Page 4 - Telecom Reseller December 2019-January 2020
P. 4

4 Telecom Reseller SANJAY BHATIA
In a contextually and pervasively connected world, new innovations will
be supported on 5G networks that simply wouldn’t have been possible without the capabilities 5G architecture delivers. The collection and analysis of real time data from the edge and core of the distributed cloud networks will drive new value, which is driving the world’s largest network operators to accelerate rolling out services. With network slicing, it will be possible for a business to manage their own private 5G network – set up based on their business criteria – and assigning only the resources necessary for each application.
With speeds as much as much as 100 times faster than 4G networks, content sharing and the use of high definition
video will change the applications game. For example, on a 5G network, a full HD movie will download in under 10 seconds, compared to around 10 minutes. Massive machine-type communications will be undertaken with a dramatic increase in innovations around the Internet of Things (IoT), Smart Homes, Smart Cities, E-Health and more. With dramatically lower latency, 5G phones and other machine-type devices will benefit from a lag of 1 millisecond
or less compared to 50 times or more on 4G networks.
However, with all of these benefits also come increased threat surfaces – and
with these expanded threat and surfaces, operators and enterprises become attractive and potentially lucrative targets of distributed denial of service (DDoS), man-in-the-middle and authentication attacks, among others.
Given the enormous amount of data being collected and analyzed, detecting threats is going to become a new art and science. New rules and software solutions will be required to filter out malicious network traffic, given the variety of policies that can be applied
to highly customized traffic. Operational technology and information technology teams will simply have more devices, more applications, more data, more voice and video sessions, and more transactions to secure.
While 5G’s data and security architectures are different and evolving, the main challenge when it comes to securing the network, apps and data is the profound shift from hardware-defined to software-defined distributed cloud networks all the way to the edge – which changes the skills needed, internally and among managed service providers. This includes putting in place solutions – for example, privileged access management tools – that prevent problems with advanced incident response, should attacks occur.
Here are five recommendations for service providers and enterprises to address and manage the 5G security threat:
continued from page 1
“Given the enormous
amount of data being collected and analyzed, detecting threats is going to become a new art and science.
rolling out or receiving 5G services,
to ensure the security risks do not negate the huge benefits of 5G networking. By understanding the evolving security landscape the new network brings, service providers and enterprises alike can take the steps necessary to manage increased threat surfaces and reap the benefits
of 5G technology. n
December/January 2020
Vonage and Neustar Partner to Implement Call Authentication
     Solution
robocalls and scams. By incorporating
the Neustar Certified Caller solution for automated caller identity validation, Vonage will now be able to detect and flag spoofed calls in real-time to protect subscribers from phone scams and support trusted customer communications.
“We are a strong proponent of efforts
to combat illegal robocalls and caller ID spoofing and applaud the FCC’s leadership in this area through SHAKEN/STIR guidelines,” said Sanjay Macwan, SVP Enterprise Engineering & Networks and Chief Information Security Officer for
To read this article further please visit
https://wp.me/p2Q636-yhC
 HOLMDEL, NJ - Vonage (NYSE: VG), a global business cloud communications leader, has announced that it has partnered with Neustar, a global information services company and leader in identity resolution, to deploy a certified caller solution within the Vonage network. This is the latest of many steps Vonage has taken to address global concerns regarding the proliferation of illegal spoofing and robocalls.
Vonage shares its customers’ concerns about illegal robocalls, and is committed to providing innovative solutions to protect them from occurring. Vonage has long provided a Spam Shield solution that checks incoming calls against a dynamic database of numbers associated with telemarketing,
   1) Understand the expanding attack surface and future-proof infrastructure, devices and apps
2) Focus on implementing strong security capabilities in current network infrastructure
3) Create a roadmap and research extended threats in 5G use cases
4) Partner with the innovators on proof of concepts and trials
5) Leverage analytics and machine learning security tools
As we prepare for 5G, it is essential to study the new security stack in advance of
































































   2   3   4   5   6