Page 81 - CDM-CYBER-DEFENSE-eMAGAZINE-December-2018
P. 81

Operators need security tools and solutions that are built for these kinds of networks from the start.
            Scalable solutions are all very well, but very few can cope with the size, reach and sheer relentlessness
            of today’s threats facing carrier-grade networks.

            That, in turn, means a multi-layered approach to security, using carrier-grade tools that are designed to
            operate in a 100Gbps-rate environment. This includes, but is not limited to: technology that can detect
            and prevent cyber-attacks or data breaches by providing total visibility of the entire network; monitoring
            and diagnostics of network performance to analyse network traffic traversing the network and monitor
            security;  detect  threats  and  anomalies  using  signature  matching  against  known  threats.  Integrated
            network visibility software, real-time monitoring tools, scrutiny of every packet, and event-driven intrusion
            detection systems are just some of the components required to protect network infrastructure at this level.

            This is what organisations, public and private, should demand of their network provider. And this is what
            providers of carrier-grade networks should happily deliver. Because as one technology giant put it some
            years ago: the network is the computer. That’s even truer now than it was then. Protect the network
            properly, and you’re protecting everything else – including the bottom line.









            About the Author


                                                Steve Patton, Cyber Security Specialist & Director, Telesoft, is an
                                                experienced technical B2B cyber security specialist and Director.
                                                Steve is a frequent speaker on topics including security breaches,
                                                big data analytics, audit and compliance, and IT forensics. Steve
                                                can  be  reached  online  through  LinkedIn  and  at  our  company
                                                website https://www.telesoft-technologies.com/






















                                 81
   76   77   78   79   80   81   82   83   84   85   86