March 13, 2017

Securing the Mobile Network with Sonus Networks and Palo Alto Networks Newly Combined Security Architecture


In 2017, over a third of the world's population is projected to own a smartphone, with an estimated total of almost 2.6 billion smartphone users in the world. A majority of these smartphones will support Voice over Long Term Evolution (VoLTE), also referred to as 4G technology, which shifted the cellular network away from its circuit-switched legacy towards a packet-switched network that resembles the Internet. 

And, just as the internet is exposed to many attack vectors, this dramatic shift to a packet core opens up a number of new attack surfaces against Mobile Network Operators (MNOs). Malware on the smart phone, as well as applications built to exploit a lack of visibility in the mobile network, are both evolving to continue to exploit the greater surface area of attack that is now available to them.

Sonus Networks, in collaboration with Palo Alto Networks, have a powerful new architecture to mitigate the impacts of rogue endpoints and traffic on mobile networks. This newly combined Sonus-Palo Alto Networks security architecture will reduce network costs and protect MNOs' infrastructure and customers from compromise by implementing policies to block unwanted traffic on Evolved Packet Core networks.

The Sonus-Palo Alto Networks security architecture works with existing Sonus elements (IBCF and P-CSCF) as well as Palo Alto Networks next generation firewalls to move security to the network edge - lowering networks costs and customer churn. Each company provides exceptional security offerings in their respective environments, but by working together, we are able to move security enforcement to optimal points within the network.  Continue reading...


Leave a comment

Get E-News and Notices via Email


  

 



  

I accept Webtorials' Terms and Conditions.

Trending Discussions

See more discussions...

Featured Sponsor Microsites






















Recent Tweets

Archives

Notices

Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Please encourage colleagues to download their own copy after registering at http://www.webtorials.com/reg/.  Continuing past this point indicates your acceptance of our terms of use as specified at Terms of Use.

Webtorial® is a registered servicemark of Distributed Networking Associates. The Webtorial logo is a servicemark of Distributed Networking Associates. Copyright 1999-2015, Distributed Networking Associates, Inc.