Contributors   |   Messages   |   Polls   |   Resources   |  
Comments
Newest First | Oldest First | Threaded View
batye
batye
11/12/2017 7:26:21 PM
User Rank
Platinum
Re: Securing the Cloud
@mhhf1ve  security is never ending problems, I'm sure in the new year we gonna hear it more and more about security breaches and e.t. as even will all security changes and improvments - hackers do get smarter/educated... 

50%
50%
batye
batye
11/12/2017 7:23:14 PM
User Rank
Platinum
Re: Cord & Security
@Ariella the way I see it at end user will be able deside on what they want and how get it - right/proper way at the end... 

50%
50%
mhhf1ve
mhhf1ve
11/8/2017 6:46:41 PM
User Rank
Platinum
Re: Securing the Cloud
Security is always a moving target as things change and get patched and automated and virtualized, etc. I would hope things always improve and get more secure -- the potential is there. But sometimes it doesn't seem that way when we hear about attacks and breaches ever more frequently.

50%
50%
Mike Robuck
Mike Robuck
11/8/2017 6:01:39 PM
User Rank
Author
Re: Securing the Cloud
This was covered in some of the other security Q&As, but in a nutshell virtualization introduces more moving parts (VMs, containers, etc.) than traditional networks. The simple version is that network operators would have more visability -- even of the moving parts -- in virtualzied networks to see/stop attacks. The consensus from the other Q&As is that virtualzied networks have the potential to be more secure. 

50%
50%
mhhf1ve
mhhf1ve
11/8/2017 3:10:19 PM
User Rank
Platinum
Re: Securing the Cloud
> "could this be a more secure environment than a manual non-virtualized environment?"

How does one quantify "more secure" for virtualized vs traditional networking? In one sense, keeping things simple makes things more secure by not introducing complications or automation that could affect large segments of a network. I'm just curious how anyone really justifies their assertions that X is more secure than Y -- without resorting to "number of attacks per time" or other after-the-fact stats.

100%
0%
Shaunn
Shaunn
11/8/2017 11:10:47 AM
User Rank
Platinum
Securing the Cloud
CORD looks to be one of the first to provide a more secure cloud, thanks to NFV/SDN. This is a great example of integrating the benefits of new technology with existing technology. The automation and security from SDN/NFV meshes well with cloud functions and accesibility.

100%
0%
Ariella
Ariella
11/8/2017 10:19:49 AM
User Rank
Author
Re: Cord & Security
<As users start to use the service they may want to control of individual sessions. We think in terms of a configuration time on service-wide basis and control on a per-user per-subscriber basis.> that makes it sound very individualized. Is it more so than offerings from other companies?

100%
0%
clrmoney
clrmoney
11/7/2017 3:10:41 PM
User Rank
Platinum
Cord & Security
CORD/Central Office Rearchitecture as a Datacenter and Security are two unique and distinctive things. Cord is related to data technology etc. We will always need security when we are dealing with something that is new and advanced and in my mind I was thinking how the NFV/Network Function Virtualization fit into all of this. I guess they are all connected and need each other or they can bring something different add add more or better to what they already have.

100%
0%


Latest Articles
Italy's 5G auction could exceed a government target of raising 2.5 billion ($2.9 billion) after attracting interest from companies outside the mobile market.
The emerging-markets operator is focusing on the humdrum business of connectivity and keeping quiet about some of its ill-fated 'digitalization' efforts.
Three UK has picked Huawei over existing radio access network suppliers Nokia and Samsung to build its 5G network.
Vendor says that it's its biggest 5G deal to date.
Verizon skates where the puck is going by waiting for standards-based 5G devices to launch its mobile service in 2019.
On-the-Air Thursdays Digital Audio
Orange has been one of the leading proponents of SDN and NFV. In this Telco Transformation radio show, Orange's John Isch provides some perspective on his company's NFV/SDN journey.
Special Huawei Video
10/16/2017
Huawei Network Transformation Seminar
The adoption of virtualization technology and cloud architectures by telecom network operators is now well underway but there is still a long way to go before the transition to an era of Network Functions Cloudification (NFC) is complete.
Video
The Small Cell Forum's CEO Sue Monahan says that small cells will be crucial for indoor 5G coverage, but challenges around business models, siting ...
People, strategy, a strong technology roadmap and new business processes are the key underpinnings of Telstra's digital transformation, COO Robyn ...
Eric Bozich, vice president of products and marketing at CenturyLink, talks about the challenges and opportunities of integrating Level 3 into ...
Epsilon's Mark Daley, director of digital strategy and business development, talks about digital transformation from a wholesale service provider ...
Bill Walker, CenturyLink's director of network architecture, shares his insights on why training isn't enough for IT employees and traditional ...
All Videos
Telco Transformation
About Us     Contact Us     Help     Register     Twitter     Facebook     RSS
Copyright © 2019 Light Reading, part of Informa Tech,
a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with