Light Reading

AT&T's Amoroso: Perimeter Security No Longer Enough

Ray Le Maistre
6/12/2014
50%
50%

The days of networks being adequately protected by "perimeter" security infrastructure are over, according to AT&T Chief Security Officer Ed Amoroso.

In a special video presentation recorded by AT&T Inc. (NYSE: T) for Light Reading's recent Mobile Network Security Strategies event in London, Amoroso provided a detailed insight into the different stages "we're going through as a community -- a mobility community, telecom community, and as users."

In the past, perimeter security that was built using devices such as firewalls and intrusion detection systems "sufficed," and served us well as a community, notes the AT&T expert, but in those days mobility wasn't an issue.

The mass use of mobile phones led to the concept of network-based security, though this was driven more initially by the exploits of "advanced hackers" breaching perimeters and "being able to muck around with things inside the enterprise." This resulted in security strategies that involved thwarting attacks before they reached the edge of the enterprise network.

Now we're in a new phase, says Amoroso, where mobility-enabled cloud is enabling user-defined services for individuals and companies, and "mobility is how we breathe life into that." And the key issue now is "how can we not be a tether" -- there is no point in constraining smartphone users and tethering them to the enterprise if perimeter security strategies are no longer working, he states.

AT&T's Ed Amoroso has a firm grasp on the security challenges faced by mobile network operators.
AT&T's Ed Amoroso has a firm grasp on the security challenges faced by mobile network operators.

As we enter the era of the mobility-enabled cloud, the technologies that will be important, and which will enable user freedom in a secure environment, are:

  • Encryption: "Why not encrypt everything?" asks Amoroso. That comes with the burden to get public key infrastructure and single key infrastructure correct, but "that's very difficult to do."

  • Containerized technology: Enabling secure authorized access whereby a "session" protects the integrity of an access (for example, an employee accessing an online paycheck stub) and then provides the ability to wipe data from a device once it has been accessed and used, so that evidence of the session no longer exists on the device.

  • Proxy: A mediation layer between the cloud and users, where certain types of things can be mediated. Amoroso certainly believes denial of service should be included in that proxy.

  • Run-time virtualization: This is probably more important than anything, believes Amoroso. As you virtualize an entity into the cloud -- an app, for example -- then you need to virtualize security in a virtual environment, not try to protect it with old-fashioned security devices. The idea that network operators will dynamically provision security along with the other objects that are being provisioned into the cloud is "really exciting," says the AT&T security chief.

    "Put all those things together and I fundamentally believe you can protect the mobility-enabled cloud environment better than we can protect information inside perimeters today," proclaims Amoroso. "That's a controversial statement… [but] -- there will be those that believe compliance is most important but we need to get everyone on board here -- perimeter is not working today, advanced persistence threats are making their way through, denial of service attacks render edge computing difficult to maintain."

    He adds that embedding security into the object's run-time systems is something "we hope that compliance officers and regulators will become comfortable with, because the whole idea here is to make computing safer. It's not about checklists -- it's about using the checklists to make computing support the different missions that are important to all of us. That's our vision for the future -- this futuristic prediction that's becoming real now, going from perimeter, through network-based, to a mobility-enabled cloud where we feel more comfortable pushing our information out into something more ubiquitous and more separated and hopefully protected by run-time virtualized security functionality."

    Amoroso goes on to discuss further mobile cloud security and analytics issues with his colleagues Gus De Los Reyes, executive director, security R&D at AT&T, who runs the security research group, and executive director of technology security Brian Rexroad. Find out what they had to say, and see the full presentation by Amoroso by watching the video, AT&T's Ed Amoroso on Mobile Security.

    You can also find out what else happened at the Mobile Network Security Strategies event in London by checking out our dedicated industry show site.

    — Ray Le Maistre, Circle me on Google+ Follow me on TwitterVisit my LinkedIn profile, Editor-in-Chief, Light Reading

    (0)  | 
    Comment  | 
    Print  | 
  • Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
    Flash Poll
    From The Founder
    Last week I dropped in on "Hotlanta," Georgia to moderate Light Reading's inaugural DroneComm conference – a unique colloquium investigating the potential for drone communications to disrupt the world's telecom ecosystem. As you will see, it was a day of exploration and epiphany...
    LRTV Documentaries
    Lack of Universal SDN a Challenge

    5|21|15   |   04:51   |   (3) comments


    Heavy Reading Analyst Sterling Perrin talks about how uncertainty about SDN standards and approaches may be slowing deployment.
    LRTV Custom TV
    Steve Vogelsang Interview: Carrier SDN

    5|20|15   |   05:02   |   (0) comments


    Sterling Perrin speaks to Steve Vogelsang, Alcatel-Lucent CTO for IP Routing & Transport business, about the new Carrier SDN-enabling Network Services Platform and the operator challenges it solves.
    LRTV Custom TV
    Carrier SDN: On-Demand Networks for an On-Demand World

    5|20|15   |   20:52   |   (0) comments


    Steve Vogelsang, Alcatel-Lucent CTO for IP Routing & Transport business, talks about requirements and benefits of Carrier SDN during the keynote address at the Light Reading Carrier SDN event May 2015.
    LRTV Documentaries
    The Security Challenge of SDN

    5|19|15   |   02:52   |   (0) comments


    CenturyLink VP James Feger discusses concerns that virtualization could create new vulnerabilities unless network operators build in safeguards.
    LRTV Custom TV
    NFV Elasticity – Highly Available VNF Scale-Out Architectures for the Mobile Edge

    5|18|15   |   5:50   |   (0) comments


    Peter Marek and Paul Stevens from Advantech Networks and Communications Group talk about their NFV Elasticity initiative and the company's latest platforms for deploying virtual network functions at the edge of the network. Packetarium XL and the new Versatile Server Module: 'designed to reach parts of the network that other servers cannot reach.'
    LRTV Huawei Video Resource Center
    Bay Area Spark Meetup 2015

    5|14|15   |   3:54   |   (0) comments


    Developed in 2009, Apache Spark is a powerful open source processing engine built around speed, ease of use and sophisticated analytics. This spring, Huawei hosted a meetup for Spark developers and data scientists in Santa Clara, California. Light Reading spoke with organizers and attendees about Huawei's code contributions and long-term commitment to Spark.
    LRTV Custom TV
    The Transport SDN Buzz

    5|12|15   |   06:01   |   (1) comment


    Sterling Perrin, senior analyst at Heavy Reading, speaks with Peter Ashwood-Smith of Huawei and Guru Parulkar of ON.Lab about the evolution of transport SDN and the integration of technologies.
    LRTV Custom TV
    Next-Generation CCAP: Cisco cBR-8 Evolved CCAP

    5|5|15   |   04:49   |   (0) comments


    John Chapman, Cisco's CTO of Cable Access Business Unit and Cisco Fellow, explained the innovation design of Cisco's cBR-8, the industry's first Evolved CCAP, including DOCSIS 3.1 design from ground-up, distributed CCAP with Remote PHY and path to virtualization. Cisco's cBR-8 Evolved CCAP is the platform that will last through the transitions.
    LRTV Custom TV
    Meeting the Demands of Bandwidth & Service Group Growth

    5|1|15   |   5:35   |   (0) comments


    Jorge Salinger, Comcast's Vice President of Access Architecture, explains how DOCSIS 3.1 and multi-service CCAP can meet the demands of the bandwidth and service group growth.
    LRTV Custom TV
    DOCSIS 3.1: Transforming Cable From Hardware-Defined Network to Software-Defined Network

    4|29|15   |   03:48   |   (0) comments


    John Chapman, Cisco's CTO of Cable Access Business Unit and Cisco Fellow, explains how DOCSIS 3.1 can transform cable HFC network to a more agile software-defined network.
    LRTV Huawei Video Resource Center
    Predicting Traffic Patterns for Quality Mobile Broadband

    4|29|15   |   6:45   |   (0) comments


    Accessing information ubiquitously creates complexity and creates heavy traffic onto the network, especially at large-scale events like sporting events or festivals. In this video, Huawei's Mohammad Hussain speaks to experts about how to predict traffic and improve user experience during periods of heavy traffic.
    Between the CEOs
    Ciena CEO: The Web-Scale Revolution

    4|28|15   |   10:32   |   (3) comments


    Light Reading CEO and founder Steve Saunders goes head-to-head with long-time Ciena CEO Gary Smith to discuss the impact of the web-scale players, the New IP and 'white box' networks.
    Upcoming Live Events
    June 8, 2015, Chicago, IL
    June 9, 2015, Chicago, IL
    June 9-10, 2015, Chicago, IL
    June 10, 2015, Chicago, IL
    September 29-30, 2015, The Westin Grand Müchen, Munich, Germany
    October 6, 2015, Westin Peachtree Plaza, Atlanta, GA
    November 11-12, 2015, The Westin Peachtree Plaza, Atlanta, GA
    All Upcoming Live Events
    Infographics
    Network functions virtualization (NFV) is not the easiest of topics to take on board, so here's a Light Reading infographic, developed following conversations with the folks at HP, that helps make sense of where NFV is taking the industry.
    Hot Topics
    AT&T Testing Virtualized GPON
    Carol Wilson, Editor-at-large, 5/15/2015
    Choosing a Technology Supplier? Consider Changing Your Selection Criteria
    Steve Saunders, CEO and founder, Light Reading, 5/18/2015
    Verizon Saves 60% Swapping Copper for Fiber
    Sarah Thomas, Editorial Operations Director, 5/19/2015
    Chattanooga Charts Killer Gigabit Apps
    Mari Silbey, Senior Editor, Cable/Video, 5/20/2015
    AT&T Takes 'Startup Mentality' to Wholesale
    Sarah Thomas, Editorial Operations Director, 5/15/2015
    Like Us on Facebook
    Twitter Feed
    Webinar Archive
    BETWEEN THE CEOs - Executive Interviews
    With 200 customers in 60 countries, Stockholm-based Net Insight has carved out a solid leadership position in one of the hottest vertical markets going in comms right now: helping service providers and broadcasters deliver video and other multimedia traffic over IP networks. How has Net Insight managed to achieve this success in the face of immense competition from the industry giants?
    My ongoing interview tour of the leading minds of the telecom industry recently took me to Richardson, Texas, where I met with Rod Naphan, CTO and SVP, Solutions, ...
    I recently popped down to Texas to chat with CEO Eric L. Pratt about his company, Taqua.
    Cats with Phones