CEO Jack Waters urges the industry to do more when it comes to security, including not only detecting threats, but alerting customers and acting on them using 'situational awareness.'

Sarah Thomas, Director, Women in Comms

June 12, 2015

2 Min Read
Level 3: Honeypots Are Only Half the Battle

CHICAGO -- Big Telecom Event -- The old IT "honeypot" tactic of sticking a controlled vulnerability in the network to see who attacks it is no longer enough in today's world of sophisticated attacks, according to Level 3 CTO Jack Waters, who called on the industry to take a more comprehensive approach to security.

In his keynote address here at BTE, Waters told attendees that what matters is seeing who is attacking the network and what specifically is being attacked. Honeypots only offer part of that capability. The Level 3 Communications Inc. (NYSE: LVLT) technical boss said operators need to have "situational awareness" of what is going on in their networks. (See Live From BTE: A Day for the Disruptors.)

"We have a platform that sits in the middle of the network and looks for vulnerabilities," he said. Even more important, Waters said, "we take action on what we see."

Check out all the news and views from the 2015 Big Telecom Event at Light Reading's dedicated BTE show news channel.

Waters was referring to the Internet backbone provider's DDoS migration service it launched in February that detects attacks as large as 4.6 terabits as they are happening, scrubs the affected traffic and returns it securely to the affected enterprise. Level 3's managed security services portfolio also includes IP-VPN security gateways and intrusion detection/prevention capabilities. (See Level 3 Brings Volume to DDoS Mitigation and Level 3 Launches DDoS Mitigation Service.)

Speaking more generally, Waters said there are four key things service providers should do when it comes to security: predict the vulnerabilities using some set of analytics; detect the vulnerabilities in the network using situational awareness; alert both the customers and security operations centers about the threat; and, finally and most importantly, do something about it to secure the network and its customers. (See Level 3, Cisco Team to Squash Major Botnet and Level 3 CTO Jack Waters: Network Integration Guru.)

"We do it for our customers -- it's really that simple," Waters said. "Our customers rely on us. We do this because our customers are demanding us to do it to connect them globally, provide a platform they can use to control services securely -- to look for threats and vulnerabilities."

— Sarah Thomas, Circle me on Google+ Follow me on TwitterVisit my LinkedIn profile, Editorial Operations Director, Light Reading

About the Author(s)

Sarah Thomas

Director, Women in Comms

Sarah Thomas's love affair with communications began in 2003 when she bought her first cellphone, a pink RAZR, which she duly "bedazzled" with the help of superglue and her dad.

She joined the editorial staff at Light Reading in 2010 and has been covering mobile technologies ever since. Sarah got her start covering telecom in 2007 at Telephony, later Connected Planet, may it rest in peace. Her non-telecom work experience includes a brief foray into public relations at Fleishman-Hillard (her cussin' upset the clients) and a hodge-podge of internships, including spells at Ingram's (Kansas City's business magazine), American Spa magazine (where she was Chief Hot-Tub Correspondent), and the tweens' quiz bible, QuizFest, in NYC.

As Editorial Operations Director, a role she took on in January 2015, Sarah is responsible for the day-to-day management of the non-news content elements on Light Reading.

Sarah received her Bachelor's in Journalism from the University of Missouri-Columbia. She lives in Chicago with her 3DTV, her iPad and a drawer full of smartphone cords.

Away from the world of telecom journalism, Sarah likes to dabble in monster truck racing, becoming part of Team Bigfoot in 2009.

Subscribe and receive the latest news from the industry.
Join 62,000+ members. Yes it's completely free.

You May Also Like