Light Reading
AT&T's chief security officer explains why a whole new approach to mobile network security is needed in a world of smartphones, the cloud, and virtualization.

AT&T's Amoroso: Perimeter Security No Longer Enough

Ray Le Maistre
6/12/2014
50%
50%

The days of networks being adequately protected by "perimeter" security infrastructure are over, according to AT&T Chief Security Officer Ed Amoroso.

In a special video presentation recorded by AT&T Inc. (NYSE: T) for Light Reading's recent Mobile Network Security Strategies event in London, Amoroso provided a detailed insight into the different stages "we're going through as a community -- a mobility community, telecom community, and as users."

In the past, perimeter security that was built using devices such as firewalls and intrusion detection systems "sufficed," and served us well as a community, notes the AT&T expert, but in those days mobility wasn't an issue.

The mass use of mobile phones led to the concept of network-based security, though this was driven more initially by the exploits of "advanced hackers" breaching perimeters and "being able to muck around with things inside the enterprise." This resulted in security strategies that involved thwarting attacks before they reached the edge of the enterprise network.

Now we're in a new phase, says Amoroso, where mobility-enabled cloud is enabling user-defined services for individuals and companies, and "mobility is how we breathe life into that." And the key issue now is "how can we not be a tether" -- there is no point in constraining smartphone users and tethering them to the enterprise if perimeter security strategies are no longer working, he states.

AT&T's Ed Amoroso has a firm grasp on the security challenges faced by mobile network operators.
AT&T's Ed Amoroso has a firm grasp on the security challenges faced by mobile network operators.

As we enter the era of the mobility-enabled cloud, the technologies that will be important, and which will enable user freedom in a secure environment, are:

  • Encryption: "Why not encrypt everything?" asks Amoroso. That comes with the burden to get public key infrastructure and single key infrastructure correct, but "that's very difficult to do."

  • Containerized technology: Enabling secure authorized access whereby a "session" protects the integrity of an access (for example, an employee accessing an online paycheck stub) and then provides the ability to wipe data from a device once it has been accessed and used, so that evidence of the session no longer exists on the device.

  • Proxy: A mediation layer between the cloud and users, where certain types of things can be mediated. Amoroso certainly believes denial of service should be included in that proxy.

  • Run-time virtualization: This is probably more important than anything, believes Amoroso. As you virtualize an entity into the cloud -- an app, for example -- then you need to virtualize security in a virtual environment, not try to protect it with old-fashioned security devices. The idea that network operators will dynamically provision security along with the other objects that are being provisioned into the cloud is "really exciting," says the AT&T security chief.

    "Put all those things together and I fundamentally believe you can protect the mobility-enabled cloud environment better than we can protect information inside perimeters today," proclaims Amoroso. "That's a controversial statement… [but] -- there will be those that believe compliance is most important but we need to get everyone on board here -- perimeter is not working today, advanced persistence threats are making their way through, denial of service attacks render edge computing difficult to maintain."

    He adds that embedding security into the object's run-time systems is something "we hope that compliance officers and regulators will become comfortable with, because the whole idea here is to make computing safer. It's not about checklists -- it's about using the checklists to make computing support the different missions that are important to all of us. That's our vision for the future -- this futuristic prediction that's becoming real now, going from perimeter, through network-based, to a mobility-enabled cloud where we feel more comfortable pushing our information out into something more ubiquitous and more separated and hopefully protected by run-time virtualized security functionality."

    Amoroso goes on to discuss further mobile cloud security and analytics issues with his colleagues Gus De Los Reyes, executive director, security R&D at AT&T, who runs the security research group, and executive director of technology security Brian Rexroad. Find out what they had to say, and see the full presentation by Amoroso by watching the video, AT&T's Ed Amoroso on Mobile Security.

    You can also find out what else happened at the Mobile Network Security Strategies event in London by checking out our dedicated industry show site.

    — Ray Le Maistre, Circle me on Google+ Follow me on TwitterVisit my LinkedIn profile, Editor-in-Chief, Light Reading

    (0)  | 
    Comment  | 
    Print  | 
  • Newest First  |  Oldest First  |  Threaded View
    Flash Poll
    LRTV Huawei Video Resource Center
    The Inaugural Optical Innovation Forum in Nice

    9|2|14   |     |   (0) comments


    More than 170 attendees from network operators, service providers, analyst firms, and component companies from around the world convened in Nice in June for the inaugural Optical Innovation Forum, co-produced by Huawei and Light Reading.
    Wagner’s Ring
    Data Centers Drive Telcos Into the Future

    8|28|14   |   2:20   |   (2) comments


    Data centers are at the heart of key trends driving telecom -- network virtualization, the drive for increased agility, and the need to compete with OTT providers.
    LRTV Custom TV
    Why SPs Should Consider Cisco's EPN

    8|27|14   |   5:40   |   (0) comments


    Sultan Dawood from Cisco discusses Cisco's EPN, which enables SPs to build agile and programmable networks delivering new network virtualized services using Cisco's Evolved Services Platform (ESP).
    LRTV Huawei Video Resource Center
    Huawei’s Showcase @ Big Telecom Event 2014

    8|26|14   |   2.56   |   (0) comments


    SoftCOM is Huawei's framework for telecom business and network transformation. Haofei Liu, Solution Marketing Manager, Carrier Business Group, Huawei, showcases Huawei's SoftCOM architecture in this video.
    LRTV Huawei Video Resource Center
    Huawei @ BTE 2014: Director of Integrated Solutions on SoftCOM & NFV Monetization

    8|26|14   |   4.43   |   (0) comments


    Libin Dai, Director of Integrated Solutions, Carrier Business Group, discusses Huawei's SoftCOM and NFV monetization. Huawei believes that NFV monetization should be service-driven rather than network-driven, and that operators should have network transformation, service transformation and a compatible and collaborative ecosystem in place in order to deploy NFV.
    LRTV Huawei Video Resource Center
    Huawei @ BTE 2014: Director of US NFV Lab on CloudEdge & the Future of NFV

    8|26|14   |   4.06   |   (0) comments


    Sean Chen, Director of US NFV Lab at Huawei, discusses Huawei's new approach to NFV in open collaboration. Huawei believes that through Proof of Concept tests, it could help operators learn and communicate with the industry more effectively. Sean believes that successful implementation of NFV should have its values reaching to end users and discusses how Huawei's ...
    LRTV Huawei Video Resource Center
    Huawei's Highlights @ Big Telecom Event 2014

    8|26|14   |   3.34   |   (0) comments


    At the Big Telecom Event in Chicago Huawei showcases its high-level strategy, the SoftCOM architecture, which helps operators reduce the cost of ownership of their network infrastructure and generate additional revenue in the ICT service environment. Huawei showcases over 30 pilot programs from across the globe, focusing on the industry-leading commercial ...
    LRTV Custom TV
    VeEX – Live from the Show

    8|21|14   |   5:58   |   (0) comments


    An overview of VeEX Test and Measurement solutions including TX300S multi-service test set with VeExpress cloud-based management system, UX400 universal modular platform supporting 100G testing, and the redesigned RXT modular platform.
    LRTV Custom TV
    Transitioning CE 2.0 Networks Into the SDN & NFV Era With Telco Systems

    8|19|14   |   5:19   |   (0) comments


    Telco Systems' Ariel Efrati (CEO) and Moshe Shimon (VP of Product Management) discuss virtualization and how the company's new Open Metro Edge solution utilizes the SDN and NFV concepts to accelerate and orchestrate service delivery through its innovative product portfolio and software applications.
    LRTV Custom TV
    NFV Myths: Is NFV Still Several Years Away?

    8|11|14   |   1:13   |   (0) comments


    Some say that NFV (network functions virtualization) is still several years away from being implemented on mobile operator networks. This isn't the case. Operators can get started on their paths to NFV now, as this short video from Skyfire shows.
    LRTV Custom TV
    A New Security Paradigm in SDN/NFV

    7|28|14   |   02:54   |   (0) comments


    Paul Shaneck, Global Director Network Solutions for Symantec, discusses the evolving virtualized network, explaining how Symantec is leading the security discussion as it relates to SDN and NFV, and helping to ensure the network is protected and compliant.
    LRTV Documentaries
    Sprint's Network Evolution

    7|24|14   |   14:59   |   (0) comments


    Sprint's Jay Bluhm gives a keynote speech at the Big Telecom Event (BTE) about Sprint's network and services evolution strategy, including Spark.
    Upcoming Live Events!!
    September 16, 2014, Santa Clara, CA
    September 16, 2014, Santa Clara, CA
    September 23, 2014, Denver, CO
    October 29, 2014, New York City
    November 6, 2014, Santa Clara
    November 11, 2014, Atlanta, GA
    December 2, 2014, New York City
    December 9-10, 2014, Reykjavik, Iceland
    June 9-10, 2015, Chicago, IL
    Infographics
    A survey conducted by Vasona Networks suggests that 72% of mobile users expect good performance all the time, and they'll blame the network operator when it's not up to par.
    Today's Cartoon
    Hot Topics
    Nokia's Maps Land on Samsung Devices
    Sarah Reedy, Senior Editor, 8/29/2014
    Now Google Planning Drones-to-Go
    Dan Jones, Mobile Editor, 8/29/2014
    Music to My Mobile
    Sarah Reedy, Senior Editor, 8/28/2014
    Be Open to the Freedom of Openness
    Kelly Herrell, 8/29/2014
    Netflix to FCC: Kill Comcast-TWC Deal
    Alan Breznick, Cable/Video Practice Leader, 8/28/2014
    Like Us on Facebook
    Twitter Feed