Wedge Networks announces industry leader James Hamilton as CEO

No Gravatar

New CEO to accelerate global growth in cloud security sector

GEN15 Dallas, November 18, 2015 — Wedge Networks, the leader in orchestrated threat management solutions, today announced the appointment of James Hamilton as chief executive officer to spearhead the company’s global charge in the rapidly growing cloud security market.

Hamilton, a Wedge Networks board member since 2013, brings extensive executive leadership experience to the rapidly growing company and is widely recognized as one of the cybersecurity industry’s most respected and influential leaders. Most significantly as chief executive officer of TippingPoint, the company that defined Intrusion Prevention Systems (IPS) and that was acquired for $430 million by 3Com, where he stayed on and continued to lead the TippingPoint line of business.

Throughout James career spanning 25 years in network and security industries he has played a major part in defining next generation technologies, successfully taking four companies public, all of which were subsequently acquired. He was also an executive of three other private companies that were acquired, for a total acquisition value exceeding $3.8 billion. Other highly notable achievements include his role as president of Efficient Networks Inc. which became the global leader in DSL technology and was acquired of Siemens AG for approx. $1.5 billion. He also led the first wave of VoIP technology as vice president of worldwide sales and service at Picazo Communications Inc., an IP telephony company sold to Intel Corporation. More recently James was a senior executive for Cyan, a leader in software-defined networks (SDN) and network functions virtualization (NFV) orchestration acquired by Ciena.

“Wedge Networks has developed truly compelling cloud security and orchestration solutions that embody the spirit of new SDN and NFV frameworks,” said Mr. Hamilton. “I believe our cloud-based security software addresses critical gaps in conventional security frameworks, and our open, multi-vendor, software approach is an attractive alternative to the proprietary hardware-intensive conventional approach.”

Jeff Wilson, Principal Security Analyst from IHS said: “Hamilton has a proven background in building highly successful and innovative security companies like TippingPoint. I look forward to tracking his progress helping Wedge Networks capitalize on the rapidly-expanding cloud security opportunity.”

Dr. Hongwen Zhang, former chief executive (CEO) and co-founder, actively recruited James to his former role and will continue on as CTO, with a primary focus on leading product development. “I am absolutely thrilled to have James join us as CEO,” said Dr. Zhang. “He is a world class leader in the security and networking industry. His market insight and input as board member have been incredibly valuable these past few years. Having him lead our team will help us to accelerate our market success and achieve our full potential.”

Wedge Networks are also today launching the addition of WedgeIQ™, an integrated multi-technology threat intelligence engine, to its revolutionary Cloud Network Defense™ security platform. Wedge Networks will be showing real-time security services running with WedgeIQ and using Network Functions Virtualization for Security (NFV-S) on the Phonoscope LightWave network as Proof of Concept (PoC) demonstrations at the MEF GEN15 Conference Dallas, Texas, Nov. 16-19, 2015.

About Wedge

Wedge Networks™ is transforming the way security is delivered. Powered by the innovative WedgeOS™, Wedge Networks’ Cloud Network Defense™ is an orchestrated threat management platform designed to combat the shifting threat landscape associated with cloud, mobility, Internet of Things and consumerization of IT. By embedding security within the network as an elastic, scalable service, it is the only cloud security solution to perform high-performance content inspection without requiring traffic to leave the network. The award winning Wedge Platform™ is deployed globally, delivering security protection for tens of millions of users in Fortune 500 companies, government agencies, internet services providers, and across all industry verticals. Wedge Networks is headquartered in Calgary, Canada and has international offices in Dallas, USA; Beijing, China; and Manama, Bahrain. For further information visit: http://www.wedgenetworks.com/

Media Contacts:
USA & International PR contact:
Emma Jefferies
Zonic Group PR
ejefferies@zonicgroup.com
+44 (0)1672 550 130
+44 (0) 7804 903 026

Posted in Industry News, Wedge News | Tagged , , | Leave a comment

Wedge Networks Introduces Advanced Threat Intelligence for Assured Security Lifecycle Services Orchestration with WedgeIQ™; Solution to Be Demonstrated At MEF GEN15

No Gravatar

A powerful new combination of big data analytics, intuitive threat visualization, automated learning, and real-time threat intelligence distribution further enhance Wedge Cloud Network Defense™ for agile, assured and orchestrated threat management

Calgary, Alberta, November 17, 2015 — Wedge Networks, the leading orchestrated threat management solutions company for cloud-connectivity, today announced the addition of WedgeIQ™, an integrated multi-technology threat intelligence engine, to its revolutionary Cloud Network Defense™ (CND) security platform. WedgeIQ introduces powerful, Fortune 500 Enterprise-grade threat intelligence with carrier-grade reliability and scale providing deep threat discovery analytics, intuitive visualization, reporting, automated learning, and real-time global threat intelligence distribution for Wedge CND network security operators and their Security-as-a-Service (SECaaS) customers. Wedge CND with WedgeIQ will be demonstrated running in a real-world carrier network at MEF GEN15, coming to Dallas in November 2015.

WedgeIQ is the newest technology addition to Wedge CND, an orchestrated threat management platform that combats the shifting threat landscape associated with cloud, mobility, Internet of Things and consumerization of IT. By embedding security within the network as an elastic, scalable service, Wedge CDN provides high-performance content inspection in the cloud, in real-time, and applies orchestrated threat management policies on a per customer basis. Wedge security technologies are deployed globally, delivering security protection for tens of millions of users in Fortune 500 companies, government agencies, internet services providers, mobile operators, and across all industry verticals.

By integrating multiple technologies for analytics, visualization, learning, and data distribution, WedgeIQ introduces capabilities that allow its threat intelligence to grow and evolve as rapidly as the threat industry, to keep up with and protect against ever increasing threats. The ability of WedgeIQ to analyze big data and produce compelling and intuitive visualizations of threats encountered by the network conveys valuable data that customers can use to evaluate and when appropriate adjust their own internal policies and practices to minimize potential threats. In many cases, it also serves as Wedge CNDs own value-advocate by clearly visualizing the scope and magnitude of threats being managed and mitigated by Wedge CND.

“We’ve all seen the disturbing trend where rapidly changing security threats are outpacing the ability for many organizations to keep up” said James Hamilton, Wedge’s recently appointed CEO. “They simply can’t allocate enough human and capital resource to win the security battle on their own. The ability for conventional service providers to leverage Wedge CND to protect their own network and simultaneously deliver Fortune 500 Enterprise-grade Security-as-a-Service with carrier-grade reliability and scale to their customers will improve the security landscape for everyone.”

Wedge Networks will be showing real-time security services running with WedgeIQ and using Network Functions Virtualization for Security (NFV-S) on the Phonoscope LightWave network as Proof of Concept (PoC) demonstrations at the MEF GEN15 Conference Dallas, Texas, Nov. 16-19, 2015.

“We provide broadband, internet connectivity and other services for several thousand businesses and educational institutions across the greater Houston area, representing well over a million students and customer employees” said Mike Mason, senior business development executive of Phonoscope LightWave. “We’ve been evaluating Wedge Cloud Network Defense for both protecting the servers in our hosting environment and for protecting our end customers via Security-as-a-Service. Wedge CND’s ability to detect, diagnose, visualize and act on threats has greatly exceeded our expectations, giving us confidence that we can add security as a compelling incremental service in our portfolio.”

About Wedge
Wedge Networks™ is transforming the way security is delivered. Powered by the innovative WedgeOS™, Wedge Networks’ Cloud Network Defense™ is an orchestrated threat management platform designed to combat the shifting threat landscape associated with cloud, mobility, Internet of Things and consumerization of IT. By embedding security within the network as an elastic, scalable service, it is the only cloud security solution to perform high-performance content inspection without requiring traffic to leave the network. The award winning Wedge Platform™ is deployed globally, delivering security protection for tens of millions of users in Fortune 500 companies, government agencies, internet services providers, and across all industry verticals. Wedge Networks is headquartered in Calgary, Canada and has international offices in Dallas, USA; Beijing, China; and Manama, Bahrain. For further information visit: http://www.wedgenetworks.com/

Media Contacts:
USA & International PR contact:
Emma Jeffries
Zonic Group PR
ejefferies@zonicgroup.com
+44 (0) 1672 550 130
+44 (0) 7804 903 026

Posted in Industry News, Latest Security News, Wedge News | Tagged , , , | Leave a comment

How Savvy Carriers Should Respond to Challenges Posed by IoT

No Gravatar

– Staff Reporter, Singapore Business Review, Thursday, October 8, 2015

The IoT is exploding – and its traffic is totally unlike anything that network operators have encountered.

Here’s how savvy carriers can respond to this challenge – and use standards to turn the IoT from a management and security headache into a business opportunity to offer new agile services.

Network operators and service providers are gearing up for the Internet of Things (IoT) – and the IoT mixes revenue opportunities with technology challenges.

Consumers are going crazy for IoT devices, from wearables like the Apple Watch and Fitbit health band, to Internet-connected thermostats, to the Amazon Echo cloud music player to connected vehicles. Businesses, too, love the IoT, using IP-based technologies for inventory control, smart signage and medical devices.

It’s a huge market, estimated to reach US$1.7 trillion by 2020 in direct products and services, with a $263 billion support market there will be billions of connected “things” in the IoT, with estimates ranging from 13-25 billion by 2020.

While many technology-driven conversations about the IoT focus on the end point (like fitness bands) and the back-end applications (like social networks that track and analyze exercise), the truth is that the Internet of Things depends entirely upon safe, secure, highly available connectivity. For the end point, that’s everything from home and coffee shop WiFi access points to 4G cellular data services to business Internet. On the back end, service providers manage IoT from the device to data centers or the cloud, tied together with MEF CE 2.0, MPLS and fiber optical networks.

IoT presents opportunities for the telecommunications companies that provide that connectivity, and for industry vendors that provide hardware, software and services to the carriers. It presents challenges as well, because IoT traffic has different characteristics than traditional network traffic, explains Marie Fiala Timlin, Director of Marketing for CENX, which offers lifecycle service orchestration solutions for Software-Defined Networks.

“Internet of Things traffic is characterized by high-volume signaling and low-bandwidth data traffic. There are a lot more events happening in the network, which leads to a lot more data being collected. And when I’m talking about data, it’s not necessarily the consumer application or subscriber-type data — it’s network events happening,” Timlin said.

She continued, “IoT exacerbates the big data network problem and creates a need for service providers to even more efficiently manage their network, because of all these events that are happening in the system, for example, whether it’s for troubleshooting or for ensuring high quality of service. That really drives the need for lifecycle service orchestration, because here you’ve got a big data problem, and you’re trying to apply all the cloud computing technologies that have already been used to solve big data analytics problems in the business world.”

Planning for Traffic Impact

“Because the IoT is such a fast-growing market”, added Dr. Hongwen Zhang, CEO & Co-Founder of security services provider Wedge Networks, “when carriers try to do infrastructure deployment, and they have to do the capacity planning, they are looking at a three-to-five year planning cycle. Maybe longer. How do you handle IoT with a fast-growing future, with limited capital? One thing that can provide the solution is Software Defined Networks and Network Functions Virtualization. Spend your money there, and don’t over-invest in firewalls and switches.”

Timlin added: “Operators have to track network events for each network device and the connection in order to keep the pipe up and running. They also have to aggregate subscriber-level events, such as which application is being used. The best of both worlds is actually marrying those two types of data so you can intelligently determine when and where you need to augment network capacity. That’s where NFV comes into play, because then you can do that augmentation much more flexibly and cost-effectively.”

That means analytics – lots of analytics – about network traffic, said Angus Robertson, Vice President of Product Marketing at insightsoftware.com, which sells software to assist customers of enterprise resource planning systems. His company will rely upon those analytics to serve its customers, he explains: “With the Internet of Things, you’ve got millions of devices that can provide you additional leading and lagging indicators to give you greater visibility into your business and help drive the right actions from a business standpoint to increase your overall business performance.”

Robertson continued, “When it comes to Big Data, we’re talking the three Vs, volume, velocity and variety. So being able to deal with the big data that is always associated with these millions of data sources through the IoT is a challenge. What’s important is the ability not only to have the level of performance that you need but also the ability to capture and integrate those data sources really effectively.”

Modeling after Mobile

“The traffic patterns and scaling of IoT is reminiscent of mobile backhaul, which might provide a model for the future”, suggests Raghu Ranganathan, Principal of Network Architecture, Office of CTO, at Ciena, a global telecommunications equipment provider.

“In the Internet of Things, most of the traffic is from the source back up to the cloud, as opposed to the vanilla use case of a user downloading stuff from the cloud,” Ranganathan said. Reliable connectivity is extremely important. In addition scale has to be partitioned from the perspective of there being some IoT devices that would have very low data volume and have high signaling traffic, but there could be another class of devices like CCTVs that could send lots of traffic.”

“Reliable connectivity is extremely important. Scale has to be partitioned from the perspective of there are some IoT devices that would have very low data volume and have high signaling traffic, but there could be another class of devices like CCTVs that could send a boatload of traffic.”

Ranganathan continued, “What does the network look like? Why should it be any different from the way the mobile backhaul is being done? You have things that are connected to a base station through an air interface, like WiFi or 4G cellular. You have wired backhaul. Organizations like 3GPP, for example, are saying ‘how do I update my LTE specifications for more upstream traffic as opposed to downstream traffic?’ ”

A future architecture of this type, Ranganathan added, might look like the Cloud RAN design, which centralizes and virtualizes base station baseband processing. “As a network operator, I can use my SDN paradigm to program the network connectivity to those Cloud RAN endpoints to allow the traffic to be optimally collected and processed across the network.”

Traffic Prioritization and Security

A lot of applications of the IoT have been consumer-oriented – smart watches, fitness bands, home thermostats. While no service provider wants consumers to suffer outages, none of those are mission-critical. That’s not always the case, pointed out Arie Goldberg, CEO of Omnitron Systems Technology, which sells Ethernet and TDM devices.

“Some IoT connectivity services are static; once established, they will sit there forever and not change, like CE 2.0,” he said. “There are also dynamic, on-demand services. You don’t know where they’re going to pop from, whether it’s a car that is traveling across the highway or whether that’s some sort of pacemaker that is connecting a patient to his doctor, and he’s traveling in a train.”

Goldberg continued, “IoT brings up some very interesting issues of security, reliability, especially for those kind of mission-critical type of applications, whether those are life-support type of applications, those need to be there at very, very high priority. It’s going to be very interesting how we discriminate in favor of or against different type if IoT traffic to give priority to the ones that are more critical than others, like fire department services, instead of streaming a movie. Sometimes sufficient network resources won’t be available for everybody.”

Ciena’s Ranganathan added, “There will be certain security embedded in edge devices, such as the ability for the device to use an IPSec tunnel. There are chipsets available that can support a secure tunnel creation. That secure tunnel could terminate at a required server endpoint, which is in a controlled environment so nobody can hack into it.”

He cautioned, however, at the limitations of that approach. “Consider smartphones. There are many possible ways of connecting to the phone, such as WiFi and cellular. My WiFi router at home could be very secure, controlled by me, but my LTE uplink could be a nice open gateway to come and hack my phone, record whatever, or even hijack my camera.” The consumer, he pointed out, has no control over the security of the cellular connection.

“Security is the number one thing,” said Wedge Networks’ Zhang. “What are the potential breaches, potential vulnerabilities? In the Internet of Things, there’s data acquisition and also there are devices that cars can be driven, drones can be flying and many, many other things. In the middle of this is the correlation of sensor information to physical information. That means that damage can escalate very, very quickly beyond data theft into real-world harm.” That’s not theoretical, he continued, pointing out that the United States power grid has been vulnerable for years.

As a point of reference: In 2012, the U.S. Department of Homeland Security reported 198 attacks against critical infrastructure in the United States – several of which were successful.

The Role of SDN, NFV, LSO and Standards

“If you look at services providers today, they’ve got connectivity services that already enable IoT applications,” said Anthony Peres, Marketing Director at Alcatel-Lucent, a networking equipment manufacturer. “That being said, in order to broadly support the onslaught of IoT applications, there is a need to evolve to what we call cloud-era networks. SDN and NFV play a role to make these networks more agile, as well as deliver high-performance.”

Peres nailed the subject right on the head: “If you don’t have visibility into the resources you have available within your network infrastructure, how can you provision a service and make sure it’s actually going to work? How can you guarantee the actual performance that you need? That aspect of unifying service automation with network optimization will make it faster to provision and guarantee dynamic services.” “Not only that,” he said, “but SDN and NFV will enable the gathering of analytics to get information on what the network is actually doing, and allow for changes so that performance is ensured.”

CENX’s Timlin said: “That’s absolutely true. Of course service providers have to find value; in order to participate in the value from these machine-to-machine applications, they actually have to show more value, going beyond layer two to layer three, and really using the full capabilities of network policy control, deep packet inspection, and so-on to understand that consumer behavior. And that’s also where the analytics comes in and marrying that with the network events with lifecycle service orchestration.”

Wedge Networks’ Zhang called for standardization to address the concerns that network operators have with the IoT ranging from intercarrier service provisioning, performance management and security. “Device manufacturers and network service providers need the IoT to be standardized so that there is no gap in between service layers.”

Zhang referenced the work of two industry organizations, the MEF, which is building specifications for end-to-end multicarrier lifecycle service orchestration (LSO), and OpenCloud Connect (OCC) which is defining standardized cloud services. “The MEF and OCC are coming up with use cases and interoperability and compliance requirements, so that we can actually form a safe computing environment for IoT. Security breaches go for the weakest link, so that’s why standardization is very important.”

CENX’s Timlin agreed: “The IoT is creating so much volume and additional data that LSO is needed to manage virtualized network functions (VNFs). The MEF is extending, for example, the service information model to take into account attributes for VNFs. That’s really critical, because service providers are going to need to extend their capacity in a very flexible way to take into account all this volume, all the different applications. And they can only do it cost effectively with NFV.”

She added, “The most important piece from my perspective is really taking into account virtual network functions. Also, it applies to SDN, because SDN enables the central control for programmability of VNF service chaining, so when you’ve got multiple services, one right after another, that also has to be taken into account for end-to-end management and orchestration.”

insightsoftware.com’s Robertson added, “With the Internet of Things, there’s a real opportunity just to be a really effective network and partner with the service providers and those cloud service providers. You’re dealing with these kinds of devices. You’re dealing with these kinds of schedules to optimize the network. You’re dealing with mobile and stationary devices providing different types of data profiles. Here’s how we’re going to deal with it, and the kind of security that we’re going to provide. And the end result is just a much more rapid adoption of the Internet of Things.”

To see the original article, please see Singapore Business Review.

Singapore Business Review

Posted in Industry News, Latest Security News, Wedge News | Tagged , , , | Leave a comment

MEF Announces 21 Participants in 12 Proof of Concept Showcase Demonstrations at GEN15

No Gravatar

Showcase is the Centerpiece of the World’s Premier Networking Event Focused on Dynamic Third Network Services Powered by LSO, SDN, NFV, and CE 2.0

September 22, 2015 11:38 AM Eastern Daylight Time

LOS ANGELES–(BUSINESS WIRE)–The MEF is pleased to announce that 21 companies in 12 participant groups have been selected to showcase interactive Proof of Concept (PoC) demonstrations of new service & technology innovations enabling the future of global networking. The live Proof of Concept Showcase will be the focal point of the GEN15 event (www.gen15.com) being held on 16-19 November 2015 at the Omni Hotel in Dallas, Texas. The GEN15 Showcase will feature leading-edge implementations of dynamic Third Network connectivity services with LSO (Lifecycle Service Orchestration), SDN, NFV, and CE 2.0 (Carrier Ethernet 2.0) innovations.

Selected Showcase participants and themes are listed below and can also be found on the PoC Showcase page on the GEN15 site:

  • AT&T: Demonstrate Network on Demand services built on software-defined (SDN) and virtualization (NFV) technologies that allow customers to control, scale, and add new services via direct self-service access.
  • RAD, Sandvine, CenturyLink: Demonstrate how communication service providers can deploy application-aware network policy control (Layer 7) in conjunction with Layer 2/Layer 3 SLA assured services for a richer business application experience and greater operational efficiency.
  • Ciena, Colt Technology Services: Demonstrate multi-domain lifecycle service orchestration of virtual CPE (vCPE) virtual network functions (VNFs) across an NFV-ready data center infrastructure and an SDN-enabled Carrier Ethernet WAN. This Colt-sponsored, multi-vendor PoC showcases an open and future-proof architecture that allows network operators to efficiently integrate best-in-class VNFs, as well as to rapidly develop and operationalize innovative new NFV-enabled Carrier Ethernet business services.
  • Accedian, Cox Business: Demonstrate innovative outdoor strand-mount small cells as-a-service and turn-key indoor backhaul solutions that integrate Carrier Ethernet LSO automation and elastic bandwidth with automated deployment, provisioning, service activation testing, and QoS monitoring. Will showcase how Carrier Ethernet can ubiquitously enable the small cell business case.
  • ADVA, Time Warner Cable Business Class: As communication service providers eye the revenue potential of fast and agile service activation facilitated by NFV, they are looking for a seamless evolution path from existing networks and operational processes. PoC participants will demonstrate how MEF-principles can form the basis for optimized NFV performance when combining CE 2.0 demarcation technology with VNF hosting capacity and intelligent supporting functions on the basis of open interfaces and open-source software.
  • PCCW Global: Demonstrate one-stop-shop for network connectivity and cloud services with event-driven bandwidth adjustments. The solution is based on an open-framework approach enabling future integration with other network service providers and public cloud service providers.
  • CENX: Highlight the criticality of LSO-enabled dynamic assurance when machines are connected across a hybrid physical and virtualized core network. Without real-time monitoring, troubleshooting, and service restoration LSO capabilities, essential applications, such as home surveillance, are rendered unreliable.
    Cisco: Demonstrate implementation of the Third Network, featuring CE 2.0 Lifecycle Service Orchestration through SDN over a self-healing infrastructure that includes physical and virtual network elements. Will showcase the business benefits of automating service lifecycle orchestration through integrating SDN into the Carrier Ethernet infrastructure to achieving service agility.
  • Oracle Communications, Infovista, Juniper Networks: Inspired by the MEF’s Third Network Vision, will demonstrate real-time, zero-touch lifecycle service orchestration and assurance of a multi-site ELAN service over multiple operator networks with physical and self-adjusting NFV components (vCPEs and vPEs), fully integrated into the service providers’ critical business processes to deliver the ultimate NaaS customer experience.
  • MRV: Demonstrate distributed NFV utilizing cloud-based multi-factor authentication. Security is often a concern within a distributed NFV environment; however, adding multi-factor authentication via a cloud service provides enhanced security with ease of use – eliminating the need for resources to build and integrate the authentication service into an internal system.
  • WebNMS, Omnitron, Veryx: Demonstrate lifecycle service orchestration of an SDN-managed data center and a CE 2.0 WAN network, providing: elastic service creation and delivery; automated service turn-up testing & active performance monitoring; dynamic bandwidth on-demand; OpenMUL-based software abstraction of network control plane & data forwarding plane; and a cloud-based self-service customer SLA portal.
  • Wedge Networks: Demonstrate on-demand security services delivered through a service provider network using NFV and cloud orchestration capabilities.

“The Proof of Concept showcase will feature service and technology innovations that deliver on the MEF’s Third Network and LSO visions in relation to CE 2.0, SDN, and NFV,” said Nan Chen, President of the MEF. “The response to our call for participants was exceptional, with more than 30 companies involved in the submission process. We thank each collaborating group and the individual organization for participating. We congratulate the companies who have been selected and look forward to seeing all of these PoC demos in action at GEN15.”

PoC Showcase participants were required to submit proposals based on interactive, on-site, and live networking that demonstrates new and upcoming implementations. Detailed Showcase profiles will be made available on the PoC Showcase page in the near future.

For questions about the PoC Showcase, please contact Bruno Giguère, Director of Product Marketing, MEF, bruno@mef.net.

For GEN15 program and sponsorship information, contact MEF GEN15 Program Director Stan Hubbard at stan@mef.net.

For more event information, visit www.gen15.com and see the main conference program here.

Register here for GEN15 and receive a 20% early registration savings until 25 September 2015. Attendance is free for qualified service end-user professionals from enterprises, businesses, government, defense, educational, or non-profit organizations.

About GEN15

With a target audience exceeding 1,250 attendees from 325+ companies, GEN15 is the must-attend annual networking event for executives and other senior professionals involved in the combined Carrier Ethernet + Third Network services & technology ecosystem. GEN15 will bring together a global array of 120+ Carrier Ethernet, LSO, SDN, NFV, and Cloud expert speakers from around the world to contribute to the event’s program and networking opportunities. Event content and peer-to-peer networking opportunities are designed to appeal to experts from retail, wholesale, and mobile service providers; cloud service providers; mid to large businesses; government & defense organizations; network solutions vendors; the press; analyst firms; investment firms; and others.

GEN15 will encompass industry-leading keynote speakers, educational roundtables, and panels with dedicated tracks for enterprise end-users; retail, wholesale, mobile, and cloud service providers; and others. This year’s event includes a special Enterprise Day in conjunction with our partner Network Computing as well as the addition of a groundbreaking LSO Hackathon sponsored by Cisco DevNet. We also are expanding popular elements of last year’s program, including the MEF Certified Professionals Convention, Verizon Partner Conference, the Proof of Concept Service & Technology Showcase, Global Media Hub, and MEF Excellence Awards program that recognizes outstanding service, technology, and professional leadership and innovation. See www.gen15.com for details.

About the MEF

The MEF is the driving force behind the $80+ billion global market for Carrier Ethernet services and technologies and the defining body for LSO (Lifecycle Service Orchestration) standards that underpin emerging Third Network services with CE 2.0, SDN, and NFV. An industry alliance consisting of nearly 220 member organizations based in 43 countries, the MEF operates through a powerful collaborative framework of service providers, network solutions suppliers, and other stakeholders to achieve CE 2.0 and LSO development and globalization objectives.

MEF’s flagship work is CE 2.0, including specifications, operational frameworks, and certification programs for services, equipment, and professionals. Visit www.mef.net for more details on these programs.

Building on fourteen years of success with Carrier Ethernet, the MEF is now focused on development of LSO with APIs to enable paradigm-shifting agile, assured, and orchestrated services over more efficient, automated networks. The MEF’s vision for the transformation of network connectivity services and the networks used to deliver them is referred to as the “Third Network,” which combines the on-demand agility and ubiquity of the Internet with the performance and security assurances of CE 2.0. For information on the Third Network and LSO download the MEF’s Third Network Vision & Strategy White Paper and Third Network Lifecycle Service Orchestration (LSO) Vision White Paper.

Contacts

USA & International PR contact:
Hannah Whitrow
Zonic Group PR
hwhitrow@zonicgroup.com
+44 7760 806 070
or
EMEA:
UWE Scholz
Zonic PR EMEA
uscholz@zonicgroup.de
+49 172 3988 114
or
Asia Pacific:
Shirley Yeh
Zonic PR Asia
syeh@ZonicGroup.com
+86 21 321 00018

Posted in Industry News, Latest Security News, Wedge News | Tagged , , | Leave a comment

Planet of the Things

No Gravatar

-By Dr. Hongwen Zhang, CEO & Co-Founder, Wedge Networks and Co-Chair of the OpenCloud Connect Security Working Group
(Published on CompareTheCloud.net, August 13, 2015)

Stephen Hawking touched a nerve when he reiterated his warning about the danger to humanity posed by artificial intelligence. In May this year he and a group of leading scientists had said:

“Whereas the short-term impact of AI depends on who controls it, the long-term impact depends on whether it can be controlled at all. All of us should ask ourselves what we can do now to improve the chances of reaping the benefits and avoiding the risks.”

Futuristic artificial intelligence may seem a far cry from today’s Internet of Things (IoT), but in both cases the fundamental problem is about the uncertainty and risks of scaling complexity. Early experiments on the interactions between very simple elements – analogous to termites obeying a few basic rules – showed how surprisingly intelligent behaviour begins to emerge as the number of elements increases. Putting an emphasis on “surprisingly” – rather than “intelligent” – means that we are not predicting some malevolent intelligence to emerge from the growing network of smart fridges, but rather that we may find ourselves facing unexpected consequences by adding billions of relatively simple devices to our already complex Internet.

Even before we get on to those surprising consequences, however, there is the all-too-predictable certainty that criminal minds are already planning ways to exploit the IoT and create new forms of cyber attack. We recently saw a smart, Internet-connected fridge sending out spam as part of a junk mail campaign that had hijacked more than 100,000 connected devices. But why should this be any more worrying than the existing threat of botnet-launched spam campaigns?

IoT – the added challenge

The first big difference lies in the sheer number of devices that could be, and eventually will be, connected. The world’s population is around seven billion people, and already there are many more devices than that connected to the Internet – although estimates seem to vary considerably. According to IDC’s estimation the number of connectible devices approaches 200 billion while the number of sensors (e.g., the accelerometer in a smart phone) that track, monitor, or feed data to those things is already more than 50 billion, with scientists talking about trillion-sensor networks within 10 years. Of those 200 billion things around 20 billion are already connected, and the number is predicted to reach 30 billion connected devices by 2020. So the first problem is not so much about the impact of any particular thing as about the possibility of unpredicted responses or vulnerabilities emerging out of sheer complexity.

The second big difference, and the one posing more immediate risk, is the fact that most of the devices now being connected are new to the IT arena. Whereas each new computer added to the Internet comes with some degree of malware protection built into its operating system, things like smoke detectors, security alarms and utility meters come from a different culture: traditionally they were either autonomous units or else, if they were connected, it was on a closed, dedicated network. Fire alarms were installed by one company, control and instrumentation networks came from a different vendor, the electricity meter was installed by the power supplier and none of these networks overlapped. While computers and IT systems have for many years been fighting off attacks, none of these simple devices joining the IoT have inherent defences and they remain wide open to cyber attack.

The risk is not only that the particular function could be compromised – say fire alarms disabled before an arson attack – but the IoT could provide a weak link or point of entry to an otherwise strong security chain. The infected fridge continued sending out spam mail without drawing attention to itself, because its normal operation was not affected. Despite this relative vulnerability, the most publicised attacks so far on IoT control systems have penetrated the system via IT: attackers using simple phishing-style means to breach the perimeter and then target privileged access accounts. As well as gaining access to databases and high value systems, this approach lets them use the same privileges to reach control systems and whole new opportunities for sabotage and cyber war.

That brings us to the third difference. A lesser difference, but potentially the most dangerous of all, is that many of the things joining the IoT have more of a direct physical role than the computers, game consoles and databanks currently populating the Internet. When the Stuxnet worm closed down some thousand centrifuges at Iran’s Natanz nuclear facility in 2010, IT departments all over the world woke up to the fact that a cyber-attack could cause actual physical damage. This was not simply an attack generating a signal to shut down the centrifuge, but one designed to force changes in the centrifuges’ rotor speeds that could lead to destructive vibrations and internal damage – causing far more serious delays to the nuclear program than any simple shut down.

A couple of years ago we heard about a breach affecting Telvent control system designed to be used with “smart grid” networks. The attackers installed malicious software on the network and also accessed project files for its OASyS DNA system – designed to integrate an electricity company’s IT network with the grid control systems so that legacy systems and applications can communicate with the new smart grid technologies. There was nothing inherently wrong with OASyS DNA: it was a highly sophisticated system in use since the late 90s, but it was never designed to connect to the Internet.

The IoT adds enormous extra scale to the already crowded internet.

Project files provide a clever way to spread malware because vendors have full rights to modify customers’ systems through the project files. The files hold a lot of customer-specific system data, so an attacker could also use the project files to study a customer’s operations for vulnerabilities in order to design further attacks on critical infrastructure. The Stuxnet attack was a sophisticated example of how a project file was studied to discover how the centrifuges were controlled and then the file was modified so that they were now behaving in a different, harmful manner.

So the IoT adds enormous extra scale to the already crowded Internet, and it also adds extreme diversity. On the one hand we are networking highly critical systems: industrial and utility grid control systems that could cause widespread damage or economic harm if breached; critical healthcare and remote medical devices containing sensitive personal data or responsible for life support; navigation and control systems for connected cars, air traffic control and so on. At the other extreme we have small low-cost monitoring devices, meters, wearable devices, simple switches for remote control of household lighting etc.

It would be unrealistic to insist that everything joining the #IOT should have its own build-in defences.

With such a range of devices it would be unrealistic to insist that everything joining the IoT should have its own built-in defences. The latest malware signature has some sixty million records and to be sure of identifying it by current pattern matching techniques would require 3-4 Gb RAM. A more sophisticated defence is provided by behavioural analysis – studying how the code behaves when quarantined in a “sandbox” environment. Such analysis of behaviour for signs of malignancy is what computer scientists call an “NP Complete” problem – or what the layperson would call “very difficult”.

Reducing operational costs is one major driver for IoT connection – so adding sophisticated cyber-security to a ten-dollar switch would be hopelessly uneconomic. There is no way that we can realistically defend the IoT on the militia model, where every device is armed against attack – so how is it possible to provide protection across such a vast and diverse cloud?

How to disinfect the Internet of Things

VASPA: Virtualization, Automation, Security, Programmability, and Analytics

Security is at the centre of the five key challenges being addressed by the OpenCloud Connect (OCC), spelled out under the acronym VASPA, namely: Virtualization, Automation, Security, Programmability, and Analytics. The OCC, established in 2013, is an industry organisation embracing every type of cloud stakeholder – including major users as well as cloud service providers, network service providers, equipment manufacturers, system integrators and software developers.

The most promising approach so far to securing the cloud, and so the IoT, is to adopt the SDN principle and consider the traffic flow as a virtual network, rather than a string of hardware elements, and so define a distinct “security layer” to orchestrate Security as a Service.

Today’s Internet has been compared to a water supply without any guarantee of purity, leaving responsibility for filtering and sterilizing the water to the customers. Internet users are expected to install their own anti-virus software, firewalls and other forms of security. Security as a Service, however would mean providing traffic that is already decontaminated – so even the most humble connected switch on the IoT could benefit from the most sophisticated security that would be provided by the network itself.

On the network scale, deep packet inspection, pattern recognition with a cloud databank for security, behavioural analysis and other costly high-level malware defences become an economic proposition. Security as a Service provides a very attractive revenue stream and the ultimate added-value proposition for building customer loyalty and reducing churn.

Security as a Service allows organisations to order whatever level or type of security is essential for their operation – knowing that it is being continually maintained, updated and providing security for all their devices.

Please see the original article at CompareTheCloud.net.

CTC_Logo_Main

Posted in Industry News, Latest Security News, Wedge News | Tagged , , , | Leave a comment

Beware Household Gadgets That Can Take Control And “Spy” On You

No Gravatar

Makers of connected devices for the Internet of Things must focus on security to protect consumers’ privacy

By Charles Orton Jones. Published on Raconteur.net on June 28, 2015

Excerpts:

“The Samsung TV incident was a massive wake-up call. An investigation in February revealed some Samsung smart TVs could be “spying on customers”. A clause in the privacy policy advised buyers that spoken words could be “captured and transmitted to a third party”. The media exploded with indignation. Orwell’s 1984 was cited in which telescreens track to citizens’ every move and word. Will your TV report you if you mention your tax affairs? Or sell leads to marketing companies if you mention product names?

When the story broke, Samsung admitted it was logging users’ activity and voice commands, but claimed users agreed to in the terms and conditions, and had enabled the function when setting up their TV. The option could be turned off.

In truth, Samsung was engaging in what many companies do, which is to learn from voice commands in order to improve the service. Use Siri on an iPhone and something similar is taking place. But the episode publicised just how dangerous it could be to install internet-connected devices.”

“Should we be pessimists about IoT? Hongwen Zhang, co-chairman of OpenCloud Connect, the industry alliance of cloud and IoT makers, says even if doubters are right, consumers will still enjoy using IoT devices. “Your above items of threat are all valid. However, the benefits of IoT overweigh all these fears. We have passed the point of no return in our evolution path with IoT,” he says.

He warns the real danger isn’t nosy governments or teenage hackers. But something more sinister – artificial intelligence.

Dr Zhang admits this: “On the speculation spectrum, the irony is that we will soon able to build terminators before we figure out how to do time travel. The evil actors may not be humans but ‘superintelligence’ as described by Professor Nick Bostrom of Oxford University in his book Superintelligence: Paths, Dangers, Strategies. Let’s hope humanity avoids those bad paths that lead to extinction.”

He adds sensibly: “We are good at finding cures.” If he’s wrong, dodgy kettles and sweary dolls would be the least of our worries.”

For the full article, please see Raconteur.net.

Raconteur_logo

Posted in Industry News, Latest Security News, Wedge News | Tagged , , | Leave a comment

ASTech Foundation – Where Are They Now? – Wedge Networks

No Gravatar

Published online by the ASTech Foundation – June 24, 2015

“To say the Internet of Things (IoT) is a diverse category of technology is an understatement. The list of IoT devices includes anything that can be connected to the cloud and, in 2015, this includes refrigerators, ovens, light switches, phones, cars and other devices that might have the word “smart” attached to it. The list is endless.

It is difficult to keep regular Internet usage safe, with researchers expecting the number of connected individuals to surpass 3.3 billion by the end of 2015. So, how do we account for these other devices that we take for granted and who is protecting them?

Wedge Networks was named a finalist for the 2010 ASTech Award for Outstanding Achievement in Information and Communications Technology Innovation for their work on web security. Since 2010, Wedge Networks has grown its operations focusing on protecting cloud-connected devices.

Wedge Networks now provides leading edge cloud security solutions to more than 18 million devices by protecting corporations, Internet service providers and individuals at the network level. This allows Wedge Networks to protect devices before intrusions affect end users and without interrupting systems along the way.”

To see the full article, visit ASTech.ca.

astech_logo_primary

Posted in Industry News, Wedge News | Leave a comment

Security As A Service Is No Longer Just A Liability

No Gravatar

Video Feature Published on ThirdNetworkNews.com – June 11, 2015

The MEF vision of an agile, assured and orchestrated Third Network promises unlimited benefits for global business, but one of the first reassurances the market will need is a promise of more consistent security – as a service, not just as a band-aid.

Third Network News provides a video in which industry experts discuss new ways of thinking about network security that align with Third Network principles. Included experts are:

  • Hongwen Zhang, CEO, Wedge Networks
  • Nan Chen, President, MEF
  • James Walker, President, OpenCloud Connect (formerly CloudEthernet Forum); VP of Managed Network Services, TATA Communications
  • Rob Ayoub, Research Director, NSS Labs
  • Iben Rodriguez, Principle Architect, Cloud and Virtualization, Spirent Communications

To view the video, please visit ThirdNetworkNews.com.

ThirdNetworkNewsLogo

Posted in Industry News, Latest Security News, Wedge News | Tagged , | Leave a comment

The Internet of Things is Here – But We Can’t Trust the Things

No Gravatar

-By Hongwen Zhang, CEO & Co-Founder, Wedge Networks and Co-Chair of the OpenCloud Connect Security Working Group
(Published on DataQuest India Online, June 3, 2015)

The Internet of Things needs secure network services through SDN and NFV – because nobody can secure the Things. Even if we try, we can’t keep the Things (better known as endpoints) secured. There are far too many mobile and wireless devices with an incredible variety of operating systems and hardware configurations. There are too many last-mile networks, from the enterprise WiFi to the coffee shop to the home to the playground. There are too many data centers, too many APIs. There are no borders. There is no trust — and there can’t be trust.

The Things cannot be secured. The best hope for preserving end-user privacy, for ensuring data integrity and for protecting devices against intrusions and corruption, is Software Defined Networking. More than that, layered on top of SDN, security implement via Network Functions Virtualization.

Let’s explore the problem, and then see why the only reasonable mass-market solution is to secure the network.

We can’t trust the Things. Smartphones, fitness bands, vending machines, thermostats, inventory control systems, weather stations, Internet cameras, WiFi routers. Who knows about the security of the device’s firmware and operating system? Think about hacked debit-card machines in retail stores. Think about Lenovo laptops with Superfish. Not good!

Many devices have no security or obsolescent encryption. Many can’t be updated, and many won’t be updated even if patches are offered. Let’s not even think about the devices where the password remains set to the factory default – a problem that’s plagued the industry for decades. Even when devices offer some sort of user authentication via software, it cannot be trusted. We have no idea who is using that device, or who might be watching its data.

We can’t trust last-mile networks. Airports, airplanes, coffee shops — we are all aware of the threat from sniffers watching for unencrypted data (such as logins and passwords). Man-in-the-middle attacks are not theoretical.

Compounding the challenge: In an IoT scenario we may not even be able to identify the networks handling the last mile or even 10 miles. We certainly can’t find that out from a cloud data center.

Packet headers from fitness bands or point-of-sale systems will reveal an IP address, but we don’t know who carried that packet, and if that carrier is trustworthy.

We can’t trust data centers and APIs. A data center is a black box. We know that data went in, and we know that data comes back out. What’s happening inside? Nobody knows. Whether the data center is in the cloud, at a host provider, or inside a corporate data center, there is no way of determining who has access to the IoT data. When we consider the range of IoT applications, from off-the-shelf health monitoring to bespoke instrumentation, it’s impossible to determine exactly which services are back-ending any particular product or service.

Today’s super-interconnected world of APIs (Application Programming Interfaces) adds to the uncertainty. Many cloud applications rely upon multiple cloud providers today, and that number is increasing. Free and paid APIs are increasingly attractive to developers. I predict that within a few years, we’ll find numerous security holes and breaches that were enabled both by cloud-to-cloud transactions and by the use of malicious (or hacked) web APIs.

We can’t protect the border when there is no border. The definition of a network has become increasingly nebulous. Long gone are the days when we could secure the intranet with a firewall appliance. The Internet of Things encompasses devices that would be inside the traditional intranet, but also outside. Homes. Customer sites. Employee smartphones that are on the enterprise WiFi one moment, and outside on WiFi or cellular data five minutes later.

This is the problem in a nutshell: We can’t trust the integrity of the end device’s security. We can’t determine exactly where the data is being processed and stored. We can’t reliably predict how the IoT device is connected to the back end, and what security looks like on those ever-changing pipes. And we can’t even define a secure perimeter to surround the Internet of Things.

The best way to secure IoT is by securing network services. Old approaches of heavy iron rigid security systems cannot be effectively used to provide enterprise grade large scale security coverage in network services due to high cost of deployment and management. SDN/NFV not also solves such high cost issue but also promises a much agile service provision process by dynamically defining the network that connects the IoT end devices to the back-end data centers or cloud services. At first, SDN may be implemented primarily in the cloud or the data center, and then expand to encompass carrier networks. At some point, it even may reach out or into the last-mile network, though that is years in the future.

Where SDN is implemented, Security-as-a-Service can be defined using NFV, providing the service provider with a measure of control and confidence that although the IoT devices can’t be secured, the network can be bound together into a single virtual network. Forget about fiber, cable, WiFi, cellular data. Think instead of secured VPNs, implemented even where traditional VPN technology isn’t supported.

Please see the full article at DataQuest India Online.

Dataquest logo

Posted in Industry News, Latest Security News, Wedge News | Tagged , , , | Leave a comment

Can You Answer These 4 Questions About Your Network Security Policies?

No Gravatar

By Alan Zeichick, NetworkWorld, May 26, 2015

“Network security doesn’t have to be expensive, and it doesn’t have to be complicated. Yes, there are lots of excellent products, service and consultants ready to help improve your network security, and yet that shouldn’t be the first place an organization goes to prepare against hackers, insider threats, data loss and malware. Fancy new technologies won’t help if you’re not focusing on the roots of good cybersecurity. Let’s talk about some of the most important questions that people rarely ask about cybersecurity, perhaps because they seem so simplistic.

We all know that it doesn’t matter how good a home security system is if someone leaves the garage door open overnight – and a pricey car alarm doesn’t help if the keys and clicker are left in the ignition, and the car window’s open.

Here are four questions that reflect a foundation of security management. Your answers may help set the foundation of a solid security posture.

1. Are the network’s security policies up to date?

Creating a comprehensive security policy can be a nightmare. Endless meetings with stakeholders. Wheeling and dealing between IT and line-of-business management. Striking and re-striking the fine line between approving a policy that’s overly broad, and specifying so many minute details that the policy becomes too hard to implement. Not only that, but there are pressures to make policies as broad as possible to provide the least inconvenience to employees (and their managers who don’t have patience for such matters).

Like someone who buys a snazzy new smartphone only to see its twice-as-cool replacement announced the next day, once security policies are finished, those policies are almost immediately out of date.

Applications become decommissioned – and yet the application’s access ports remain active. New use cases are brought before the IT department. New on-premise applications go online, while some line-of-business departments write shadow contracts with cloud services providers. Are those covered by the security policy? Painful though it may be, security policies must be kept up to date, not only through regular reviews, but also by a process of actively amending the policy before security configurations are changed.

2. Are security configuration changes driven by security policy?

Continuing in that vein, there are myriad areas where security-related configuration changes are applied on a network. Firewalls and Intrusion Detection / Prevention Systems (IDPS) like those from Cisco or Wedge Networks are one area; change management systems like those from AlgoSec or Firemon are another.

There’s more to network security, though, than firewalls. Organizations need to configure policies on servers like Oracle or Microsoft Exchange; identity systems including Firebase or Okta; network routers and Wi-Fi access points; Virtual Private Network (VPN) servers, cloud-based applications like HubSpot or Salesforce.com; and of course, on-premise file and application servers.

Beyond routine moves, adds and changes to accommodate new employees or projects, changes to security settings in any of those areas should be policy-driven. When an application comes online, goes offline, or moves to another security zone on the network, the first step should be to document it within the security policy, while checking for conflicts or contradiction. Then, and only then, once changes to the policy are understood and approved, should administrators be allowed to make changes to firewalls, access control lists, Virtual LAN (VLAN) configurations, and so-on.”

For the full article, please visit NetworkWorld.com.

nwlogo10

Posted in Industry News, Latest Security News, Wedge News | Tagged , , | Leave a comment