x
Security Strategies

Leading Lights 2016 Finalists: Most Innovative Security Strategy (Vendor)

As someone once noted elsewhere, modern networks are vast and there isn't a single element that can't be compromised one way or another. That there are so very many potential vulnerabilities makes security one of the most diverse and sprawling endeavors in the electronics industry.

The security business is a stark reminder that the adage "a job well done need never be done again" can sometimes be absolutely and utterly false. Security has been and seemingly always will be a moving target, a cat-and-mouse game of measures and counter-measures.

The finalists for Most Innovative Security Strategy from a vendor cover almost the whole range of security vulnerabilities, from the chip level to the network level and everywhere in between.

The winner will be announced at the Leading Lights awards dinner, which will be held during the evening of Monday, May 23, at the Hotel Ella in Austin, Texas, ahead of the Big Communications Event May 24-25 at the Austin Convention Center.

Here's a closer look at our finalists:

AdaptiveMobile
The latest iteration of AdaptiveMobile Ltd. 's Network Protection Platform, release 6 (NPP6), has several new features designed to address new threats. One is the threat from illegitimate operators who forward legitimate SMS traffic in ways that do not satisfy contractual obligations. Mobile operators can be losing millions of dollars in SMS traffic on these so-called "gray routes," which may or may not be secure. Simply shutting down these routes risks shutting off legitimate traffic, however, so this type of illegitimate re-routing has to be identified and rectified by other means. The company has been investing in new techniques and technologies (e.g. machine learning, anomaly detection algorithms) to help identify previously unknown threats such as gray routes.

Corero
The Corero Network Security Inc. solution is deployed at the edge of the Internet peering or transit point, and automatically mitigates distributed denial of service (DDoS) attack traffic in real-time. The company's appliance and in-line deployment model provides configurable policies to selectively enable a range of protection mechanisms to defend network assets against suspicious or malicious traffic types while allowing uninterrupted service access to legitimate users and applications. The SmartWall TDS employs blocking filters based on rules that leverage heuristic and closed loop policy, giving the system the ability to adapt to evolving DDoS attacks.

ECI
ECI Telecom Ltd. 's LightSEC Cyber Security Solution was crafted to ensure open, secure and vendor-agnostic solutions. LightSEC uses an NFV platform to offer a solution with maximum flexibility, enabling the introduction of systems and engines with the touch of a button. The system ensures cost efficiency and optimization of elements to protect the network from every angle, Layers 1-7. Moreover, by turning security applications into virtualized network functions, companies can leverage service chaining to gain greater efficiencies, protection and control. LightSEC offers an aggregated view of the full security situation by integrating all the security engines on one management dashboard.

Moreover, LightSEC-V employs big data analytics to offer advanced risk-grading so the security team can allocate its resources based on the likely severity of an alert.

Microsemi
Microsemi Corp. 's DIGI-G4 delivers the industry's first sub-wavelength Layer 1 encryption solution -- for the first time enabling transport of end-to-end encrypted services that are compatible with 100G OTN Switched Networks that are fast becoming the backbone of optical networks worldwide. In this scheme, end-to-end encrypted links can be offered at "service-layer" granularity and can be switched efficiently through 100G Metro OTN Switched networks, without requiring disaggregation of "bulk" encrypted links at every node in the network.

Seceon
Seceon was founded to combine some of the newest techniques in a system designed from the ground up. The company's Open Threat Management (OTM) platform for advanced threat detection and management is aimed at the enterprise market. It brings together big/fast data architecture, data collection and analysis, machine learning and behavioral analytics.

Verimatrix
Verimatrix Inc. continues to extend the utility of its Video Content Authority System (VCAS) Ultra architecture, most recently with its VideoMark live profile, designed to protect ultra high definition (UHD) linear content against real-time re-broadcasting, subscription fraud and live stream piracy. The approach is meant to be a more secure and technologically superior approach to existing watermarking methods for live broadcasts. With this tool, operators can quickly identify illegitimate streams to shut down.

The VideoMark live profile enables a flashing mark that is unobtrusive, yet quick to read and analyze. Its competitive advantage over existing watermarking solutions for live content is that the mark is embedded at the pixel level and can be secured using the Verimatrix proprietary algorithm, which is embedded in the video pipeline of the SoC hardware -- as opposed to the use of more susceptible on screen display (OSD) methods, according to the company.

— Brian Santo, Senior Editor, Components, T&M, Light Reading

Be the first to post a comment regarding this story.
HOME
Sign In
SEARCH
CLOSE
MORE
CLOSE