Dan Jones, Mobile Editor, 11/23/2015
    How Might Open Source Fail?
    Mitch Wagner, West Coast Bureau Chief, Light Reading, 11/24/2015
    Frontier Gives Telco TV a Boost
    Mari Silbey, Senior Editor, Cable/Video, 11/24/2015
    Like Us on Facebook
    Twitter Feed
    December 15, 2015
    Virtualizing Cable Services
    Webinar Archive
    BETWEEN THE CEOs - Executive Interviews
    Light Reading founder and CEO Steve Saunders talks with Zayan Sadek, Regional Manager at Cisco Systems, about the competitive communications services market and advance of virtualization in Saudi Arabia.
    Mobily CEO Ahmad Farroukh talks to Steve Saunders about the realities of being a mobile operator in Saudi Arabia.
    Cats with Phones
    Can't Find the Phone on Thanksgiving? Click Here
    Check under the cat! (hint: bottom right)
    Live Digital Audio

    Broadband speeds are ramping up across Europe as the continent, at its own pace, follows North America towards a gigabit society. But there are many steps to take on the road to gigabit broadband availability and a number of technology options that can meet the various requirements of Europe’s high-speed fixed broadband network operators. During this radio show we will look at some of the catalysts for broadband network investments and examine the menu of technology options on offer, including vectoring and for copper plant evolution and the various deployment possibilities for FTTH/B.