SlideShare a Scribd company logo
1 of 4
Download to read offline
PANOPTICA CUSTOMER STORY
Forging a Secure Path to Private
5G Networks for Enterprises
Spica Systems, a software R&D organization that builds highly secure private
5G network software uses Panoptica as its cloud native application security
solution to secure its end-to-end software suite at a lower cost.
Panoptica Customer Story | Panoptica.app 2
CHALLENGE
Building a Secure Path to Private 5G Networks for Enterprises
As the CEO of Spica Systems, a San Jose, California, based software R&D organization that builds highly
secure private 5G network software, Sisir Chowdhury was concerned. His DevOps team was hard at work
building SMC (Spica Mobility Core), a lightweight cloud native 5G packet core engine for private 5G networks
designed to operate seamlessly on Kubernetes clusters in any cloud environment. While the software
development of the solution was progressing swiftly and precisely, the team needed a comprehensive yet
cost-effective cloud native security solution to harden SMC’s security posture.
SMC, crafted by Spica Systems, encompasses a comprehensive suite of cloud native network functions,
including access and mobility functions (AMF), session management functions (SMF), user plane functions
(UPF), policy control functions (PCF), authentication server functions (AUSF), application functions (AF),
network repository functions (NRFs), and more. Spica Systems serves diverse customers across various
market segments and key industry verticals.
“Our customers span the spectrum from small startups to large enterprises in the oil and gas, manufacturing,
utilities, and high-tech sectors—all in the midst of transitioning to private 5G networks,” says Sisir Chowdhury.
“Ensuring their sensitive data is exchanged safely over our private 5G packet core application was a top
concern and the highest priority.”
Sisir further adds, “And yet, the widely available cloud native security solutions in the market proved
impractical for us due to how much they cost, and the intricate processes associated with their adoption. Our
customers prefer a private 5G network that can be continuously monitored for security vulnerabilities while
remaining simple to adopt, effective, and cost-friendly in delivering enterprise-grade security.”
The challenges did not stop there. From the perspective of Sisir’s DevOps teams, the big issue was a lack of
visibility into security vulnerabilities in the development and testing phases of the CI/CD pipelines. By
proactively scanning container images during these initial stages, the team aimed to prevent production issues
for their customers and ensure a seamless user experience.
Sisir explains, “Our diligent DevOps teams always strive to minimize blind spots in the network. Early detection
and continuous patching of our software to avert any potential production issues for our valued customers is a
huge priority for them. But not having visibility into the security vulnerabilities within our software posed a
formidable roadblock to achieving this objective. The inability to view, monitor, and manage vulnerabilities was
one of the main problems our DevOps teams were trying to solve on the backend.”
And then there were resource constraints that compounded the obstacles faced by Spica Systems. Mr.
Subhas Bothra, Director of IT and Security Operations at Spica Systems explains, “Our security operations rely
on a small team of professionals. We urgently needed a trusted partner who could assist us in managing
security and flagging vulnerabilities within our Kubernetes clusters, all while alleviating the strain on our human
and capital resources.”
3
REQUIREMENTS
A Robust, User-Friendly, and Cost-Effective
Cloud-Native Security Solution
•
-
Sisir Chowdhury and his dedicated team promptly embarked on a search to find the ideal solution that fulfilled
their requirements. Initially focusing on a cloud native security solution that easily integrates into the CI/CD
pipeline of their SMC, they broadened the scope of their search to encompass additional crucial criteria.
The specific solution requirements were as follows:
SOLUTION
Panoptica Steps in to Meet Every Single Spica Systems Requirement
Sisir Chowdhury and Subhas Bothra selected Panoptica following a rigorous evaluation of cloud native
application security vendors. “Panoptica scored highly on every aspect of the proof of concept,” emphasizes
Subhas. “By closely evaluating all the container security and vulnerability management capabilities offered in
the Panoptica solution, we came to the conclusion that it was the perfect security solution to SMC, our private
5G network application.”
Panoptica comprises a complete, end-to-end suite of cloud native application security technologies.
“Panoptica helped us reduce tool sprawl by not having to purchase multiple security solutions and deal with
multiple vendors. It is easy to set up and integrate with the toolsets our DevOps teams already use, and simple
to institute into our workflows. My DevOps teams also found Panoptica easy to try out with the unlimited free
signup.” Subhas further adds. “Another crucial factor is that Panoptica is offered by Cisco Systems, a highly
credible brand that we implicitly trust. Not surprisingly, our pre-and post-sale customer service experience
with the Panoptica team was exceptional.”
The team should deploy a cloud native security solution that seamlessly integrates into SMC’s
CI/CD pipeline to enable early detection and prevention of threats.
• The solution should also provide comprehensive visibility within Kubernetes clusters at
runtime to effectively address potential risks in the context of telecom network infrastructure.
• The solution must be a user-friendly, DevOps-oriented cloud native security solution that can
be easily adopted by lean IT security and DevOps teams.
• The solution must be platform-agnostic and adhere to the “single pane of glass” principle
allowing flexible monitoring of cloud workloads across multiple cloud environments.
• The solution should secure a cloud native private 5G network with robust security monitoring
capabilities that are cost-effective for Spica Systems and its valued customers.
Panoptica Customer Story | Panoptica.app
— Sisir Chowdhury, CEO at Spica Systems Inc.
Panoptica is a thoughtfully designed cloud native application
security solution, unlike others that look like multiple products
kludged together. It is lightweight, easy to integrate, and
comes with clear, affordable pricing. In terms of the cost of
alternate solutions from other vendors out there, Panoptica
slashed our cost roughly in half and provided more value with
features like API security and serverless security,
future-proofing our investment and offering us peace of mind.
Panoptica provides comprehensive security to the entire software development lifecycle (SDLC) of modern
applications—from build pipelines to workload runtimes. “The Panoptica solution is cleverly designed with a
policy-based approach to enforcing security in modern apps that run on a multi-cloud architecture,” says
Subhas. “We rely on it every day to identify and manage security vulnerabilities. Continuous insights from the
Panoptica dashboard have enabled our teams to block the vulnerabilities before they turn into full-blown
security threats. We have successfully secured multiple Kubernetes clusters running in Azure (AKS) and AWS
(EKS) public clouds with Panoptica.”
CONCLUSION
Spica Systems and Panoptica: A Trusted Partnership
Designing a state-of-the-art private 5G network application with a Cisco security solution like Panoptica
embedded into it has transformed Spica Systems into a one-stop supplier of highly secure telecom network
applications. Sisir Chowdhury concludes, “As we scale our cloud native application development in private
5G network technology, we trust Panoptica from Cisco to be beside us.”
To learn more about Spica Systems, click here.
Curious about Panoptica? Visit our Website contact us at sales@panoptica.app
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco
and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.
Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company.

More Related Content

Similar to Forging a Secure Path to Private 5G Networks for Enterprises

Web Application Security for Continuous Delivery Pipelines
Web Application Security for Continuous Delivery PipelinesWeb Application Security for Continuous Delivery Pipelines
Web Application Security for Continuous Delivery PipelinesAvi Networks
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming SecurityPCM
 
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Vince Garr
 
AWS TechConnect 2018 - Container Adoption
AWS TechConnect 2018 - Container AdoptionAWS TechConnect 2018 - Container Adoption
AWS TechConnect 2018 - Container AdoptionAlex Rhea
 
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnoxZero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnoxAccuKnox
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco Service Provider
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco Service Provider
 
Стратегия Cisco в ЦОД (доклад на английском языке)
Стратегия Cisco в ЦОД (доклад на английском языке)Стратегия Cisco в ЦОД (доклад на английском языке)
Стратегия Cisco в ЦОД (доклад на английском языке)Cisco Russia
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitybayusch
 
Zero trust strategy: cloud security by design
Zero trust strategy: cloud security by designZero trust strategy: cloud security by design
Zero trust strategy: cloud security by designaccenture
 
Governance for your Modern Application Platform - November 4, 2020
Governance for your Modern Application Platform - November 4, 2020Governance for your Modern Application Platform - November 4, 2020
Governance for your Modern Application Platform - November 4, 2020VMware Tanzu
 

Similar to Forging a Secure Path to Private 5G Networks for Enterprises (20)

idc-link-dna
idc-link-dnaidc-link-dna
idc-link-dna
 
Value Journal - September 2020
Value Journal - September 2020Value Journal - September 2020
Value Journal - September 2020
 
Web Application Security for Continuous Delivery Pipelines
Web Application Security for Continuous Delivery PipelinesWeb Application Security for Continuous Delivery Pipelines
Web Application Security for Continuous Delivery Pipelines
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security
 
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
 
AWS TechConnect 2018 - Container Adoption
AWS TechConnect 2018 - Container AdoptionAWS TechConnect 2018 - Container Adoption
AWS TechConnect 2018 - Container Adoption
 
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnoxZero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
 
BlueHat v18 || Scaling security scanning
BlueHat v18 || Scaling security scanningBlueHat v18 || Scaling security scanning
BlueHat v18 || Scaling security scanning
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
 
Стратегия Cisco в ЦОД (доклад на английском языке)
Стратегия Cisco в ЦОД (доклад на английском языке)Стратегия Cisco в ЦОД (доклад на английском языке)
Стратегия Cisco в ЦОД (доклад на английском языке)
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
 
Swisscom
Swisscom Swisscom
Swisscom
 
Mondi Group
Mondi GroupMondi Group
Mondi Group
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
 
Intercloud_Fabric
Intercloud_FabricIntercloud_Fabric
Intercloud_Fabric
 
Cisco DNA
Cisco DNACisco DNA
Cisco DNA
 
Zero trust strategy: cloud security by design
Zero trust strategy: cloud security by designZero trust strategy: cloud security by design
Zero trust strategy: cloud security by design
 
Governance for your Modern Application Platform - November 4, 2020
Governance for your Modern Application Platform - November 4, 2020Governance for your Modern Application Platform - November 4, 2020
Governance for your Modern Application Platform - November 4, 2020
 
Cloud Native development.pptx
Cloud Native development.pptxCloud Native development.pptx
Cloud Native development.pptx
 

Recently uploaded

chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 

Recently uploaded (20)

chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 

Forging a Secure Path to Private 5G Networks for Enterprises

  • 1. PANOPTICA CUSTOMER STORY Forging a Secure Path to Private 5G Networks for Enterprises Spica Systems, a software R&D organization that builds highly secure private 5G network software uses Panoptica as its cloud native application security solution to secure its end-to-end software suite at a lower cost.
  • 2. Panoptica Customer Story | Panoptica.app 2 CHALLENGE Building a Secure Path to Private 5G Networks for Enterprises As the CEO of Spica Systems, a San Jose, California, based software R&D organization that builds highly secure private 5G network software, Sisir Chowdhury was concerned. His DevOps team was hard at work building SMC (Spica Mobility Core), a lightweight cloud native 5G packet core engine for private 5G networks designed to operate seamlessly on Kubernetes clusters in any cloud environment. While the software development of the solution was progressing swiftly and precisely, the team needed a comprehensive yet cost-effective cloud native security solution to harden SMC’s security posture. SMC, crafted by Spica Systems, encompasses a comprehensive suite of cloud native network functions, including access and mobility functions (AMF), session management functions (SMF), user plane functions (UPF), policy control functions (PCF), authentication server functions (AUSF), application functions (AF), network repository functions (NRFs), and more. Spica Systems serves diverse customers across various market segments and key industry verticals. “Our customers span the spectrum from small startups to large enterprises in the oil and gas, manufacturing, utilities, and high-tech sectors—all in the midst of transitioning to private 5G networks,” says Sisir Chowdhury. “Ensuring their sensitive data is exchanged safely over our private 5G packet core application was a top concern and the highest priority.” Sisir further adds, “And yet, the widely available cloud native security solutions in the market proved impractical for us due to how much they cost, and the intricate processes associated with their adoption. Our customers prefer a private 5G network that can be continuously monitored for security vulnerabilities while remaining simple to adopt, effective, and cost-friendly in delivering enterprise-grade security.” The challenges did not stop there. From the perspective of Sisir’s DevOps teams, the big issue was a lack of visibility into security vulnerabilities in the development and testing phases of the CI/CD pipelines. By proactively scanning container images during these initial stages, the team aimed to prevent production issues for their customers and ensure a seamless user experience. Sisir explains, “Our diligent DevOps teams always strive to minimize blind spots in the network. Early detection and continuous patching of our software to avert any potential production issues for our valued customers is a huge priority for them. But not having visibility into the security vulnerabilities within our software posed a formidable roadblock to achieving this objective. The inability to view, monitor, and manage vulnerabilities was one of the main problems our DevOps teams were trying to solve on the backend.” And then there were resource constraints that compounded the obstacles faced by Spica Systems. Mr. Subhas Bothra, Director of IT and Security Operations at Spica Systems explains, “Our security operations rely on a small team of professionals. We urgently needed a trusted partner who could assist us in managing security and flagging vulnerabilities within our Kubernetes clusters, all while alleviating the strain on our human and capital resources.”
  • 3. 3 REQUIREMENTS A Robust, User-Friendly, and Cost-Effective Cloud-Native Security Solution • - Sisir Chowdhury and his dedicated team promptly embarked on a search to find the ideal solution that fulfilled their requirements. Initially focusing on a cloud native security solution that easily integrates into the CI/CD pipeline of their SMC, they broadened the scope of their search to encompass additional crucial criteria. The specific solution requirements were as follows: SOLUTION Panoptica Steps in to Meet Every Single Spica Systems Requirement Sisir Chowdhury and Subhas Bothra selected Panoptica following a rigorous evaluation of cloud native application security vendors. “Panoptica scored highly on every aspect of the proof of concept,” emphasizes Subhas. “By closely evaluating all the container security and vulnerability management capabilities offered in the Panoptica solution, we came to the conclusion that it was the perfect security solution to SMC, our private 5G network application.” Panoptica comprises a complete, end-to-end suite of cloud native application security technologies. “Panoptica helped us reduce tool sprawl by not having to purchase multiple security solutions and deal with multiple vendors. It is easy to set up and integrate with the toolsets our DevOps teams already use, and simple to institute into our workflows. My DevOps teams also found Panoptica easy to try out with the unlimited free signup.” Subhas further adds. “Another crucial factor is that Panoptica is offered by Cisco Systems, a highly credible brand that we implicitly trust. Not surprisingly, our pre-and post-sale customer service experience with the Panoptica team was exceptional.” The team should deploy a cloud native security solution that seamlessly integrates into SMC’s CI/CD pipeline to enable early detection and prevention of threats. • The solution should also provide comprehensive visibility within Kubernetes clusters at runtime to effectively address potential risks in the context of telecom network infrastructure. • The solution must be a user-friendly, DevOps-oriented cloud native security solution that can be easily adopted by lean IT security and DevOps teams. • The solution must be platform-agnostic and adhere to the “single pane of glass” principle allowing flexible monitoring of cloud workloads across multiple cloud environments. • The solution should secure a cloud native private 5G network with robust security monitoring capabilities that are cost-effective for Spica Systems and its valued customers. Panoptica Customer Story | Panoptica.app
  • 4. — Sisir Chowdhury, CEO at Spica Systems Inc. Panoptica is a thoughtfully designed cloud native application security solution, unlike others that look like multiple products kludged together. It is lightweight, easy to integrate, and comes with clear, affordable pricing. In terms of the cost of alternate solutions from other vendors out there, Panoptica slashed our cost roughly in half and provided more value with features like API security and serverless security, future-proofing our investment and offering us peace of mind. Panoptica provides comprehensive security to the entire software development lifecycle (SDLC) of modern applications—from build pipelines to workload runtimes. “The Panoptica solution is cleverly designed with a policy-based approach to enforcing security in modern apps that run on a multi-cloud architecture,” says Subhas. “We rely on it every day to identify and manage security vulnerabilities. Continuous insights from the Panoptica dashboard have enabled our teams to block the vulnerabilities before they turn into full-blown security threats. We have successfully secured multiple Kubernetes clusters running in Azure (AKS) and AWS (EKS) public clouds with Panoptica.” CONCLUSION Spica Systems and Panoptica: A Trusted Partnership Designing a state-of-the-art private 5G network application with a Cisco security solution like Panoptica embedded into it has transformed Spica Systems into a one-stop supplier of highly secure telecom network applications. Sisir Chowdhury concludes, “As we scale our cloud native application development in private 5G network technology, we trust Panoptica from Cisco to be beside us.” To learn more about Spica Systems, click here. Curious about Panoptica? Visit our Website contact us at sales@panoptica.app © 2023 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company.