|By Marketwired .||
|July 2, 2014 11:00 AM EDT||
SANTA CLARA, CA -- (Marketwired) -- 07/02/14 -- To assist mobile broadband operators in designing secure LTE networks, Stoke has developed the industry's first LTE security framework. This strategic tool provides an overview of the entire LTE infrastructure threat surface, providing a reference point for LTE security design teams that will assist in identifying the appropriate solutions to place at the five key points of vulnerability in LTE networks.
Security is an acknowledged priority in LTE networks, but selecting the most appropriate technology is challenging since multiple, different security and protection solutions are needed to address the specific vulnerabilities of each particular EPC interface: core to Internet security, radio access network (RAN) to core security, device and application security, IMS security and Policy and Charging Control protection. In conjunction with the framework, Stoke has also published an infographic, 'The Top 5 LTE Protection Domains', detailing the key threats and protection requirements of LTE security. The infographic can be downloaded here.
In a recent poll of LTE operators(1), 53% of respondents indicated that core-to-Internet security and RAN-to-Core Security were their biggest pain points. This supports data showing that 25% of mobile operators have already seen a distributed denial of service attack targeting their subscribers, RAN, backhaul or packet core.(2) Industry estimates of an increase in small cell deployments to 60million or more(3) by 2016 suggest that the potential for malicious attack through these less-protected network elements will rise significantly in the near future.
Currently, no all-inclusive guide exists to the points at which LTE traffic requires protection, or the protective measures appropriate for each location. The concepts for securing LTE networks have been addressed theoretically by numerous industry working groups and standards committees, but there are few comprehensive illustrations of how to implement those security requirements in practice.
"Our aim is to help network designers by bringing standards body and other industry guidelines into clearer, practical perspective and support a more consistent development of LTE security strategies," said Dilip Pillaipakam, Vice President of Product Management and Marketing at Stoke. "All security is not created equal, and expensive mistakes have already been made where EPC security measures have not been mapped to the specific traffic types, performance needs and potential risks at each point of vulnerability."
Moreover, since developing an overall network security strategy requires cross-functional overlap, our framework will also help create alignment about which elements need to be secured, where and how."
Stoke's framework builds on the foundations of the industry bodies including 3GPP, NGMN and ETSI. In its associated white paper, 'LTE Security Concepts and Design Considerations,' Stoke also details the risks and potential mitigation strategies associated with different security domains.
The company identifies the five security domains of LTE networks as:
1) Device and application security
2) RAN-Core Border (the junction of the radio access network with the EPC or S1 link)
3) Policy and Charging Control (interface of EPC with visited LTE network)
4) Internet Border
5) IMS core
Stoke's security solution protects traffic and enhances performance at the RAN-Core border. Its technology establishes and manages secure IPsec connections between the evolved packet core (EPC) and eNodeBs, including user, control plane and management plane traffic. More information about the LTE security framework is available at www.stoke.com.
Stoke provides solutions for the mobile border, securing LTE communications between the radio access network and the operator core, protecting subscribers while safeguarding critical mobile core infrastructure. Our products have been selected by the world's leading mobile network operators for technical excellence and quality, and we partner with leading industry equipment providers and systems integrators to ensure ongoing success and innovation. Stoke is the global market leader in deployed LTE Security Gateways with offices in the US, UK, France, Spain, Japan, Korea and Singapore. For more information, visit www.stoke.com.
(1) Heavy Reading
(2) Arbor Networks
(3) Small Cell Forum
Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2630550
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
Feb. 20, 2017 05:45 PM EST Reads: 416
When you focus on a journey from up-close, you look at your own technical and cultural history and how you changed it for the benefit of the customer. This was our starting point: too many integration issues, 13 SWP days and very long cycles. It was evident that in this fast-paced industry we could no longer afford this reality. We needed something that would take us beyond reducing the development lifecycles, CI and Agile methodologies. We made a fundamental difference, even changed our culture...
Feb. 20, 2017 05:30 PM EST Reads: 2,220
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smart...
Feb. 20, 2017 05:30 PM EST Reads: 3,888
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, discussed the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports.
Feb. 20, 2017 05:15 PM EST Reads: 944
Feb. 20, 2017 02:45 PM EST Reads: 422
SYS-CON Events announced today that CA Technologies has been named “Platinum Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business – from apparel to energy – is being rewritten by software. From ...
Feb. 20, 2017 02:15 PM EST Reads: 1,087
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settle...
Feb. 20, 2017 01:15 PM EST Reads: 389
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Feb. 20, 2017 01:00 PM EST Reads: 842
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and Containers together help companies to achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of D...
Feb. 20, 2017 01:00 PM EST Reads: 5,857
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
Feb. 20, 2017 01:00 PM EST Reads: 1,197
Feb. 20, 2017 01:00 PM EST Reads: 10,049
SYS-CON Events announced today that Outlyer, a monitoring service for DevOps and operations teams, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Outlyer is a monitoring service for DevOps and Operations teams running Cloud, SaaS, Microservices and IoT deployments. Designed for today's dynamic environments that need beyond cloud-scale monitoring, we make monitoring effortless so you...
Feb. 20, 2017 12:45 PM EST Reads: 1,021
Cloud Expo, Inc. has announced today that Andi Mann and Aruna Ravichandran have been named Co-Chairs of @DevOpsSummit at Cloud Expo 2017. The @DevOpsSummit at Cloud Expo New York will take place on June 6-8, 2017, at the Javits Center in New York City, New York, and @DevOpsSummit at Cloud Expo Silicon Valley will take place Oct. 31-Nov. 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Feb. 20, 2017 12:45 PM EST Reads: 960
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
Feb. 20, 2017 12:45 PM EST Reads: 4,294
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain.
Feb. 20, 2017 12:30 PM EST Reads: 489