Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • Networking

    Carrying the Load for Network Security

    Written by

    Matt Hines
    Published November 21, 2006
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Overwhelmed by an onslaught of external threats that aim to take down or infiltrate their networks, enterprises are increasingly turning to their telecommunications carriers, ISPs and managed services providers to help stop attacks before they arrive.

      Companies are demanding that their providers offer a range of security protections as part of their licensing agreements. Alongside those onboard network defenses, many telecom carriers, ISPs and MSPs are building out a range of additional security offerings to protect customers and create new opportunities to make money.

      When enterprises draw up their SLAs (service-level agreements) with carriers, most already require that their providers take on the task of blocking DoS (denial-of-service) attacks, malware and spam e-mail, said Mitch Ferro, senior director of product management for Broadwing Communications Internet and Managed Services group, based in Austin, Texas.

      The notion that such threats are expected to arrive via voice and data communications networks is rapidly becoming a thing of the past, he said.

      “Were seeing that customers are looking to us for specific types of security services that naturally gravitate towards carriers, and the trend toward customers demanding denial-of-service, spam and virus protection as part of their SLA has really taken off over the last year and a half,” Ferro said. “Were trying to provide a cleaner pipe to the customer than what has been acceptable in the past. Its a question of where you stop the bad guys: at the door to your house, or before they ever get to your neighborhood.”

      /zimages/6/28571.gifFor advice on how to secure your network and applications, as well as the latest security news, visit Ziff Davis Internets Security IT Hub.

      Ferro said that well over 50 percent of Broadwings ISP customers already include some reference to security requirements in their SLAs, with the number growing rapidly. Along with those guaranteed network defenses, the company also offers an additional DoS protection service for a price, as well as similar spam and e-mail security programs, and a “Clean T1” service which includes all three types of protection.

      Looking forward, Broadwing is planning to create services for managed firewall outsourcing and network intrusion detection, and may also launch a PWAN (Private WAN) offering. Not only does providing such services help keep existing customers from swapping providers, there are also significant opportunities for the carrier to create new revenue streams based on the demand for security expertise, he said.

      “The good news for us is that at same time customers are asking us to do more with security, theyre also willing to pay a premium for these services,” Ferro said. “At the end of the day it is still cheaper for them than to use us than [to do] the work in-house, and we can deploy architecture across multiple customers to see whats going on in the networks further upstream and detect any problems much sooner than customers ever could.”

      As a result of the trend toward carrier-provided security, a range of technology providers are betting that they can expand their own businesses by creating the tools the companies use to protect their customers. One such firm, Arbor Networks, in Lexington, Mass., is providing some of the underlying technology used by Broadwing to help support its own security services.

      /zimages/6/28571.gifIBM adds anti-virus capabilities to its ISS endpoint security tools. Click here to read more.

      Broadwing is specifically using the Arbor Peakflow SP network monitoring and traffic measurement appliance, which promises to detect and mitigate anomalies to root out attacks. Because of the magnitude of todays distributed DoS threats, carriers need such tools to protect both their own infrastructure and those of their customers, and identify threats as early as possible to prevent them from gaining momentum, said Danny McPherson, chief research officer at Arbor.

      “On one side, providing bandwidth is becoming a commodity, so these carriers are looking for new ways to lock in revenue, hold onto customers and create new opportunities,” MacPherson said. “As these companies add new services for convergence, including video and voice over Internet Protocol, theyre going to need to have proactive security in place, as customers will expect the same level of performance from those applications that theyve come to expect from traditional carrier services.”

      Another technology provider trying to cash in on the shift toward carrier security is software maker Narus, which offers to bolster infrastructure protection using deep packet inspection and correlation to scan every link and element on a network.

      “These carriers already have a lot of the information that is needed to root out attacks before they ever reach the customer,” said Steve Bannerman, vice president of marketing for Narus, based in Mountain View, Calif. “We can provide them with the additional layer of intelligence they need to help identify anomalies upstream and keep end users protected.”

      In another example of the continued push by carriers to extend their security expertise, some large firms have begun buying out technology specialists that can provide them with the tools necessary to compete. On Oct. 25, London-based telecommunications industry giant BT Group announced that it had purchased network security outsourcing specialist Counterpane for an undisclosed sum, rumored to be in the $40 million range.

      Counterpane, also based in Mountain View, gives BT another angle on carrier security, as the firm offers services for monitoring networked enterprise applications, including Microsoft and Oracle databases, SAP business applications and IBM mainframes. Doug Howard, chief operating officer at Counterpane, formerly managed security issues at telecom giant AT&T.

      “The problem is, although carriers have fair amount of capability to see suspicious network activity, they need to add additional technology to be able to provide enterprise-class security services, and those wont be available cheaply, so the market is already feeling pressure to acquire the necessary pieces,” Howard said. “Many carriers may already have experience with distributed DoS, but their response time is typically hours, and for large customers processing millions of transactions online, thats not acceptable, so there will be more activity.”

      At least one industry watcher agreed that there will likely be more deals over the coming months as carriers aggressively push to expand their security footprints. For the carriers its all about finding new ways to retain customers and build services revenue, but customers will likely appreciate noticeable network security improvements as the trend takes root across the telecom industry, said Maribel Lopez, an analyst with Forrester Research.

      “It really works out well for everyone, as customers dont want to pay for bad traffic, and the service providers look better by helping to prevent nasty malware from entering the enterprise,” Lopez said. “Even if the enterprises dont buy the add-ons, it makes them feel better about their carrier; we will see more acquisitions as the threats continue to change and carriers need new technologies that can help the continually monitor and update their systems.”

      Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at Ryan Naraines eWEEK Security Watch blog.

      Matt Hines
      Matt Hines

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.