main

Service Provider

5G Security in an API-Driven Economy

May 15, 2019 — by Travis Volk0

5G_API-960x640.jpg

Over the last six years, solution architects have been designing the transformation of Service Provider’s networks to significantly reduce the timing of service and feature deployment lifecycles, standardizing on real-time service provisioning, consumption and end user autonomy.  This challenge has been in parallel to delivering highly scalable and cost effective solutions. 

These solutions, along with automation, are addressing emerging security challenges while extending tailored outcomes to individual lines of business and customers. The result is better security, user experiences and a broader addressable market. 

So how does this hard work improve our execution of 5G transformations? 

All About Those Apps

First, the fully automated software delivery model allows us to address the complexity of a widely distributed architecture in a repetitive model.  Network and security alignment improves resource allocation while optimizing consumption-based delivery from edge systems. 

[You may also like: The Necessary Burden of 5G Security]

The “edge” may have more than one meaning in this discussion, as service delivery platforms are no longer constrained to a single autonomous system. This flexibility leads Service Providers to a new era of content management and monetization as applications are deployed across numerous computing platforms to minimize latency. 

It is important to appreciate that these capabilities are all made possible because of application-to-application dialog that transpire over APIs.  Traditionally, application and API exposure had been constrained to IDC infrastructure. This meant that a secure DC or security gateway framework was used to harden the exposure of numerous applications in the same physical location. All of these applications communicated to the internet via a common path. In the scope of security design, this was a relatively easy problem to address. 

[You may also like: 5G: You Can Have Your Slice and Security Too!]

Now, take a step back to the previous ideology of 5G and it jumps out at you that API and application protections become a key component in modern edge security. 

From Security Zones to Network Slices

It is also interesting to recognize that traditional volumetric defense for infrastructure protection is changing rapidly.

Anomalous traffic easily evading netflow detection has been eroding precious core resources for too long.  When security functions are built into the network, attacks are automatically addressed locally, avoiding back-hauling attacks and driving efficiency back into the core. This highly scalable infrastructure protection strategy also serves as a point of escalation for more sophisticated or persistent attacks seen in gateways, applications and APIs. 

As we transition from security zones to network slices, this multi-tiered approach further lends itself to the decomposition of highly intelligent machine learning algorithms deployed contextually for the relevant protocols and applications. 

[You may also like: Safeguarding 5G Networks with Automation and AI]

As an example, IoT anomaly detection on the access edge requires very different algorithms than used for detecting attacks from the internet thru the peering edge. When we speak about application and API protection, protecting a mobile application requires entirely different techniques than addressing behavioral analysis for fraudulent account abuse. Having the ability to protect, adapt and optimize attack lifecycle management in cooperation with the orchestration layer for end-to-end security has been our greatest achievement in modern security design.

The Modern Landscape

Maybe the punchline is becoming obvious at this point but addressing end-to-end security with the ability to escalate application abuse to the edge of the system in a widely distributed architecture has become a modern landscape requirement. 

[You may also like: How to Prevent Real-Time API Abuse]

Automation is working on our behalf to drive agility into engineering, provisioning, billing and operations. With predefined workflows, analysts enjoy alert-driven processes and/or fully automated protection strategies designed to meet the high availability demands throughout a complex system.

If you track my work at all, you will appreciate that I have dedicated the last twenty years designing highly adaptive services.  If you are curious how you too can maximize security revenue across multiple lines of business, please reach out in the comment section below; service creation is one of my favorite points of discussion. 

2018 Mobile Carrier Ebook

Read “Creating a Secure Climate for your Customers” today.

Download Now

Application DeliveryNFV

Delivering highly flexible network services for real-time consumption with NFV

June 29, 2016 — by Travis Volk0

nfv-blog-3-960x651.png

Emerging markets come in all shapes and sizes, but something as profound to an industry as Network Function Virtualization (NFV) faces enormous scrutiny from suppliers and customers, having a major impact on relationships.

Along with system integration designs, special care has been taken in software evolution to improve on Cloud-based solutions. High-speed, multi-tenant network services come with a wide variety of requirements, but to dramatically improve EBIT, performance acceleration techniques stand out. ISVs delivering the greatest efficiency offer the capability of a greater number of services consumed from less computing infrastructure (NFVi). This requires suppliers to deliver the adoption of Open Source libraries integration while selecting from combinations of tuning techniques ranging from memory, to CPU, to hardware offloading and more.

Security

Results Rely on Security Confidence

January 27, 2015 — by Travis Volk0

Too often we hear about the success of attackers in today’s cyber threat landscape, those who claim leadership in the ongoing information security war.  But history proves that the successes of those standing guard are rarely publicized.  And in this continuous battle of data protection, we are certain; more attacks are blocked by intelligent solutions than ever before. 

Service Provider

Improving Customer Value with Collaborative Design

August 13, 2014 — by Travis Volk0

One challenge all business leaders have in common is the expectation to customize products and services for their largest customers.  Reflecting on several collaborative designs with my most demanding customers, I recognized a benefit in the process that was not obvious from the beginning — mutually beneficial relationships have gone beyond good support and competitive pricing.  Providing extensibility of solutions allowing customers to differentiate services has become necessary as framework consolidation and service velocity increases.

SDNService Provider

Empowering via Orchestration

May 5, 2014 — by Travis Volk1

As solution innovators we design towards compelling goals in emerging markets that are proven multiple times — all prior to broad adoption.  Throughout this process we optimize a design and implementation methodology by removing variables over and over again until we arrive at a perfect process.  It is not uncommon that while working towards the realization of target architectures focused on solving complex goals, we recognize fundamental benefits in the underlying solution.  This is where Orchestration stands today. 

SDN

Accelerating Enterprise’s Effectiveness – Automating IT Services Without Increasing Cost

December 11, 2013 — by Travis Volk0

Yesterday morning, Alcatel-Lucent unveiled new software defined networking (SDN) technologies for the OmniSwitch Ethernet LAN portfolio of its Enterprise division that will help companies meet the increasing demands of employees and customers to use the applications they want, when and where they want to use them.

SDN

Mass Market Tipping Point for SDN, NFV and Orchestration

October 23, 2013 — by Travis Volk1

It has been just more than six months since we finished our first commercial Software defined networking (SDN) product launch.  Prior, we had completed several commercial, what might be considered today as Network Functions Virtualization (NFV), deliveries based upon virtualized platforms and embedded system designs.  And throughout the same period, we concluded numerous cloud orchestration integrations.  There are similarities among all of the designs, including software based solution delivery, automated provisioning and application centric workflows resulting in better network services. 

Application DeliveryCloud ComputingService Provider

The “As-a-Service” Revolution: How Cloud-based Services are Reshaping the Enterprise

July 15, 2013 — by Travis Volk1

The growth of cloud-based services is challenging customers to second-guess their brick and mortar investments. From price and performance to state of the art technology, enterprises are ready to return the complex task of managing advanced services to cloud providers. This shift not only complements the mobile aspect of employee, consumer and partner interaction in today’s marketplace, but also allows enterprises to focus more on their core business, enabling further growth.

Application DeliveryApplication VirtualizationCloud Computing

IBM Impact 2012: A Showcase of Innovation, Transformation and Growth

May 15, 2012 — by Travis Volk1

I just got back from IBM Impact 2012 held in Las Vegas and would like to share my impressions of the show. The conference delivered an exciting campaign about innovation, transformation and growth.

The highlight for IBM customers with whom I spoke came during the moment when the IBM PureSystems Platform – an expert integrated system – was unveiled. IBM demonstrated a total application setup in under four hours, starting from uncrating the unit. This defines a huge reduction in application deployment time, cost and expertise. Clearly this solution leveraging application patterns is innovative and posed to change application rollouts in our market.