SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
In Search of New Streams Parviz Iskhakov
March, 2016
The Digital Telecom Security Services
• Growth in traditional telecom in developed and
developing markets is stagnant with declining ARPU and
prices.
• The OTT players are long affecting CSPs by substituting
voice and messaging services, placing significant strain on
the CSP data networks and grabbing consumer mind
share, and thus weakening the CSPs’ relationship with
their user communities.
• Thus, CSPs find themselves under increasing pressure, they
not only want to protect their core business and their
relationship with consumers, but have to seek new revenue
opportunities in nontraditional markets.
• CSPs are beginning to partner with alternative partner types
to fill gaps in their service portfolios and accelerate the time
to market of new services. In contrast to aggressive,
competitive and alienating tactics to address OTT vendor
threats, CSPs can benefit substantially from pursuing these
more collaborative approaches.
SMS and OTT Messages
New Digital Domains CSPs are Focusing on
The figure is approximate and is
based on Gartner’s research
- Market trends: Eight
innovative CSPs embark on
digital service
transformation
- CSPs’ market trends and
digital transformation
strategy
82%of U.S. business executives are
worried that cyber threats could
impact their companies’ growth
prospects
10%of organizations are fully
confident that their connected
devices secure
Source: AT&T
Security in the Smartphone Era
• Market research firm Gartner says global spending on IT security is set to
increase 4.7 percent in 2015 to $75.4 billion, and the world will spend $101
billion on information security in 2018.
• The cyber security market is estimated to grow to $170 billion (USD) by 2020, at
a Compound Annual Growth Rate (CAGR) of 9.8 percent from 2015 to 2020,
according to a report from Markets and Markets. The aerospace, defense, and
intelligence vertical continues to be the largest contributor to cybersecurity
solutions.
$101 Bn
IT Security
Spendings
$170 Bn
Market
• The British insurance company Lloyd’s estimates that cyber attacks cost
businesses as much as $400 billion a year, which includes direct damage plus
post-attack disruption to the normal course of business. Some vendor and media
forecasts put the cybercrime figure as high as $500 billion and more.
• Сyberattacks could cost up to $90 trillion by 2030 if cybersecurity fails to
advance at a rapid pace. Atlantic Council and the Zurich Insurance Group
$90 Tn
Damage till 2030
$400 Bn
Damage a year
Security Concerns Rise Across the World with Rise
of Scale of Cyber Threats
TechSci Research says the banking and financial
services sector has been the prime target of
cyber criminals over the last five years, followed
by IT & telecom, defense, and the oil and gas
sector.
No vendor or user of computer technology is
immune from a potential cyber security incident
The Essential Guide to Industrial Cyber Security, Honeywell
Recent large-scale cases include Sony’s breach,
attacks on Lenovo and other companies such
as JPMorgan Chase and Home Depot.
Most businesses think they are too small to be
the victims of a cyber attack. But that is not the
case since they are victims of hacking either for
their own data or because they are the weakest
point of entry in a digital information supply chain.
Days of Just Securing the Perimeter are Over
• Wireline operators tend to suffer the greater
exposure, particularly when they host IT
infrastructure or provide managed security
services for enterprise customers.
• So do mobile operators with their huge customer
bases. CSP’s customers are exposed to data
exfiltration, denial of service, fraud and all the
other attack vectors.
• Cloud and IoT services significant growth is
putting even more pressure on service providers
that have to craft their strategies in the age of
cyber insecurity.
It’s Time for the Secure Pipe
• The standard service-level agreement for years allowed
that CSPs just push the traffic in and out. To pass traffic,
not pass judgment. CSPs didn’t usually touch it.
• Some CSPs however has been quietly getting permission
from its customers to stop certain kinds of traffic altogether.
Number of businesses have signed up to have the CSP to
filter out spam, viruses, DDoS attacks and other malicious
activity behind the scenes, before the traffic touches their
enterprises.
• The “productization” of security services will take time
though to catch up with vertical leaders. The final task will
be the “clean pipe” with fewer risks with a bill attached. This
will force transformation from “dumb pipe” to smart one.
CSP’s Security Services Portfolio
92%of the 100K security incidents
studied from the past ten years
can be described by just nine
basic patterns
1. POINT OF SALE INTRUSIONS
2. DENIAL OF SERVICE ATTACKS
3. CRIMEWARE
4. WEB APPLICATION ATTACKS
5. INSIDER MISUSE
6. MISCELLANIOUS ERRORS
7. PHYSICAL THEFT/LOSS
8. CARD SKIMMERS
Source: Verizon
Mobility and End-
Point Security
Hybrid cloud
security
Next Generation
Perimeter Solutions
Application Threat
Protection
Advanced Malware
Protection
Discovery Security
Analytics
Social Engineering
Protect the network and endpoints from both known and zero-day malware
The ability to protect hybrid cloud environments and identity business risks
associated with SaaS usage
Deploying next generation network perimeter solutions to identify and mitigate
application threats
Detect and remediate application vulnerabilities and prevent malicious hacks and
attacks
State-of-the-art sandboxing technology helping protect against hacks that bypass
signature-based controls
Correlating a diverse set of security, network and application event data to improve
understanding of normal and discover first seen problems – the unknown unknown
Ensuring adequate security awareness in-house and appropriate procedures in
place
CSPs Security Services Value Chain
• Endpoint Security
(including mobile security)
• Server Security
• E-mail Security
• Network Security
• Cloud Security
• Anti-Phishing, Anti-
malware, Antivirus
• Perimeter Solutions
• Application Security
• Security Analytics
• Monitored or managed firewalls or
intrusion prevention systems (IDS/IPS)
• Cloud, mobile and web assets (DDoS
protection, email security, web filtering)
• Security information and event
management (SIEM)
• Need more advanced services such as
real-time and batch security analytics
• Reporting associated with
monitored/managed devices and
incident response
• Security compliance
and consulting
services
• Security design and
architechture services
• Security audit and
assessment services
• Professional services
• Managed services
• Cyberdefence
solutions
Point Products Managed Security Services
Information Security
Consulting Services
Consumer
Ad hoc Security
Services
Security Services
Bundle
Network Security
Services
Fully Managed
Security Environment
Level of
Strategic
Partnership
with the
Customer
Why MSSP solutions are good for Businesses?
• Managed security services are the network security services that have been outsourced to a service
provider. A company providing such a service is a managed security service provider (MSSP).
• According to recent industry research, most organizations (74%) manage IT security in-house, but 82%
of IT professionals said they have either already partnered with, or plan to partner with, a managed
security service provider.
• MSSPs offer better resources, scalability, and talent - all for a cheaper price. So cost is the major
reason. Chief Information Security Officers looking to security services cite cost reduction as a top
factor, with 62% of CISOs listing this as an important or very important reason.
• Other important issues include flexibility, expertise, global coverage and advanced technology.
• CISOs want trusted, strategic partners. Information security is an activity built on trust. MSSPs that
understand this develop strong supporting partnerships with their clients and help them overcome their
biggest security challenges.
• Forrester believes that the relationship between CISOs and MSSPs will continue to deepen. As the
MSSP demonstrates competency and even proficiency in certain areas, the partnership will quickly
develop from an ad hoc relationship to a fully managed security IT environment.
• Advanced technologies, such as threat intelligence and correlation, drive future demand.
Sophistication of new threat intelligence technology to detect intrusions with a rapidly changing threat
landscape discover a need for solutions capable of detecting suspicious activity and need to receive
alerts in near real time. Forrester believes those MSSPs that get this right will have a huge advantage
in the market during the next two to five years
Trust
Global
Coverage Flexibility
Cost
Real-time
Detection
Advanced
Technology
82%Of Chief Information and
Security Officers partnered or
plan to partner with MSSPs
Why MSSP solutions are good for Businesses?
Source: Trustwave
Global Leading CSPs Clearly Show the Potential for
CSPs in Security Domain
• Verizon is a top telecommunications provider with a very large North American
presence, with more than 2,000 unique clients in the region. Verizon employs one of
the largest security teams in the market with an aggressive recruiting strategy.
• Verizon emphasizes the business value and cost-controlling aspects that it delivers
through managed security services and helps clients allocate resources to the most
critical assets through its enhanced risk-based correlation engine.
As a large, North American telecommunications provider, AT&T has one of the largest
customer bases, with more than 1,200 unique customers in the region. AT&T has an
aggressive threat intelligence program and scans more than 25 petabytes of data
travelling over its networks daily. AT&T focuses on threat detection with strong network
infrastructure and perimeter defense offerings, including robust log monitoring and
analysis features. Areas of improvement were its customer portal and reporting features.
• BT's MSS offerings include monitoring and management of customer premises
deployed devices and network-based security controls as part of its larger portfolio of
telecommunications and IT services. BT uses self-developed technology for log and
event collection, correlation, query, reporting, and device management.
• NTT has a global presence as well as a broad range of security service
offerings and delivery options, in addition to broader telecommunications and
IT infrastructure service offerings.
• Headquartered in Paris, with offices in Atlanta and Singapore, Orange offers a broad
range of telecommunications and cloud-based IT infrastructure services, security
consulting and integration services, and MSSs. Orange MSSs are based on
commercial SIEM technology for data collection, correlation and analysis, reporting,
and log management, with self-developed technology for workflow.
Gartner
Forrester Wave: Information Security Consulting Services, Q1 ‘13
But Still Much in CSPs To-Do-List to Gain Leadership in
Information Security Consulting Services Though
Only two CSPs were included in Forrester Wave Information Security Consulting Services.
• Verizon demonstrates strong incident response skills, but lack of global coverage is
restrictive.
• Verizon has battled to gain brand awareness within the security consultancy space and
has succeeded thanks to its incident analysis and strong PCI practice. Although some of
the company’s higher-level solutions (for GRC and strategy, for example) may not be as
sophisticated as those of larger competitors.
• The company does offer a wide range of solutions, including strong offerings in
application security, biometrics, DLP, and IAM, many of which it will also subsequently
operate.
• Client feedback stressed the flexibility of the Verizon consultants and its strength in
incident response; areas of potential improvement included Verizon’s comparatively low
number of consultants (just over 400) and weak global coverage, as well as challenges
with internal collaboration and communication.
• BT Global Services delivers pragmatic solutions, with a focus on technology.
• BT was the other organization that stood out because of its unique perspective and
approach to client engagement; the company’s spokespeople come across as very
honest and candid, suggesting that clients are likely to receive straightforward advice,
even if it meant BT recommending a course of action that BT could not support.
• BT focuses on the delivery of predefined security service packages and does not offer
regulatory- or compliance-related services.
• Although BT’s staff is relatively small and inexperienced (with an average of fewer than
five years of experience), the company has a strong presence in the UK and continental
Europe.
• BT plays to these strengths, ensuring that the customers receive high-value consulting
using strong security technology solutions.
Forrester Wave: Information Security Consulting Services, Q1 ‘13
Approaches to Unlocking the Cyber Security
Potential
Build
Buy
• Orange – Atheos
• Singtel – Trustwave
• Telstra – Bridgepoint and O2 networks
• Telstra – Docusign
• Telefonica - Blueliv
• DT – Cyphercloud, Zenguard, Lockout
• Network Security – Fortinet, F-Secure
• Endpoint Security – Lookout, McAfee,
Symantec
• Cloud Security – Symantec, Akamai
• Cyberdefence – FireEye, AllienVault
• Professional Services – IBM, HP
CAPEX
consumption
OPEX
consumption
Time-to-Market
Partner
Market Cases
Security Services Portfolio and Partnerships
leveraged. AT&T Case
• AT&T has partnered with Cisco for the home
controller, plus other specialist vendors for service,
components, and installation. Service Innovation
Digital Life is AT&T’s new consumer
home security and home automation service.
• AT&T partners with Juniper for Mobile Security. It
will help to manage personal or enterprise-owned
devices, enable anti-virus, anti-malware, and
application monitoring and control.
• At the center of AT&T's partnership with AWS is its
NetBond offering, which the company describes as
a "network-enabled cloud solution.
• AT&T also partners with security app provider
Lookout in order to protect AT&T Android devices
from app-based threats. Lookout's
Mobile Security software is expected to be installed
on most AT&T Android phones moving forward.
• AT&T Government Solutions selected Aviat
Networks as its microwave communications partner.
AT&T Government Solutions is a proven solutions
integrator, with expertise in areas such as
Cyber Security, Network Solutions, Application.
AT&T Security Services Portfolio
The Digital Telecom Security Services
In Search of New Streams
Thank you!
Should you have any questions or feedback please contact me,
Parviz.Iskhakov@gmail.com

Contenu connexe

En vedette

Differentiating Your Telecom Cloud
Differentiating Your Telecom CloudDifferentiating Your Telecom Cloud
Differentiating Your Telecom CloudEduardo Mendez Polo
 
How to build bulletproof communication strategy with measurement tool
How to build bulletproof communication strategy with measurement toolHow to build bulletproof communication strategy with measurement tool
How to build bulletproof communication strategy with measurement toolCommetric
 
The Digital Telecom. Cloud Services
The Digital Telecom. Cloud ServicesThe Digital Telecom. Cloud Services
The Digital Telecom. Cloud ServicesParviz Iskhakov
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies
 
Content Marketing 101 - Strategy, Design, Delivery
Content Marketing 101 - Strategy, Design, DeliveryContent Marketing 101 - Strategy, Design, Delivery
Content Marketing 101 - Strategy, Design, DeliveryEvgeny Tsarkov
 
The OTT phenomena and its impact on Telecos
The OTT phenomena and its impact on TelecosThe OTT phenomena and its impact on Telecos
The OTT phenomena and its impact on TelecosAsad Habib ur Rehman
 
Sprinting for Success: Digital Transformation through Agile and DevOps
Sprinting for Success: Digital Transformation through Agile and DevOpsSprinting for Success: Digital Transformation through Agile and DevOps
Sprinting for Success: Digital Transformation through Agile and DevOpsDynatrace
 
COM CM 726 @ Boston University: Digital Strategy Building
COM CM 726 @ Boston University: Digital Strategy BuildingCOM CM 726 @ Boston University: Digital Strategy Building
COM CM 726 @ Boston University: Digital Strategy BuildingSteph Parker
 
Smart Dust - A Little Wonder
Smart Dust - A Little WonderSmart Dust - A Little Wonder
Smart Dust - A Little WonderJophin Joy
 
FAST Digital Telco
FAST Digital TelcoFAST Digital Telco
FAST Digital TelcoCapgemini
 
Verizon Strategic Managment Presentation
Verizon Strategic Managment PresentationVerizon Strategic Managment Presentation
Verizon Strategic Managment Presentationmarisaphillips85
 
John Yessis - Telecom and Security
John Yessis - Telecom and Security John Yessis - Telecom and Security
John Yessis - Telecom and Security John Yessis
 
GSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaGSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaOWASP Delhi
 
Airbnb marketing report
Airbnb marketing report Airbnb marketing report
Airbnb marketing report Paul Hayat
 
Optimizing Your Content Marketing and Blog for Conversions
Optimizing Your Content Marketing and Blog for ConversionsOptimizing Your Content Marketing and Blog for Conversions
Optimizing Your Content Marketing and Blog for ConversionsKissmetrics on SlideShare
 

En vedette (18)

GSM Security
GSM SecurityGSM Security
GSM Security
 
Differentiating Your Telecom Cloud
Differentiating Your Telecom CloudDifferentiating Your Telecom Cloud
Differentiating Your Telecom Cloud
 
How to build bulletproof communication strategy with measurement tool
How to build bulletproof communication strategy with measurement toolHow to build bulletproof communication strategy with measurement tool
How to build bulletproof communication strategy with measurement tool
 
The Digital Telecom. Cloud Services
The Digital Telecom. Cloud ServicesThe Digital Telecom. Cloud Services
The Digital Telecom. Cloud Services
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 
Content Marketing 101 - Strategy, Design, Delivery
Content Marketing 101 - Strategy, Design, DeliveryContent Marketing 101 - Strategy, Design, Delivery
Content Marketing 101 - Strategy, Design, Delivery
 
The OTT phenomena and its impact on Telecos
The OTT phenomena and its impact on TelecosThe OTT phenomena and its impact on Telecos
The OTT phenomena and its impact on Telecos
 
Sprinting for Success: Digital Transformation through Agile and DevOps
Sprinting for Success: Digital Transformation through Agile and DevOpsSprinting for Success: Digital Transformation through Agile and DevOps
Sprinting for Success: Digital Transformation through Agile and DevOps
 
20140720compliance
20140720compliance20140720compliance
20140720compliance
 
COM CM 726 @ Boston University: Digital Strategy Building
COM CM 726 @ Boston University: Digital Strategy BuildingCOM CM 726 @ Boston University: Digital Strategy Building
COM CM 726 @ Boston University: Digital Strategy Building
 
Smart Dust - A Little Wonder
Smart Dust - A Little WonderSmart Dust - A Little Wonder
Smart Dust - A Little Wonder
 
FAST Digital Telco
FAST Digital TelcoFAST Digital Telco
FAST Digital Telco
 
Verizon Strategic Managment Presentation
Verizon Strategic Managment PresentationVerizon Strategic Managment Presentation
Verizon Strategic Managment Presentation
 
John Yessis - Telecom and Security
John Yessis - Telecom and Security John Yessis - Telecom and Security
John Yessis - Telecom and Security
 
GSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaGSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj Verma
 
Airbnb marketing report
Airbnb marketing report Airbnb marketing report
Airbnb marketing report
 
Industry Sessions by EDIT. | Talk #1 - Bruno Amorim
Industry Sessions by EDIT. | Talk #1 - Bruno AmorimIndustry Sessions by EDIT. | Talk #1 - Bruno Amorim
Industry Sessions by EDIT. | Talk #1 - Bruno Amorim
 
Optimizing Your Content Marketing and Blog for Conversions
Optimizing Your Content Marketing and Blog for ConversionsOptimizing Your Content Marketing and Blog for Conversions
Optimizing Your Content Marketing and Blog for Conversions
 

Dernier

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Dernier (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

The Digital Telecom. Security Services

  • 1. In Search of New Streams Parviz Iskhakov March, 2016 The Digital Telecom Security Services
  • 2. • Growth in traditional telecom in developed and developing markets is stagnant with declining ARPU and prices. • The OTT players are long affecting CSPs by substituting voice and messaging services, placing significant strain on the CSP data networks and grabbing consumer mind share, and thus weakening the CSPs’ relationship with their user communities. • Thus, CSPs find themselves under increasing pressure, they not only want to protect their core business and their relationship with consumers, but have to seek new revenue opportunities in nontraditional markets. • CSPs are beginning to partner with alternative partner types to fill gaps in their service portfolios and accelerate the time to market of new services. In contrast to aggressive, competitive and alienating tactics to address OTT vendor threats, CSPs can benefit substantially from pursuing these more collaborative approaches. SMS and OTT Messages
  • 3. New Digital Domains CSPs are Focusing on The figure is approximate and is based on Gartner’s research - Market trends: Eight innovative CSPs embark on digital service transformation - CSPs’ market trends and digital transformation strategy 82%of U.S. business executives are worried that cyber threats could impact their companies’ growth prospects 10%of organizations are fully confident that their connected devices secure Source: AT&T
  • 4. Security in the Smartphone Era • Market research firm Gartner says global spending on IT security is set to increase 4.7 percent in 2015 to $75.4 billion, and the world will spend $101 billion on information security in 2018. • The cyber security market is estimated to grow to $170 billion (USD) by 2020, at a Compound Annual Growth Rate (CAGR) of 9.8 percent from 2015 to 2020, according to a report from Markets and Markets. The aerospace, defense, and intelligence vertical continues to be the largest contributor to cybersecurity solutions. $101 Bn IT Security Spendings $170 Bn Market • The British insurance company Lloyd’s estimates that cyber attacks cost businesses as much as $400 billion a year, which includes direct damage plus post-attack disruption to the normal course of business. Some vendor and media forecasts put the cybercrime figure as high as $500 billion and more. • Сyberattacks could cost up to $90 trillion by 2030 if cybersecurity fails to advance at a rapid pace. Atlantic Council and the Zurich Insurance Group $90 Tn Damage till 2030 $400 Bn Damage a year
  • 5. Security Concerns Rise Across the World with Rise of Scale of Cyber Threats TechSci Research says the banking and financial services sector has been the prime target of cyber criminals over the last five years, followed by IT & telecom, defense, and the oil and gas sector. No vendor or user of computer technology is immune from a potential cyber security incident The Essential Guide to Industrial Cyber Security, Honeywell Recent large-scale cases include Sony’s breach, attacks on Lenovo and other companies such as JPMorgan Chase and Home Depot. Most businesses think they are too small to be the victims of a cyber attack. But that is not the case since they are victims of hacking either for their own data or because they are the weakest point of entry in a digital information supply chain.
  • 6. Days of Just Securing the Perimeter are Over • Wireline operators tend to suffer the greater exposure, particularly when they host IT infrastructure or provide managed security services for enterprise customers. • So do mobile operators with their huge customer bases. CSP’s customers are exposed to data exfiltration, denial of service, fraud and all the other attack vectors. • Cloud and IoT services significant growth is putting even more pressure on service providers that have to craft their strategies in the age of cyber insecurity.
  • 7. It’s Time for the Secure Pipe • The standard service-level agreement for years allowed that CSPs just push the traffic in and out. To pass traffic, not pass judgment. CSPs didn’t usually touch it. • Some CSPs however has been quietly getting permission from its customers to stop certain kinds of traffic altogether. Number of businesses have signed up to have the CSP to filter out spam, viruses, DDoS attacks and other malicious activity behind the scenes, before the traffic touches their enterprises. • The “productization” of security services will take time though to catch up with vertical leaders. The final task will be the “clean pipe” with fewer risks with a bill attached. This will force transformation from “dumb pipe” to smart one.
  • 8. CSP’s Security Services Portfolio 92%of the 100K security incidents studied from the past ten years can be described by just nine basic patterns 1. POINT OF SALE INTRUSIONS 2. DENIAL OF SERVICE ATTACKS 3. CRIMEWARE 4. WEB APPLICATION ATTACKS 5. INSIDER MISUSE 6. MISCELLANIOUS ERRORS 7. PHYSICAL THEFT/LOSS 8. CARD SKIMMERS Source: Verizon Mobility and End- Point Security Hybrid cloud security Next Generation Perimeter Solutions Application Threat Protection Advanced Malware Protection Discovery Security Analytics Social Engineering Protect the network and endpoints from both known and zero-day malware The ability to protect hybrid cloud environments and identity business risks associated with SaaS usage Deploying next generation network perimeter solutions to identify and mitigate application threats Detect and remediate application vulnerabilities and prevent malicious hacks and attacks State-of-the-art sandboxing technology helping protect against hacks that bypass signature-based controls Correlating a diverse set of security, network and application event data to improve understanding of normal and discover first seen problems – the unknown unknown Ensuring adequate security awareness in-house and appropriate procedures in place
  • 9. CSPs Security Services Value Chain • Endpoint Security (including mobile security) • Server Security • E-mail Security • Network Security • Cloud Security • Anti-Phishing, Anti- malware, Antivirus • Perimeter Solutions • Application Security • Security Analytics • Monitored or managed firewalls or intrusion prevention systems (IDS/IPS) • Cloud, mobile and web assets (DDoS protection, email security, web filtering) • Security information and event management (SIEM) • Need more advanced services such as real-time and batch security analytics • Reporting associated with monitored/managed devices and incident response • Security compliance and consulting services • Security design and architechture services • Security audit and assessment services • Professional services • Managed services • Cyberdefence solutions Point Products Managed Security Services Information Security Consulting Services Consumer Ad hoc Security Services Security Services Bundle Network Security Services Fully Managed Security Environment Level of Strategic Partnership with the Customer
  • 10. Why MSSP solutions are good for Businesses? • Managed security services are the network security services that have been outsourced to a service provider. A company providing such a service is a managed security service provider (MSSP). • According to recent industry research, most organizations (74%) manage IT security in-house, but 82% of IT professionals said they have either already partnered with, or plan to partner with, a managed security service provider. • MSSPs offer better resources, scalability, and talent - all for a cheaper price. So cost is the major reason. Chief Information Security Officers looking to security services cite cost reduction as a top factor, with 62% of CISOs listing this as an important or very important reason. • Other important issues include flexibility, expertise, global coverage and advanced technology. • CISOs want trusted, strategic partners. Information security is an activity built on trust. MSSPs that understand this develop strong supporting partnerships with their clients and help them overcome their biggest security challenges. • Forrester believes that the relationship between CISOs and MSSPs will continue to deepen. As the MSSP demonstrates competency and even proficiency in certain areas, the partnership will quickly develop from an ad hoc relationship to a fully managed security IT environment. • Advanced technologies, such as threat intelligence and correlation, drive future demand. Sophistication of new threat intelligence technology to detect intrusions with a rapidly changing threat landscape discover a need for solutions capable of detecting suspicious activity and need to receive alerts in near real time. Forrester believes those MSSPs that get this right will have a huge advantage in the market during the next two to five years Trust Global Coverage Flexibility Cost Real-time Detection Advanced Technology 82%Of Chief Information and Security Officers partnered or plan to partner with MSSPs Why MSSP solutions are good for Businesses? Source: Trustwave
  • 11. Global Leading CSPs Clearly Show the Potential for CSPs in Security Domain • Verizon is a top telecommunications provider with a very large North American presence, with more than 2,000 unique clients in the region. Verizon employs one of the largest security teams in the market with an aggressive recruiting strategy. • Verizon emphasizes the business value and cost-controlling aspects that it delivers through managed security services and helps clients allocate resources to the most critical assets through its enhanced risk-based correlation engine. As a large, North American telecommunications provider, AT&T has one of the largest customer bases, with more than 1,200 unique customers in the region. AT&T has an aggressive threat intelligence program and scans more than 25 petabytes of data travelling over its networks daily. AT&T focuses on threat detection with strong network infrastructure and perimeter defense offerings, including robust log monitoring and analysis features. Areas of improvement were its customer portal and reporting features. • BT's MSS offerings include monitoring and management of customer premises deployed devices and network-based security controls as part of its larger portfolio of telecommunications and IT services. BT uses self-developed technology for log and event collection, correlation, query, reporting, and device management. • NTT has a global presence as well as a broad range of security service offerings and delivery options, in addition to broader telecommunications and IT infrastructure service offerings. • Headquartered in Paris, with offices in Atlanta and Singapore, Orange offers a broad range of telecommunications and cloud-based IT infrastructure services, security consulting and integration services, and MSSs. Orange MSSs are based on commercial SIEM technology for data collection, correlation and analysis, reporting, and log management, with self-developed technology for workflow. Gartner Forrester Wave: Information Security Consulting Services, Q1 ‘13
  • 12. But Still Much in CSPs To-Do-List to Gain Leadership in Information Security Consulting Services Though Only two CSPs were included in Forrester Wave Information Security Consulting Services. • Verizon demonstrates strong incident response skills, but lack of global coverage is restrictive. • Verizon has battled to gain brand awareness within the security consultancy space and has succeeded thanks to its incident analysis and strong PCI practice. Although some of the company’s higher-level solutions (for GRC and strategy, for example) may not be as sophisticated as those of larger competitors. • The company does offer a wide range of solutions, including strong offerings in application security, biometrics, DLP, and IAM, many of which it will also subsequently operate. • Client feedback stressed the flexibility of the Verizon consultants and its strength in incident response; areas of potential improvement included Verizon’s comparatively low number of consultants (just over 400) and weak global coverage, as well as challenges with internal collaboration and communication. • BT Global Services delivers pragmatic solutions, with a focus on technology. • BT was the other organization that stood out because of its unique perspective and approach to client engagement; the company’s spokespeople come across as very honest and candid, suggesting that clients are likely to receive straightforward advice, even if it meant BT recommending a course of action that BT could not support. • BT focuses on the delivery of predefined security service packages and does not offer regulatory- or compliance-related services. • Although BT’s staff is relatively small and inexperienced (with an average of fewer than five years of experience), the company has a strong presence in the UK and continental Europe. • BT plays to these strengths, ensuring that the customers receive high-value consulting using strong security technology solutions. Forrester Wave: Information Security Consulting Services, Q1 ‘13
  • 13. Approaches to Unlocking the Cyber Security Potential Build Buy • Orange – Atheos • Singtel – Trustwave • Telstra – Bridgepoint and O2 networks • Telstra – Docusign • Telefonica - Blueliv • DT – Cyphercloud, Zenguard, Lockout • Network Security – Fortinet, F-Secure • Endpoint Security – Lookout, McAfee, Symantec • Cloud Security – Symantec, Akamai • Cyberdefence – FireEye, AllienVault • Professional Services – IBM, HP CAPEX consumption OPEX consumption Time-to-Market Partner Market Cases
  • 14. Security Services Portfolio and Partnerships leveraged. AT&T Case • AT&T has partnered with Cisco for the home controller, plus other specialist vendors for service, components, and installation. Service Innovation Digital Life is AT&T’s new consumer home security and home automation service. • AT&T partners with Juniper for Mobile Security. It will help to manage personal or enterprise-owned devices, enable anti-virus, anti-malware, and application monitoring and control. • At the center of AT&T's partnership with AWS is its NetBond offering, which the company describes as a "network-enabled cloud solution. • AT&T also partners with security app provider Lookout in order to protect AT&T Android devices from app-based threats. Lookout's Mobile Security software is expected to be installed on most AT&T Android phones moving forward. • AT&T Government Solutions selected Aviat Networks as its microwave communications partner. AT&T Government Solutions is a proven solutions integrator, with expertise in areas such as Cyber Security, Network Solutions, Application. AT&T Security Services Portfolio
  • 15. The Digital Telecom Security Services In Search of New Streams Thank you! Should you have any questions or feedback please contact me, Parviz.Iskhakov@gmail.com