SlideShare a Scribd company logo
1 of 8
Download to read offline
SOFTWARE DEFINED NETWORKING
IN THE TELCO INDUSTRY
White paper
V1.0 - 11/10/2016
How could it improve cyber security?
What changes would it mean for network and telco employment?
Every year, maintaining the security of a network grows more and more
difficult. As networks become more complex (with more users, increased
traffic, a greater number of devices), threats to organisations are
becoming much more frequent, more targeted, and more sophisticated.
The telecoms industry is one which has been particularly fraught with an increasing volume of cyber
risks. According to research from the Ponemon Institute, in 2015 alone the industry lost around £6.3
million in cyber crime. What’s more, two of the UK’s largest telecommunications firms experienced
cyber attacks within a few weeks of one another.
In March 2016, a study from the Centre for Economic and Business Research (CEBR) was reported in the
Telegraph which surrounded the security of the telecoms industry. As part of the study, the economists
at the CEBR modelled how a real cyber-attack would affect a cross section of the British economy.
CYBER SECURITY IN TELCO
79%
..of security professionals working at enterprise
organisations claim that network security is more
difficult now than it was two years ago
In parallel with the growing threat of cyber security, Software Defined Networking (SDN) technology is
fast being adopted by telecoms carriers and service providers. This technology is key to scaling up the
network capacity and it's capability to fuel internet demands from the likes of:
cloud services
mobile-enabled services
live streaming
the internet of things.
The results of their research showed that the telecoms sector is highly vulnerable to attacks and breaches
due to the sensitive information held and the value of this data.
CYBER SECURITY IN TELCO
£52.5m
British companies hold approximately..
worth of sensitive information, including financial
details and intellectual property.
The Emergence of SDN
In addition to scale, SDN is being implemented for it’s potential to reduce capital expenditure and operational
expenditure for Tier 1 telecoms providers. What’s more, it increases flexibility and efficiency due to its ability
to ramp up or ramp down network services on demand.
CYBER SECURITY IN TELCO
When designing and implementing SDN services and solutions, telecom carriers now have a great cyber
security opportunity to centralise, automate and improve attack detection and mitigation.
By separating the control and data planes, SDN is not restricted by physical devices to control and
manage network traffic flows. As such, with no physical barriers, SDN controllers can monitor traffic,
detect threats, and mitigate attacks anywhere in the network with the use of a centralised
software-based network security solution.
Improving Cyber Security using SDN
SDN enables network management to be decoupled from the data flow and,
by centralising the control segments of the network, network traffic can be
monitored and directed from a central point using software. Furthermore,
standardised API’s in newer SDN controllers enable the network to respond
to user and application demands in a faster and more efficient way.
“The key [to SDN enabled cyber security] is to implement a network security
solution that can take advantage of SDN’s dynamic nature.”
- LOUIS SCIALABBA IN SDN, SERVICE PROVIDER
The network defence solution can take advantage of the programmability of SDN to improve cyber security
for the entire network with enhanced network agility.
An SDN network can also automatically respond to changes in network behaviour. SDN can make it easier to
collect network usage information, which could support improved algorithm design used to detect intrusions,
threats and attacks. A new generation of applications can harness better-informed SDN agents to improve
traffic anomaly detection and mitigation in networks, which may allow them to stop malicious intruders
before they enter the critical areas of the network.
According to Jennia Hizver, Consulting Practice Security Researcher and Consultant at AT&T, in her
article entitled “The security benefits of Software Defined Networking”, “the biggest benefit of
SDN-enabled security is that it presents an opportunity for intelligent response on a granular basis by
selectively blocking malicious traffic while still allowing normal traffic flows”.
Dave Shackleford of Voodoo Security states in his article “How SDN will enable automated network
security” that SDN promises centralised control and traffic management, which can result in automated
network security and security-defined network routing that could transform the way we secure the
network and the applications or data running across it. For example, SDN security applications are
capable of acting on any anomalies by diverting specific network flows to special security enforcement
points or security services (e.g. firewalls and intrusion detection/prevention systems), thus enabling
untoward events and threats to be monitored in highly dynamic IT environments, with the potential
for achieving greater network security visibility.
Moreover, with SDN, it is possible to define a virtual network architecture that closely maps the logical
architecture of an application, thus modelling all application items on a single private virtual network.
As such, the rules for appropriate and inappropriate communication among the parts in the system,
and the rules for the private network communication with the rest of the broader network systems
can be outlined clearly – which wasn’t possible with previous traditional network architectures
(Peter Christy, Research Director at 451 Research).
On the other side of the coin, there are also potential SDN-related security concerns which have been
discussed in the public domain. As with any new technologies introduced, further security measures -
policies, better authentication, authorisation and access procedures, etc. – needs to be implemented
to safeguard systems and data security in an SDN network deployment.
CYBER SECURITY IN TELCO
What the Experts are Saying
With all these exciting new potentials, how does SDN-enabled security transform future network and
telco roles?
According to Kelly Jackson Higgins, Executive Editor of DarkReading.com, traditional network security
roles will eventually operate using software-defined networking (SDN) and virtualisation skill sets. “It’s
a logical evolution: as the network and its services become more software-driven and virtualised, it
only makes sense that security would join the party” and “a new software-defined security model
also will require a cultural shift”.
Rather than security professionals updating each firewall separately, firewall rules could be pushed to
all devices via SDN “in a matter of seconds,” (Warren Wu, Senior Director of Products at Fortinet). Network
engineers will need to upskill and learn how to work with SDN controllers, and how to manage the
interaction with applications and orchestration systems that connect via APIs, as well as the security
control aspects that comes with it.
CYBER SECURITY IN TELCO
How does SDN-enabled security transform future network and telco roles?
Will roles such as “SDN/NFV Network Security Architects”, “SDN Protective
Monitoring Analysts” and/or “SDN Security Developer” roles start
dominating our IT Recruitment market?
At aap3, we believe that there will be a changing trend in the marketplace, away from Network and
Security engineers, with the traditional skills based on network hardware configuration. What's more,
there will be a requirement for a blend of skills that includes an understanding of coding and
development languages for software configuration. That’s not to say that these “traditional” skills will
become redundant, as they still form the core of networking and network security, but that a change
in skill set, or perhaps an entirely new job type, will be needed to cope with future technology demands.
For businesses, this might mean that they have to invest in external training for their existing staff, whilst
re-evaluating their skills requirements for new positions. A decision will have to be made between
upskilling existing employees, replacing with new skill sets, or potentially increasing the employee base
temporarily to bring these new skills into the business.
Alternatively, businesses can leverage external suppliers to provide technical resources to help them
bridge the gap between current and future technologies, providing professional contractors or managed
services resources to deliver upgrades and manage and maintain network infrastructure without the
need for potentially expensive in-house expertise.
SO WE’RE ASKING
CONTACT US TODAY: RECRUITMENT@AAP3.COM
www.aap3recruitment.com

More Related Content

What's hot

Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...IRJET Journal
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022Temok IT Services
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Security
 
Cyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 cCyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 cAanchal579958
 
The Digital Telecom. Security Services
The Digital Telecom. Security ServicesThe Digital Telecom. Security Services
The Digital Telecom. Security ServicesParviz Iskhakov, PhD
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Data Sheet_What Darktrace Finds
Data Sheet_What Darktrace FindsData Sheet_What Darktrace Finds
Data Sheet_What Darktrace FindsMelissa Lim
 
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISIJNSA Journal
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...IRJET Journal
 
5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problemPositiveTechnologies
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber lawDivyank Jindal
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING IJNSA Journal
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningeSAT Journals
 
SS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyondSS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyondPositiveTechnologies
 
MPROVING THE PRIVACY-PRESERVING OF COVID-19 BLUETOOTH-BASED CONTACT TRACI...
MPROVING THE PRIVACY-PRESERVING   OF COVID-19 BLUETOOTH-BASED   CONTACT TRACI...MPROVING THE PRIVACY-PRESERVING   OF COVID-19 BLUETOOTH-BASED   CONTACT TRACI...
MPROVING THE PRIVACY-PRESERVING OF COVID-19 BLUETOOTH-BASED CONTACT TRACI...AIRCC Publishing Corporation
 
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...IJCNCJournal
 
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...natjordan6
 
Sondaggio smart meter
Sondaggio smart meterSondaggio smart meter
Sondaggio smart metercanaleenergia
 
Telecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTTelecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTPositiveTechnologies
 

What's hot (20)

Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Cyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 cCyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 c
 
The Digital Telecom. Security Services
The Digital Telecom. Security ServicesThe Digital Telecom. Security Services
The Digital Telecom. Security Services
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Data Sheet_What Darktrace Finds
Data Sheet_What Darktrace FindsData Sheet_What Darktrace Finds
Data Sheet_What Darktrace Finds
 
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
 
5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
SS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyondSS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyond
 
MPROVING THE PRIVACY-PRESERVING OF COVID-19 BLUETOOTH-BASED CONTACT TRACI...
MPROVING THE PRIVACY-PRESERVING   OF COVID-19 BLUETOOTH-BASED   CONTACT TRACI...MPROVING THE PRIVACY-PRESERVING   OF COVID-19 BLUETOOTH-BASED   CONTACT TRACI...
MPROVING THE PRIVACY-PRESERVING OF COVID-19 BLUETOOTH-BASED CONTACT TRACI...
 
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
 
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
 
Sondaggio smart meter
Sondaggio smart meterSondaggio smart meter
Sondaggio smart meter
 
Telecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTTelecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoT
 

Viewers also liked

IT Security in the Legal Sector - recruiting in a skills gap environment
IT Security in the Legal Sector - recruiting in a skills gap environment IT Security in the Legal Sector - recruiting in a skills gap environment
IT Security in the Legal Sector - recruiting in a skills gap environment aap3 IT Recruitment
 
Whitepaper - Recruiting Talent for the fintech Sector
Whitepaper - Recruiting Talent for the fintech SectorWhitepaper - Recruiting Talent for the fintech Sector
Whitepaper - Recruiting Talent for the fintech Sectoraap3 IT Recruitment
 
aap3 Recruitment corporate overview
aap3 Recruitment corporate overviewaap3 Recruitment corporate overview
aap3 Recruitment corporate overviewaap3 IT Recruitment
 
aap3 fintech recruitment capability
aap3 fintech recruitment capabilityaap3 fintech recruitment capability
aap3 fintech recruitment capabilityaap3 IT Recruitment
 
aap3 cybersecurity recruitment capabilities
aap3 cybersecurity recruitment capabilitiesaap3 cybersecurity recruitment capabilities
aap3 cybersecurity recruitment capabilitiesaap3 IT Recruitment
 
Whitepaper - Attracting Developers to the Defence sector
Whitepaper - Attracting Developers to the Defence sectorWhitepaper - Attracting Developers to the Defence sector
Whitepaper - Attracting Developers to the Defence sectoraap3 IT Recruitment
 
INTERNET EXPLORER 8 É LANÇADO E JÁ SE MOSTRA BASTANTE VULNERÁVEL
INTERNET EXPLORER 8 É LANÇADO E JÁ SE MOSTRA BASTANTE VULNERÁVELINTERNET EXPLORER 8 É LANÇADO E JÁ SE MOSTRA BASTANTE VULNERÁVEL
INTERNET EXPLORER 8 É LANÇADO E JÁ SE MOSTRA BASTANTE VULNERÁVELCristiane Tavares
 
Tecnologias de Ensino á Distância
Tecnologias de Ensino á DistânciaTecnologias de Ensino á Distância
Tecnologias de Ensino á DistânciaDrica Costa
 
Atividade eja
Atividade   ejaAtividade   eja
Atividade ejamalacizi
 
Aula 4 Mocidade Espírita Chico Xavier - Introdução ao trabalho dos alunos
Aula 4 Mocidade Espírita Chico Xavier - Introdução ao trabalho dos alunosAula 4 Mocidade Espírita Chico Xavier - Introdução ao trabalho dos alunos
Aula 4 Mocidade Espírita Chico Xavier - Introdução ao trabalho dos alunosSergio Lima Dias Junior
 
Características gerais do seres vivos
Características gerais do seres vivosCaracterísticas gerais do seres vivos
Características gerais do seres vivosLúcio Bravin
 
3 orientações para adesão ao programa ensino integral
3  orientações para adesão ao programa ensino integral3  orientações para adesão ao programa ensino integral
3 orientações para adesão ao programa ensino integralnigo1791
 
Ata 1.reuniao fetsuas sc 09-08-12
Ata 1.reuniao fetsuas sc 09-08-12Ata 1.reuniao fetsuas sc 09-08-12
Ata 1.reuniao fetsuas sc 09-08-12ElisRH
 
Bimav nº 91 janeiro 2013
Bimav nº 91   janeiro 2013Bimav nº 91   janeiro 2013
Bimav nº 91 janeiro 2013ADAVSAD
 
Fontes de energia
Fontes de energiaFontes de energia
Fontes de energiaArtur Lara
 
Estatuto APTA
Estatuto APTAEstatuto APTA
Estatuto APTAaptadf
 
Apresentação abbtur
Apresentação abbturApresentação abbtur
Apresentação abbturabbtursc
 

Viewers also liked (20)

IT Security in the Legal Sector - recruiting in a skills gap environment
IT Security in the Legal Sector - recruiting in a skills gap environment IT Security in the Legal Sector - recruiting in a skills gap environment
IT Security in the Legal Sector - recruiting in a skills gap environment
 
Whitepaper - Recruiting Talent for the fintech Sector
Whitepaper - Recruiting Talent for the fintech SectorWhitepaper - Recruiting Talent for the fintech Sector
Whitepaper - Recruiting Talent for the fintech Sector
 
aap3 Recruitment corporate overview
aap3 Recruitment corporate overviewaap3 Recruitment corporate overview
aap3 Recruitment corporate overview
 
aap3 fintech recruitment capability
aap3 fintech recruitment capabilityaap3 fintech recruitment capability
aap3 fintech recruitment capability
 
aap3 cybersecurity recruitment capabilities
aap3 cybersecurity recruitment capabilitiesaap3 cybersecurity recruitment capabilities
aap3 cybersecurity recruitment capabilities
 
Whitepaper - Attracting Developers to the Defence sector
Whitepaper - Attracting Developers to the Defence sectorWhitepaper - Attracting Developers to the Defence sector
Whitepaper - Attracting Developers to the Defence sector
 
INTERNET EXPLORER 8 É LANÇADO E JÁ SE MOSTRA BASTANTE VULNERÁVEL
INTERNET EXPLORER 8 É LANÇADO E JÁ SE MOSTRA BASTANTE VULNERÁVELINTERNET EXPLORER 8 É LANÇADO E JÁ SE MOSTRA BASTANTE VULNERÁVEL
INTERNET EXPLORER 8 É LANÇADO E JÁ SE MOSTRA BASTANTE VULNERÁVEL
 
Tecnologias de Ensino á Distância
Tecnologias de Ensino á DistânciaTecnologias de Ensino á Distância
Tecnologias de Ensino á Distância
 
Atividade eja
Atividade   ejaAtividade   eja
Atividade eja
 
Aula 4 Mocidade Espírita Chico Xavier - Introdução ao trabalho dos alunos
Aula 4 Mocidade Espírita Chico Xavier - Introdução ao trabalho dos alunosAula 4 Mocidade Espírita Chico Xavier - Introdução ao trabalho dos alunos
Aula 4 Mocidade Espírita Chico Xavier - Introdução ao trabalho dos alunos
 
Profissões do futuro
Profissões do futuroProfissões do futuro
Profissões do futuro
 
Características gerais do seres vivos
Características gerais do seres vivosCaracterísticas gerais do seres vivos
Características gerais do seres vivos
 
3 orientações para adesão ao programa ensino integral
3  orientações para adesão ao programa ensino integral3  orientações para adesão ao programa ensino integral
3 orientações para adesão ao programa ensino integral
 
Ata 1.reuniao fetsuas sc 09-08-12
Ata 1.reuniao fetsuas sc 09-08-12Ata 1.reuniao fetsuas sc 09-08-12
Ata 1.reuniao fetsuas sc 09-08-12
 
Bimav nº 91 janeiro 2013
Bimav nº 91   janeiro 2013Bimav nº 91   janeiro 2013
Bimav nº 91 janeiro 2013
 
SISTEMA DIGESTÓRIO
SISTEMA DIGESTÓRIOSISTEMA DIGESTÓRIO
SISTEMA DIGESTÓRIO
 
Fontes de energia
Fontes de energiaFontes de energia
Fontes de energia
 
Estatuto APTA
Estatuto APTAEstatuto APTA
Estatuto APTA
 
Apresentação abbtur
Apresentação abbturApresentação abbtur
Apresentação abbtur
 
Tudo comunica
Tudo comunicaTudo comunica
Tudo comunica
 

Similar to Whitepaper - Software Defined Networking for the Telco Industry

Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
 
President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...Clifton M. Hasegawa & Associates, LLC
 
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...IJECEIAES
 
Software Defined Networks Explained
Software Defined Networks ExplainedSoftware Defined Networks Explained
Software Defined Networks ExplainedCM Research
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies Shamima Akther
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLIRJET Journal
 
A review on software defined network security risks and challenges
A review on software defined network security risks and challengesA review on software defined network security risks and challenges
A review on software defined network security risks and challengesTELKOMNIKA JOURNAL
 
Unleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfUnleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfSecurityGen1
 
Strengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenStrengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenSecurityGen1
 
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceTelecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceSecurityGen1
 
SDN architecture for Scalable Resource Management for Big Data Governance in ...
SDN architecture for Scalable Resource Management for Big Data Governance in ...SDN architecture for Scalable Resource Management for Big Data Governance in ...
SDN architecture for Scalable Resource Management for Big Data Governance in ...IRJET Journal
 
Network Security Roadmap have some perception of provided security
Network Security Roadmap have some perception of provided securityNetwork Security Roadmap have some perception of provided security
Network Security Roadmap have some perception of provided securityslametarrokhim1
 
corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdfLolaHel
 
security_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepapersecurity_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepaperAlan Rudd
 
SDN FOR THE FINANCIAL INDUSTRY
SDN FOR THE FINANCIAL INDUSTRYSDN FOR THE FINANCIAL INDUSTRY
SDN FOR THE FINANCIAL INDUSTRYMallory Zemelis
 
Elevating Network Security through NGFW Firewalls.pdf
Elevating Network Security through NGFW Firewalls.pdfElevating Network Security through NGFW Firewalls.pdf
Elevating Network Security through NGFW Firewalls.pdfSecurityGen1
 
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall InnovationChrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall InnovationSecurityGen1
 
NGFW - An Updated Overview
NGFW - An Updated Overview NGFW - An Updated Overview
NGFW - An Updated Overview Security Gen
 

Similar to Whitepaper - Software Defined Networking for the Telco Industry (20)

Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
 
President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...
 
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...
 
Software Defined Networks Explained
Software Defined Networks ExplainedSoftware Defined Networks Explained
Software Defined Networks Explained
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
 
1570272924-3
1570272924-31570272924-3
1570272924-3
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
 
A review on software defined network security risks and challenges
A review on software defined network security risks and challengesA review on software defined network security risks and challenges
A review on software defined network security risks and challenges
 
Unleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfUnleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdf
 
Strengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenStrengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGen
 
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceTelecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
 
SDN architecture for Scalable Resource Management for Big Data Governance in ...
SDN architecture for Scalable Resource Management for Big Data Governance in ...SDN architecture for Scalable Resource Management for Big Data Governance in ...
SDN architecture for Scalable Resource Management for Big Data Governance in ...
 
SDN in Banking
SDN in BankingSDN in Banking
SDN in Banking
 
Network Security Roadmap have some perception of provided security
Network Security Roadmap have some perception of provided securityNetwork Security Roadmap have some perception of provided security
Network Security Roadmap have some perception of provided security
 
corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdf
 
security_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepapersecurity_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepaper
 
SDN FOR THE FINANCIAL INDUSTRY
SDN FOR THE FINANCIAL INDUSTRYSDN FOR THE FINANCIAL INDUSTRY
SDN FOR THE FINANCIAL INDUSTRY
 
Elevating Network Security through NGFW Firewalls.pdf
Elevating Network Security through NGFW Firewalls.pdfElevating Network Security through NGFW Firewalls.pdf
Elevating Network Security through NGFW Firewalls.pdf
 
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall InnovationChrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
 
NGFW - An Updated Overview
NGFW - An Updated Overview NGFW - An Updated Overview
NGFW - An Updated Overview
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Whitepaper - Software Defined Networking for the Telco Industry

  • 1. SOFTWARE DEFINED NETWORKING IN THE TELCO INDUSTRY White paper V1.0 - 11/10/2016 How could it improve cyber security? What changes would it mean for network and telco employment?
  • 2. Every year, maintaining the security of a network grows more and more difficult. As networks become more complex (with more users, increased traffic, a greater number of devices), threats to organisations are becoming much more frequent, more targeted, and more sophisticated. The telecoms industry is one which has been particularly fraught with an increasing volume of cyber risks. According to research from the Ponemon Institute, in 2015 alone the industry lost around £6.3 million in cyber crime. What’s more, two of the UK’s largest telecommunications firms experienced cyber attacks within a few weeks of one another. In March 2016, a study from the Centre for Economic and Business Research (CEBR) was reported in the Telegraph which surrounded the security of the telecoms industry. As part of the study, the economists at the CEBR modelled how a real cyber-attack would affect a cross section of the British economy. CYBER SECURITY IN TELCO 79% ..of security professionals working at enterprise organisations claim that network security is more difficult now than it was two years ago
  • 3. In parallel with the growing threat of cyber security, Software Defined Networking (SDN) technology is fast being adopted by telecoms carriers and service providers. This technology is key to scaling up the network capacity and it's capability to fuel internet demands from the likes of: cloud services mobile-enabled services live streaming the internet of things. The results of their research showed that the telecoms sector is highly vulnerable to attacks and breaches due to the sensitive information held and the value of this data. CYBER SECURITY IN TELCO £52.5m British companies hold approximately.. worth of sensitive information, including financial details and intellectual property. The Emergence of SDN
  • 4. In addition to scale, SDN is being implemented for it’s potential to reduce capital expenditure and operational expenditure for Tier 1 telecoms providers. What’s more, it increases flexibility and efficiency due to its ability to ramp up or ramp down network services on demand. CYBER SECURITY IN TELCO When designing and implementing SDN services and solutions, telecom carriers now have a great cyber security opportunity to centralise, automate and improve attack detection and mitigation. By separating the control and data planes, SDN is not restricted by physical devices to control and manage network traffic flows. As such, with no physical barriers, SDN controllers can monitor traffic, detect threats, and mitigate attacks anywhere in the network with the use of a centralised software-based network security solution. Improving Cyber Security using SDN SDN enables network management to be decoupled from the data flow and, by centralising the control segments of the network, network traffic can be monitored and directed from a central point using software. Furthermore, standardised API’s in newer SDN controllers enable the network to respond to user and application demands in a faster and more efficient way. “The key [to SDN enabled cyber security] is to implement a network security solution that can take advantage of SDN’s dynamic nature.” - LOUIS SCIALABBA IN SDN, SERVICE PROVIDER
  • 5. The network defence solution can take advantage of the programmability of SDN to improve cyber security for the entire network with enhanced network agility. An SDN network can also automatically respond to changes in network behaviour. SDN can make it easier to collect network usage information, which could support improved algorithm design used to detect intrusions, threats and attacks. A new generation of applications can harness better-informed SDN agents to improve traffic anomaly detection and mitigation in networks, which may allow them to stop malicious intruders before they enter the critical areas of the network. According to Jennia Hizver, Consulting Practice Security Researcher and Consultant at AT&T, in her article entitled “The security benefits of Software Defined Networking”, “the biggest benefit of SDN-enabled security is that it presents an opportunity for intelligent response on a granular basis by selectively blocking malicious traffic while still allowing normal traffic flows”. Dave Shackleford of Voodoo Security states in his article “How SDN will enable automated network security” that SDN promises centralised control and traffic management, which can result in automated network security and security-defined network routing that could transform the way we secure the network and the applications or data running across it. For example, SDN security applications are capable of acting on any anomalies by diverting specific network flows to special security enforcement points or security services (e.g. firewalls and intrusion detection/prevention systems), thus enabling untoward events and threats to be monitored in highly dynamic IT environments, with the potential for achieving greater network security visibility. Moreover, with SDN, it is possible to define a virtual network architecture that closely maps the logical architecture of an application, thus modelling all application items on a single private virtual network. As such, the rules for appropriate and inappropriate communication among the parts in the system, and the rules for the private network communication with the rest of the broader network systems can be outlined clearly – which wasn’t possible with previous traditional network architectures (Peter Christy, Research Director at 451 Research). On the other side of the coin, there are also potential SDN-related security concerns which have been discussed in the public domain. As with any new technologies introduced, further security measures - policies, better authentication, authorisation and access procedures, etc. – needs to be implemented to safeguard systems and data security in an SDN network deployment. CYBER SECURITY IN TELCO What the Experts are Saying
  • 6. With all these exciting new potentials, how does SDN-enabled security transform future network and telco roles? According to Kelly Jackson Higgins, Executive Editor of DarkReading.com, traditional network security roles will eventually operate using software-defined networking (SDN) and virtualisation skill sets. “It’s a logical evolution: as the network and its services become more software-driven and virtualised, it only makes sense that security would join the party” and “a new software-defined security model also will require a cultural shift”. Rather than security professionals updating each firewall separately, firewall rules could be pushed to all devices via SDN “in a matter of seconds,” (Warren Wu, Senior Director of Products at Fortinet). Network engineers will need to upskill and learn how to work with SDN controllers, and how to manage the interaction with applications and orchestration systems that connect via APIs, as well as the security control aspects that comes with it. CYBER SECURITY IN TELCO How does SDN-enabled security transform future network and telco roles?
  • 7. Will roles such as “SDN/NFV Network Security Architects”, “SDN Protective Monitoring Analysts” and/or “SDN Security Developer” roles start dominating our IT Recruitment market? At aap3, we believe that there will be a changing trend in the marketplace, away from Network and Security engineers, with the traditional skills based on network hardware configuration. What's more, there will be a requirement for a blend of skills that includes an understanding of coding and development languages for software configuration. That’s not to say that these “traditional” skills will become redundant, as they still form the core of networking and network security, but that a change in skill set, or perhaps an entirely new job type, will be needed to cope with future technology demands. For businesses, this might mean that they have to invest in external training for their existing staff, whilst re-evaluating their skills requirements for new positions. A decision will have to be made between upskilling existing employees, replacing with new skill sets, or potentially increasing the employee base temporarily to bring these new skills into the business. Alternatively, businesses can leverage external suppliers to provide technical resources to help them bridge the gap between current and future technologies, providing professional contractors or managed services resources to deliver upgrades and manage and maintain network infrastructure without the need for potentially expensive in-house expertise. SO WE’RE ASKING CONTACT US TODAY: RECRUITMENT@AAP3.COM