|By Marketwired .||
|July 2, 2014 11:00 AM EDT||
SANTA CLARA, CA -- (Marketwired) -- 07/02/14 -- To assist mobile broadband operators in designing secure LTE networks, Stoke has developed the industry's first LTE security framework. This strategic tool provides an overview of the entire LTE infrastructure threat surface, providing a reference point for LTE security design teams that will assist in identifying the appropriate solutions to place at the five key points of vulnerability in LTE networks.
Security is an acknowledged priority in LTE networks, but selecting the most appropriate technology is challenging since multiple, different security and protection solutions are needed to address the specific vulnerabilities of each particular EPC interface: core to Internet security, radio access network (RAN) to core security, device and application security, IMS security and Policy and Charging Control protection. In conjunction with the framework, Stoke has also published an infographic, 'The Top 5 LTE Protection Domains', detailing the key threats and protection requirements of LTE security. The infographic can be downloaded here.
In a recent poll of LTE operators(1), 53% of respondents indicated that core-to-Internet security and RAN-to-Core Security were their biggest pain points. This supports data showing that 25% of mobile operators have already seen a distributed denial of service attack targeting their subscribers, RAN, backhaul or packet core.(2) Industry estimates of an increase in small cell deployments to 60million or more(3) by 2016 suggest that the potential for malicious attack through these less-protected network elements will rise significantly in the near future.
Currently, no all-inclusive guide exists to the points at which LTE traffic requires protection, or the protective measures appropriate for each location. The concepts for securing LTE networks have been addressed theoretically by numerous industry working groups and standards committees, but there are few comprehensive illustrations of how to implement those security requirements in practice.
"Our aim is to help network designers by bringing standards body and other industry guidelines into clearer, practical perspective and support a more consistent development of LTE security strategies," said Dilip Pillaipakam, Vice President of Product Management and Marketing at Stoke. "All security is not created equal, and expensive mistakes have already been made where EPC security measures have not been mapped to the specific traffic types, performance needs and potential risks at each point of vulnerability."
Moreover, since developing an overall network security strategy requires cross-functional overlap, our framework will also help create alignment about which elements need to be secured, where and how."
Stoke's framework builds on the foundations of the industry bodies including 3GPP, NGMN and ETSI. In its associated white paper, 'LTE Security Concepts and Design Considerations,' Stoke also details the risks and potential mitigation strategies associated with different security domains.
The company identifies the five security domains of LTE networks as:
1) Device and application security
2) RAN-Core Border (the junction of the radio access network with the EPC or S1 link)
3) Policy and Charging Control (interface of EPC with visited LTE network)
4) Internet Border
5) IMS core
Stoke's security solution protects traffic and enhances performance at the RAN-Core border. Its technology establishes and manages secure IPsec connections between the evolved packet core (EPC) and eNodeBs, including user, control plane and management plane traffic. More information about the LTE security framework is available at www.stoke.com.
Stoke provides solutions for the mobile border, securing LTE communications between the radio access network and the operator core, protecting subscribers while safeguarding critical mobile core infrastructure. Our products have been selected by the world's leading mobile network operators for technical excellence and quality, and we partner with leading industry equipment providers and systems integrators to ensure ongoing success and innovation. Stoke is the global market leader in deployed LTE Security Gateways with offices in the US, UK, France, Spain, Japan, Korea and Singapore. For more information, visit www.stoke.com.
(1) Heavy Reading
(2) Arbor Networks
(3) Small Cell Forum
Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2630550
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
Aug. 25, 2016 07:15 AM EDT Reads: 1,857
Aspose.Total for .NET is the most complete package of all file format APIs for .NET as offered by Aspose. It empowers developers to create, edit, render, print and convert between a wide range of popular document formats within any .NET, C#, ASP.NET and VB.NET applications. Aspose compiles all .NET APIs on a daily basis to ensure that it contains the most up to date versions of each of Aspose .NET APIs. If a new .NET API or a new version of existing APIs is released during the subscription peri...
Aug. 25, 2016 06:30 AM EDT Reads: 1,816
Akana has announced the availability of version 8 of its API Management solution. The Akana Platform provides an end-to-end API Management solution for designing, implementing, securing, managing, monitoring, and publishing APIs. It is available as a SaaS platform, on-premises, and as a hybrid deployment. Version 8 introduces a lot of new functionality, all aimed at offering customers the richest API Management capabilities in a way that is easier than ever for API and app developers to use.
Aug. 25, 2016 06:00 AM EDT Reads: 1,415
SYS-CON Events announced today that Isomorphic Software will exhibit at DevOps Summit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Isomorphic Software provides the SmartClient HTML5/AJAX platform, the most advanced technology for building rich, cutting-edge enterprise web applications for desktop and mobile. SmartClient combines the productivity and performance of traditional desktop software with the simp...
Aug. 25, 2016 03:30 AM EDT Reads: 2,115
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
Aug. 25, 2016 02:30 AM EDT Reads: 2,144
Is the ongoing quest for agility in the data center forcing you to evaluate how to be a part of infrastructure automation efforts? As organizations evolve toward bimodal IT operations, they are embracing new service delivery models and leveraging virtualization to increase infrastructure agility. Therefore, the network must evolve in parallel to become equally agile. Read this essential piece of Gartner research for recommendations on achieving greater agility.
Aug. 25, 2016 02:15 AM EDT Reads: 476
SYS-CON Events announced today that 910Telecom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and ...
Aug. 25, 2016 02:00 AM EDT Reads: 1,783
Personalization has long been the holy grail of marketing. Simply stated, communicate the most relevant offer to the right person and you will increase sales. To achieve this, you must understand the individual. Consequently, digital marketers developed many ways to gather and leverage customer information to deliver targeted experiences. In his session at @ThingsExpo, Lou Casal, Founder and Principal Consultant at Practicala, discussed how the Internet of Things (IoT) has accelerated our abil...
Aug. 25, 2016 02:00 AM EDT Reads: 1,895
With so much going on in this space you could be forgiven for thinking you were always working with yesterday’s technologies. So much change, so quickly. What do you do if you have to build a solution from the ground up that is expected to live in the field for at least 5-10 years? This is the challenge we faced when we looked to refresh our existing 10-year-old custom hardware stack to measure the fullness of trash cans and compactors.
Aug. 25, 2016 01:15 AM EDT Reads: 1,607
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
Aug. 25, 2016 01:00 AM EDT Reads: 1,976
The emerging Internet of Everything creates tremendous new opportunities for customer engagement and business model innovation. However, enterprises must overcome a number of critical challenges to bring these new solutions to market. In his session at @ThingsExpo, Michael Martin, CTO/CIO at nfrastructure, outlined these key challenges and recommended approaches for overcoming them to achieve speed and agility in the design, development and implementation of Internet of Everything solutions wi...
Aug. 25, 2016 12:45 AM EDT Reads: 1,904
With over 720 million Internet users and 40–50% CAGR, the Chinese Cloud Computing market has been booming. When talking about cloud computing, what are the Chinese users of cloud thinking about? What is the most powerful force that can push them to make the buying decision? How to tap into them? In his session at 18th Cloud Expo, Yu Hao, CEO and co-founder of SpeedyCloud, answered these questions and discussed the results of SpeedyCloud’s survey.
Aug. 25, 2016 12:30 AM EDT Reads: 2,077
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
Aug. 25, 2016 12:00 AM EDT Reads: 2,977
Actian Corporation has announced the latest version of the Actian Vector in Hadoop (VectorH) database, generally available at the end of July. VectorH is based on the same query engine that powers Actian Vector, which recently doubled the TPC-H benchmark record for non-clustered systems at the 3000GB scale factor (see tpc.org/3323). The ability to easily ingest information from different data sources and rapidly develop queries to make better business decisions is becoming increasingly importan...
Aug. 24, 2016 10:30 PM EDT Reads: 2,015
To leverage Continuous Delivery, enterprises must consider impacts that span functional silos, as well as applications that touch older, slower moving components. Managing the many dependencies can cause slowdowns. See how to achieve continuous delivery in the enterprise.
Aug. 24, 2016 10:30 PM EDT Reads: 1,461