Carriers ignore security in next-gen networks

A survey from IBM this week indicates less than half of the carrier community have strategies in place to protect the next-generation networks they plan to roll out over the next five years.

The survey, which was released less than a month after IBM announced it was investing $1.5 billion in computer security products, comes just days after the company unveiled its next generation data protection software that’s being aimed at both enterprise customers and small-to-midsize businesses.

The survey was conducted among more than 65 telecom carriers worldwide by IBM Internet Security Systems. It shows that roughly 85 per cent of carriers plan on rolling out NGN architecture within five years, and that 87 per cent believe that NGNs will fail without strong security to protect them. However, when asked whether they had developed a strategy for protecting their NGNs from attacks, only 46 per cent of the respondents said that they have.

Clarence Morey, director of marketing development for IBM Internet Security Systems, says he can’t say for sure why less than half of telcos surveyed don’t yet have plans in place to secure their NGNs, but speculates that they’re more concerned with upgrading their services first and then upgrading security as they go.

“It’s clear to me that companies that don’t yet have a security plan in place need to get started,” he says. “A lot of telcos need to make decisions and morph their strategies in a matter of months, and they’ve been accustomed to doing it in a matter of years.”

Counse Broders, a senior research director at Current Analysis, expresses a similar view. “Security is a key ingredient for carriers as they move into next generation services and solutions,” he says. “Clearly, those providers without a security solution in place risk losing their competitive edge.”

In addition to its findings on telcos’ preparation for NGN security, the survey also found that telcos believe mobile device endpoint compromise poses the biggest threat to NGN security, followed by core IMS network compromise and IMS multimedia application threats.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now