Infographic: Security for Mobile Service Providers

Cisco Security
Cisco SecurityFounding Partner at Cisco Security
Security for Mobile
Service Providers
An Operator’s View
Mobile Security Trends
Evolved
Packet Core
Roaming
Partners
SMS
The
Internet
Cloud/Virtual
Data Center
4G
3G
Corporate Apps
Subscriber/
RAN
SGi
Gi
SGi
Gi
Gp
S2b
S2a
lub
S1
57% CAGR
LTE traffic
forecast*
* Cisco VNI Forecast
$1.2T
Revenue
for mobile SPs in 2020*
4.9B
Devices
connected to the internet
More Threats Across All Interfaces
2G 3G LTE 5G
?
Attack Surface Grows as Networks Improve
More devices
More subscriber access
More business from excess capacity
More revenue
Monetize customer usage
Internet of Everything
Licensed small cells
Network as a Service
Premium broadband
Mobility Analytics
=
=
=
=
=
Types of Threats
Data Integrity
Internal Attacks
DoS or DDoS
Botnet Attacks
Harder-to-Defend
Network Edges
DoS and DDoS
Susceptibility
Proliferation of Less
Secure Access Points
4G
3G
Evolved Packet Core (EPC)
- Firewall
- Advanced malware protection
- Carrier-grade NAT
- DDoS protection
- Next-generation IPS
Cloud/Virtual
Data Center
SGi
Gi
SGi
Gi
www
www
The
Internet
www
Protect Your Core –
and Your Customers
With a threat-centric security
approach before, during, and
after an attack
Industry-leading
Performance and Design
600+% Higher Performance
30% Higher Port Density
Technology Innovations Drive Business Growth
& Increase the Need for More Security
Innovate premium
services quickly
Maximize customer
experience
Best-in-Class
Security
Scale with
subscriber demand
*“Mobile Security: Responsibilities & Opportunities for Operators,” Heavy Reading, December 2015
Learn More Today
To learn more about security for mobile service providers,
visit Cisco Service Provider Security Solutions or call 1 800 553 6387.
Download this free white paper,
Mobile Security: Responsibilities & Opportunities for Operators
Why Cisco?
Internet
Attacks
LTE Backhaul
Traffic
Untrusted
Wifi
Multiple
Interfaces
Secure
Roaming

Recommended

Midsize Business Solutions: Cybersecurity by
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityCisco Security
3.4K views1 slide
3 Tips for Choosing a Next Generation Firewall by
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation FirewallCisco Security
2.5K views1 slide
Pervasive Security Across Your Extended Network by
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkCisco Security
6.4K views1 slide
Data Center Security Challenges by
Data Center Security ChallengesData Center Security Challenges
Data Center Security ChallengesCisco Security
8.5K views1 slide
Integrated Network Security Strategies by
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security StrategiesCisco Security
3.5K views1 slide
Cisco 2015 Midyear Security Report Slide Deck by
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco Security
4.4K views28 slides

More Related Content

What's hot

Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct... by
Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...Abhishek Goel
31 views19 slides
Introduction to Cloud Security by
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud SecuritySusanne Tedrick
195 views23 slides
eSentinel™ – 360° Cybersecurity Platform Simplified by
eSentinel™ – 360° Cybersecurity Platform SimplifiedeSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform SimplifiedNetpluz Asia Pte Ltd
220 views21 slides
How Zero Trust Makes the Mission Simple & Secure by
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Securescoopnewsgroup
582 views26 slides
Addressing Healthcare Challenges Today by
Addressing Healthcare Challenges TodayAddressing Healthcare Challenges Today
Addressing Healthcare Challenges TodayIvanti
207 views11 slides
Strategy Cloud and Security as a Service by
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceAberla
948 views13 slides

What's hot(20)

Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct... by Abhishek Goel
Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
Abhishek Goel31 views
eSentinel™ – 360° Cybersecurity Platform Simplified by Netpluz Asia Pte Ltd
eSentinel™ – 360° Cybersecurity Platform SimplifiedeSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform Simplified
How Zero Trust Makes the Mission Simple & Secure by scoopnewsgroup
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
scoopnewsgroup582 views
Addressing Healthcare Challenges Today by Ivanti
Addressing Healthcare Challenges TodayAddressing Healthcare Challenges Today
Addressing Healthcare Challenges Today
Ivanti207 views
Strategy Cloud and Security as a Service by Aberla
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a Service
Aberla948 views
What is zero trust model (ztm) by Ahmed Banafa
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
Ahmed Banafa775 views
Cyber Ethics: Cyber Security Services | VAPT and WAPT by SaeelRelekar
 Cyber Ethics: Cyber Security Services | VAPT and WAPT Cyber Ethics: Cyber Security Services | VAPT and WAPT
Cyber Ethics: Cyber Security Services | VAPT and WAPT
SaeelRelekar183 views
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf... by Symantec
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec396 views
Zero Trust Framework for Network Security​ by AlgoSec
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
AlgoSec2.5K views
Zymr Cybersecurity by Zymr Cloud
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity
Zymr Cloud257 views
Navigating the Zero Trust Journey for Today's Everywhere Workplace by Ivanti
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Ivanti342 views
Cyber Security Services & Solutions - Zymr by ZYMR, INC.
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - Zymr
ZYMR, INC.219 views
What is Zero Trust by Okta-Inc
What is Zero TrustWhat is Zero Trust
What is Zero Trust
Okta-Inc1.8K views
Micro segmentation and zero trust for security and compliance - Guardicore an... by YouAttestSlideshare
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...
What is zero trust model of information security? by Ahmed Banafa
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?
Ahmed Banafa2.5K views
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada by Cristian Garcia G.
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Cristian Garcia G.313 views

Viewers also liked

Malware and the Cost of Inactivity by
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of InactivityCisco Security
8.8K views1 slide
Cisco ISE Reduces the Attack Surface by Controlling Access by
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco Security
4.4K views1 slide
A Reality Check on the State of Cybersecurity by
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityCisco Security
3.1K views1 slide
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur... by
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Cisco Security
4.2K views36 slides
Cisco Web and Email Security Overview by
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
26.5K views51 slides
Balance Data Center Security and Performance by
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and PerformanceCisco Security
2.5K views1 slide

Viewers also liked(14)

Malware and the Cost of Inactivity by Cisco Security
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
Cisco Security8.8K views
Cisco ISE Reduces the Attack Surface by Controlling Access by Cisco Security
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco Security4.4K views
A Reality Check on the State of Cybersecurity by Cisco Security
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
Cisco Security3.1K views
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur... by Cisco Security
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Cisco Security4.2K views
Cisco Web and Email Security Overview by Cisco Security
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
Cisco Security26.5K views
Balance Data Center Security and Performance by Cisco Security
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
Cisco Security2.5K views
2013 Cisco Annual Security Report by Cisco Security
2013 Cisco Annual Security Report2013 Cisco Annual Security Report
2013 Cisco Annual Security Report
Cisco Security2.3K views
Enterprise Strategy Group: Security Survey by Cisco Security
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
Cisco Security3.1K views
Defending the Data Center: Managing Users from the Edge to the Application by Cisco Security
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the Application
Cisco Security1.1K views
From Physical to Virtual to Cloud by Cisco Security
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to Cloud
Cisco Security1.7K views
McAllen Intermediate School District by Cisco Security
McAllen Intermediate School DistrictMcAllen Intermediate School District
McAllen Intermediate School District
Cisco Security1.3K views
Data Center Security Now and into the Future by Cisco Security
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
Cisco Security2.4K views
Inside NetQin Mobile Inc. (NYSE: NQ) - By iChinaStock by iChinaStock
Inside NetQin Mobile Inc. (NYSE: NQ) - By iChinaStockInside NetQin Mobile Inc. (NYSE: NQ) - By iChinaStock
Inside NetQin Mobile Inc. (NYSE: NQ) - By iChinaStock
iChinaStock2.5K views
andrew milroy - top security trends and takeaways for 2013 by Graeme Wood
andrew milroy - top security trends and takeaways for 2013andrew milroy - top security trends and takeaways for 2013
andrew milroy - top security trends and takeaways for 2013
Graeme Wood880 views

Similar to Infographic: Security for Mobile Service Providers

5G mission diary: Houston, we have a problem by
5G mission diary: Houston, we have a problem5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problemPositiveTechnologies
435 views49 slides
NGFW Brochure 08 08 by
NGFW Brochure 08 08NGFW Brochure 08 08
NGFW Brochure 08 08Sunardi Fatan
224 views4 slides
Transform your enterprise branch with secure sd-wan by
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanDATA SECURITY SOLUTIONS
665 views28 slides
Security course: exclusive 5G SA pitfalls and new changes to legislation by
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationPositiveTechnologies
269 views27 slides
Telecom Security in the Era of 5G and IoT by
Telecom Security in the Era of 5G and IoTTelecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTPositiveTechnologies
572 views25 slides
Scaling Mobile Network Security for LTE: A Multi-Layer Approach by
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachF5 Networks
1.2K views13 slides

Similar to Infographic: Security for Mobile Service Providers(20)

Security course: exclusive 5G SA pitfalls and new changes to legislation by PositiveTechnologies
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
Scaling Mobile Network Security for LTE: A Multi-Layer Approach by F5 Networks
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
F5 Networks1.2K views
A Different Approach to Securing Your Cloud Journey by Cloudflare
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud Journey
Cloudflare708 views
Cisco Connect 2018 Thailand - Cisco SD-WAN next generation wan to power your ... by NetworkCollaborators
Cisco Connect 2018 Thailand - Cisco SD-WAN next generation wan to power your ...Cisco Connect 2018 Thailand - Cisco SD-WAN next generation wan to power your ...
Cisco Connect 2018 Thailand - Cisco SD-WAN next generation wan to power your ...
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions by NetworkCollaborators
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
WatchGuard: Bring Your Own Device or Bring Your Own Danger by Roeing Corporation
WatchGuard: Bring Your Own Device or Bring Your Own DangerWatchGuard: Bring Your Own Device or Bring Your Own Danger
WatchGuard: Bring Your Own Device or Bring Your Own Danger
Roeing Corporation2.5K views
F5 Distributed Cloud.pptx by abenyeung1
F5 Distributed Cloud.pptxF5 Distributed Cloud.pptx
F5 Distributed Cloud.pptx
abenyeung1326 views
5G Security Program Datasheet (2).pdf by Security Gen
5G Security Program Datasheet (2).pdf5G Security Program Datasheet (2).pdf
5G Security Program Datasheet (2).pdf
Security Gen5 views
Secure Horizons Navigating the Complexities of 5G Security.pdf by SecurityGen1
Secure Horizons Navigating the Complexities of 5G Security.pdfSecure Horizons Navigating the Complexities of 5G Security.pdf
Secure Horizons Navigating the Complexities of 5G Security.pdf
SecurityGen12 views
Best 5G Security Solutions - SecurityGen by Security Gen
Best 5G Security Solutions - SecurityGenBest 5G Security Solutions - SecurityGen
Best 5G Security Solutions - SecurityGen
Security Gen9 views
Empowering 5G with Cutting-Edge Security Services.pdf by SecurityGen1
Empowering 5G with Cutting-Edge Security Services.pdfEmpowering 5G with Cutting-Edge Security Services.pdf
Empowering 5G with Cutting-Edge Security Services.pdf
SecurityGen17 views

More from Cisco Security

Incident Response Services Template - Cisco Security by
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityCisco Security
11.2K views2 slides
AMP Helps Cisco IT Catch 50% More Malware threats by
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsCisco Security
4.9K views1 slide
The Cost of Inactivity: Malware Infographic by
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicCisco Security
1.7K views1 slide
Cisco Addresses the Full Attack Continuum by
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Security
4.4K views21 slides
Infonetics Network and Content Security Vendor Scorecard by
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardCisco Security
2.2K views12 slides
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ... by
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Cisco Security
7.3K views15 slides

More from Cisco Security(16)

Incident Response Services Template - Cisco Security by Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
Cisco Security11.2K views
AMP Helps Cisco IT Catch 50% More Malware threats by Cisco Security
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
Cisco Security4.9K views
The Cost of Inactivity: Malware Infographic by Cisco Security
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
Cisco Security1.7K views
Cisco Addresses the Full Attack Continuum by Cisco Security
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
Cisco Security4.4K views
Infonetics Network and Content Security Vendor Scorecard by Cisco Security
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
Cisco Security2.2K views
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ... by Cisco Security
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Cisco Security7.3K views
The Evolution of and Need for Secure Network Access by Cisco Security
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
Cisco Security2.6K views
Cisco 2014 Midyear Security Report by Cisco Security
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
Cisco Security2.4K views
String of Paerls Infographic by Cisco Security
String of Paerls InfographicString of Paerls Infographic
String of Paerls Infographic
Cisco Security1.4K views
Midyear Security Report Infographic by Cisco Security
Midyear Security Report InfographicMidyear Security Report Infographic
Midyear Security Report Infographic
Cisco Security478 views
Cisco Annual Security Report Infographic by Cisco Security
Cisco Annual Security Report InfographicCisco Annual Security Report Infographic
Cisco Annual Security Report Infographic
Cisco Security602 views
City of Tomorrow Builds in Next-Generation Security by Cisco Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation Security
Cisco Security2.2K views
Laser Pioneer Secures Network End-to-End to Protect Assets by Cisco Security
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
Cisco Security1.1K views
Leveraging Context-Aware Security to Safeguard Patient Data by Cisco Security
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient Data
Cisco Security1.1K views
Secure, Automated Network Access for Any Device on Campus by Cisco Security
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on Campus
Cisco Security669 views

Recently uploaded

Generative AI: Shifting the AI Landscape by
Generative AI: Shifting the AI LandscapeGenerative AI: Shifting the AI Landscape
Generative AI: Shifting the AI LandscapeDeakin University
67 views55 slides
Future of Indian ConsumerTech by
Future of Indian ConsumerTechFuture of Indian ConsumerTech
Future of Indian ConsumerTechKapil Khandelwal (KK)
36 views68 slides
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023 by
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023Redefining the book supply chain: A glimpse into the future - Tech Forum 2023
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023BookNet Canada
44 views19 slides
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... by
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...ShapeBlue
162 views25 slides
Business Analyst Series 2023 - Week 4 Session 8 by
Business Analyst Series 2023 -  Week 4 Session 8Business Analyst Series 2023 -  Week 4 Session 8
Business Analyst Series 2023 - Week 4 Session 8DianaGray10
145 views13 slides
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...The Digital Insurer
91 views52 slides

Recently uploaded(20)

Redefining the book supply chain: A glimpse into the future - Tech Forum 2023 by BookNet Canada
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023Redefining the book supply chain: A glimpse into the future - Tech Forum 2023
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023
BookNet Canada44 views
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... by ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue162 views
Business Analyst Series 2023 - Week 4 Session 8 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 8Business Analyst Series 2023 -  Week 4 Session 8
Business Analyst Series 2023 - Week 4 Session 8
DianaGray10145 views
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... by ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue129 views
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue by ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue137 views
Initiating and Advancing Your Strategic GIS Governance Strategy by Safe Software
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance Strategy
Safe Software184 views
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... by ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue199 views
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT by ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue208 views
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... by ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue183 views
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue by ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue139 views
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue by ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue152 views
"Running students' code in isolation. The hard way", Yurii Holiuk by Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays36 views
Why and How CloudStack at weSystems - Stephan Bienek - weSystems by ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue247 views
Transcript: Redefining the book supply chain: A glimpse into the future - Tec... by BookNet Canada
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
BookNet Canada41 views
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... by ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue171 views

Infographic: Security for Mobile Service Providers

  • 1. Security for Mobile Service Providers An Operator’s View Mobile Security Trends Evolved Packet Core Roaming Partners SMS The Internet Cloud/Virtual Data Center 4G 3G Corporate Apps Subscriber/ RAN SGi Gi SGi Gi Gp S2b S2a lub S1 57% CAGR LTE traffic forecast* * Cisco VNI Forecast $1.2T Revenue for mobile SPs in 2020* 4.9B Devices connected to the internet More Threats Across All Interfaces 2G 3G LTE 5G ? Attack Surface Grows as Networks Improve More devices More subscriber access More business from excess capacity More revenue Monetize customer usage Internet of Everything Licensed small cells Network as a Service Premium broadband Mobility Analytics = = = = = Types of Threats Data Integrity Internal Attacks DoS or DDoS Botnet Attacks Harder-to-Defend Network Edges DoS and DDoS Susceptibility Proliferation of Less Secure Access Points 4G 3G Evolved Packet Core (EPC) - Firewall - Advanced malware protection - Carrier-grade NAT - DDoS protection - Next-generation IPS Cloud/Virtual Data Center SGi Gi SGi Gi www www The Internet www Protect Your Core – and Your Customers With a threat-centric security approach before, during, and after an attack Industry-leading Performance and Design 600+% Higher Performance 30% Higher Port Density Technology Innovations Drive Business Growth & Increase the Need for More Security Innovate premium services quickly Maximize customer experience Best-in-Class Security Scale with subscriber demand *“Mobile Security: Responsibilities & Opportunities for Operators,” Heavy Reading, December 2015 Learn More Today To learn more about security for mobile service providers, visit Cisco Service Provider Security Solutions or call 1 800 553 6387. Download this free white paper, Mobile Security: Responsibilities & Opportunities for Operators Why Cisco? Internet Attacks LTE Backhaul Traffic Untrusted Wifi Multiple Interfaces Secure Roaming