Ericsson says data security must move beyond a perimeter-centric approach.

Mari Silbey, Senior Editor, Cable/Video

December 3, 2014

2 Min Read
Ericsson Calls for Data-Centric Security Approach

NEW YORK -- Mobile Network Security Strategies -- Call it variations on a theme. Ericsson vice president and head of the cloud software product line Jason Hoffman repeated an argument today made by data security experts throughout Light Reading's mobile security conference: A perimeter-centric security model is no longer sufficient in an era of mobile and cloud-based technologies. (See also AT&T Adds Virtual Layer of Security.)

In fact, Hoffman stated, the industry needs to adopt a posture where everyone is classified an insider (meaning there's an assumption that everyone has system access), and every system is defined as compromised. Instead of trying to secure the entire system, companies should instead work to secure the important data within it.

There are several components to a data-centric security solution, but one that Hoffman highlighted is the need for cryptographically provable integrity around things such as identity and file or application authenticity. He even cited the Bitcoin approach, with its distributed encryption technology, as a good strategy to emulate if "you throw away the actual currency part of it."

The modern computing environment hasn't shifted entirely yet, but as Hoffman pointed out, it won't be long before our data systems are all massively distributed, and there are substantially more connected devices than humans.

Hoffman made the analogy that data centers are becoming the 21st century equivalent of factories, and that in the cycle of industrialization, data systems are progressing through five steps: standardize, combine, abstract, automate and govern. Unfortunately from a security standpoint, at the heart of the third step -- abstraction -- is programmability. Programmability inherently requires accessibility, and that means that systems are growing more vulnerable.

Going back to the idea of a security perimeter, companies are now, through abstraction, blurring every aspect of what was once a fixed boundary.

— Mari Silbey, special to Light Reading

About the Author(s)

Mari Silbey

Senior Editor, Cable/Video

Mari Silbey is a senior editor covering broadband infrastructure, video delivery, smart cities and all things cable. Previously, she worked independently for nearly a decade, contributing to trade publications, authoring custom research reports and consulting for a variety of corporate and association clients. Among her storied (and sometimes dubious) achievements, Mari launched the corporate blog for Motorola's Home division way back in 2007, ran a content development program for Limelight Networks and did her best to entertain the video nerd masses as a long-time columnist for the media blog Zatz Not Funny. She is based in Washington, D.C.

Subscribe and receive the latest news from the industry.
Join 62,000+ members. Yes it's completely free.

You May Also Like