Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
8Activity
0 of .
Results for:
No results containing your search query
P. 1
IBM Telecom Core Infrastructure

IBM Telecom Core Infrastructure

Ratings: (0)|Views: 298|Likes:
Published by tranceforge
IBM Telecom Core Infrastructure Security Solution
IBM Telecom Core Infrastructure Security Solution

More info:

Published by: tranceforge on Dec 25, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

03/14/2011

pdf

text

original

 
Solutions for Telecom Infrastructure Security 
IBM Telecom Core InfrastructureSecurity Solution
Optimizes operational security systems investments 
Reduces time to market for new security services to customers 
Addresses the security in the “cloud” 
Highlights
Changing dynamics in the telecomsecurity landscape
Significant changes have occurredin the telecommunications (telecom)security landscape. From embeddedworms traveling in the communicationclouds and infecting scores ofnetworks to denial of service attacksthat are designed to disrupt commerce,malicious attacks over the Internethave historically been targeted at “end-points” through their telecom links.The burden of protecting against theseattacks is falling more and more on theowners of these telecom networks.In the past, there was no need fortelecom service providers to providesecurity for the connections thatend-point customers used to accessthe Internet. The telecom role hastraditionally been that of “a purveyor ofbits.” End-point customers would buybandwidth, and would pay for it by thebit—regardless of whether those bitswere clean data, viruses, or worms.
The IBM Telecom Core Infrastructure Security Solution monitors and manages the health of both the network elements and the actual traffic itself from a single, integrated system.
Addresses end-to-end security: networks, systems, users 
Addresses increasing customer demands and Service Level Agreements 
Provides integrated and reusable components 
 
The burden of responsibility betweenthe user, enterprise, and telecom hasshifted. Let’s take a closer look at thesechanging dynamics.
Evolving relationship between user,enterprise, and telecoms
The first of these dynamics is drivenprimarily by the changing role of thetelecom. As the average revenue peruser for traditional voice service hasdeclined, the telecom industry hasre-directed its efforts into launchingand delivering a full suite of IP-basedservices.Some examples of IP-based servicesare Voice over Internet Protocol (VoIP),Internet Protocol Television (IPTV),Push to Talk, and instant messaging.This change in focus is magnifiedby the consolidation of wireline andwireless carriers as service providersrace to deliver “any service on anydevice.”Now that telecoms are themselvesIP service providers, they are also,by definition, end-point owners.Therefore, telecom assets are now justas vulnerable to attack as any otherend-point device. In fact, an entirelynew breed of attack has emerged, onethat is specifically designed to cripplekey IP service components such as SIPproxy servers (used for VoIP and IPTV),DNS servers, and even the networkrouters themselves.As telecoms surveyed the landscapeof available technology for securingtheir infrastructure, they found newlyevolving network elements that canhelp secure a carrier-class networkcombined with enterprise-classappliances.
Shifting burden of managing thecomplexities of defending against attack 
The second of these dynamics isdriven by the dramatic accelerationof the frequency, sophistication,and malevolence of attacks. Thisacceleration and its substantialincrease in complexity have severelytaxed the ability of enterprisecustomers to defend their networkseffectively. In addition, IT managersmust now protect against threats frominside their network and not just fromthe outside.Despite their investments in securitytechnology, most customers can onlyhope to identify an attack after it hasoccurred and try to prevent the sameattack from occurring more than once.To that end, enterprise customers arenow expecting their telecom vendorsto shoulder a significant portion ofthe load. They are demanding “cleanpipes” from their service providers, andthe service level agreements (SLAs)from the telecoms are reflecting thosedemands.SLAs that once triggered smallpenalties for passing infected trafficcan now cost the telecom a month ofbandwidth charges per instance or,in some cases, even more. Moreover,as bandwidth prices become acommodity, aggressive SLAs havebecome a much more prominent tool inthe competitive arsenal of telecoms asthey try to attract new customers.To meet the diverse security demandsof their enterprise customers whiledriving additional revenue, telecomsare beginning to offer managedsecurity services. These servicesrequire that the technology used tosecure their own core be extended toreach out to the enterprise and workwith the security components alreadyinstalled.
Requirements for a comprehensivesecurity protection solution
Telecom service providers cannotwait for emerging network elementsto develop because attacks arecontinuously experienced. Some areonly being reported after the damagehas been done. A comprehensive“security protection” solutiontherefore must meet the needs ofboth core telecom carrier securityand downstream enterprise securityeffectively. To do so, it must have thefollowing attributes:
2
 
 A unified view of the network
with theability to perform real-time analysisof all the traffic on the network whilesimultaneously understanding theunderlying infrastructure through acombination of discovery and eventcollection
 Both macro and granular visibility of traffic and network elements
formonitoring the behavior of thenetwork as a single entity while alsoproviding full-packet capture andforensics capabilities down to asingle IP address
 Full correlation that can span alltraffic and network elements
withthe ability to detect even the mostdistributed of attacks with extremelyhigh accuracy and very low falsepositives or negatives
 Flexible attack mitigation
to supportboth manual and automatic forms ofattack mitigation, providing accesscontrol similar to a circuit-switchnetwork for the operator
Superior reporting and managementcapabilities
with a managementconsole that can provide a single,unified view of the health of all trafficand network elements, flexible pre-configured reports, and real-time,dashboard-style reports
 Robust storage capability 
to meet thestorage requirements of historicaland trend analysis
Scalability 
to meet the demandsof large, highly distributed carriernetworks
 Flexibility and customization
thatincludes configurable reporting, aconfigurable user interface that caninterface with any network element,and the ability to create customalgorithms to detect any type ofanomaly
IBM Telecom Core InfrastructureSecurity Solution
The IBM Telecom Core InfrastructureSecurity Solution monitors andmanages the health of networkelements (or the cloud) and the actualtraffic itself from a single, integratedsystem. It features a powerfulcombination of technology designedto detect virtually any malicious threator network anomaly, no matter where itoriginates.From worms and viruses propagatingfrom outside the network perimeter toinsider threats emanating from withinthe network, this solution can detectthese threats early and accurately.In addition, the Core InfrastructureSecurity Solution features powerful,flexible mitigation options that networkoperators can use to take action andenforce policy either manually orautomatically. This solution is scalableto meet the demands of large, highlydistributed carrier networks.The solution features three corecomponents. IBM Tivoli® SecurityOperations Manager provides themonitoring and correlation of theelements found in the network whileNarusInsight™ Secure Suite (NSS)provides similar monitoring andcorrelation of the network traffic itself.IBM Tivoli Netcool® then acts as themanager of the managers by providingan additional tier of correlation betweenTivoli Security Operations Managerand NSS. User interfaces for reportingand portal access are provided byNetcool Impact and Webtop.
• Complete monitoring of both IP trafficand network elements
With the Tivoli Netcool Precisioncomponent, the Core InfrastructureSecurity Solution can provide flexible,automated discovery of all Layer 1, 2,and 3 devices in the IP network fromthe transport layer optical devices torouters, switches, and IP addresses.Netcool Precision generates anaccurate up to date inventory ofdevices, systems, and applicationswithin an infrastructure.
3

Activity (8)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
bharak liked this
go2gaurav1335 liked this
Rajesh Kannan liked this
Rajesh Kannan liked this
draacon liked this
jopangs_69 liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->