\"\"
<\/span><\/figcaption><\/figure>NEW DELHI: Check Point Software said that usage of cloud and NFV<\/a> in 5G will open up a new avenue of security threats<\/a> because of their open and flexible nature.

In an interaction with ET Telecom's Danish Khan, Sundar N Balasubramanian, Managing Director, India and SAARC said that securing
telecom networks<\/a> has become more complex as networks continue to evolve. He said securing IoT within an organisational environment will be challenging for telcos because traditional security controls provide only limited effectiveness.

During the current landscape, how do you see security challenges that organizations are facing as they shift to a work-from-home environment?
<\/strong>
The entire shift from working on premise to working from home has necessitated many changes in security postures of organizations. While many countries across the world have mandated nationwide lockdowns, organizations have transitioned to employees working from home and accessing corporate resources through secure access. This transition has accelerated the shift to cloud for industries across verticals. However, at the same time organizations had to restructure their network and security fabrics overnight, resulting in security gaps and new opportunities for cyber criminals.

The rush to enable remote access led to many companies allowing connectivity from unmanaged home PCs that lacked basic cyber-hygiene such as updated software patches, anti-malware etc. In addition to this, many Infosec and DevOps teams rushing to the cloud did not scale their cloud security environment to the level of their traditional data centers. Today’s reality is that organizations also need to ensure that employees' living rooms are also a part of the security perimeter. The “new normal” requires organizations to revisit and check the security level and relevance of their network’s infrastructures, processes, compliance of connected mobile and PC devices, IoT etc. The increased use of the cloud means an increased level of security, especially in technologies that secure workloads, containers and serverless applications on multi and hybrid cloud environments.

What are the trends in the last six months when it comes to cyberattacks? How have they evolved?
<\/strong>
In the past six months, the way we live, and work has changed beyond recognition. Our ’Cyber Attack Trends: 2020 Mid-Year Report’ shows how threat actors have exploited the COVID-19 pandemic to target organizations across all sectors, including governments, various industries, critical infrastructure, and consumers. Ever since the outbreak, COVID-19 related phishing and malware attacks increased dramatically. Data suggests the number of attacks increased from under 5,000 thousand per week in February, to over 200,000 per week in late April.

If we specifically look at mobile and cloud security, we are seeing two very clear trends. From a mobile perspective, cybercriminals are deploying innovative methods and new mobile infection vectors, and improved techniques to bypass security protections to place malicious apps in official application stores. At the same time the rapid move to public clouds during the pandemic is leading to an increase in attacks targeting sensitive cloud workloads and data. Threat actors are also using cloud infrastructure to store the malicious payloads in their malware attacks.

During these times what is your piece of advice for information security heads?
<\/strong>
Adopt real time prevention rather than just adopt a detection approach: Vaccination is better than treatment – even when it comes to cyber security. Real-time prevention of threats, before they can infiltrate the network, is the key to blocking future attacks.

Secondly, the “new normal” requires organizations to revisit and check the security level and relevance of their network’s infrastructures, processes, compliance of connected mobile and PC devices, IoT etc. The increased use of the cloud means an increased level of security, especially in technologies that secure workloads, containers and serverless applications on multi and hybrid cloud environments.

Many changes in the company’s infrastructure present a unique opportunity to check security investments. The highest level of visibility, reached through consolidation, will guarantee the best effectiveness.

A lot of citizen centric public services are being introduced through mobile devices. What is your perspective on mobile security?<\/strong>

Mobile threats are increasing in quantity and sophistication. According to Check Point’s Threat Intelligence Report, 11% of organizations in India have been impacted by mobile malware as compared to the global figure of 4.5% on a weekly basis.

With citizen services, there are two key things to consider: information confidentiality and minimal downtime of services. Organizations in the public sector need to ensure that they have the right cybersecurity solutions in place to ensure that citizens’ vital information are stored securely, and that their online and mobile service offerings are protected against attacks that would result in downtime.

At the same time, mobile device users need to take the necessary precautions to protect their device. They should always keep their phone operating system and apps updated, and never download apps from third party sources or click on suspicious links. SandBlast Mobile keeps mobile devices safe from cyber attacks through extensive threat detection and mitigation. Its unique, on-device network protection technology includes various features such as anti-phishing, safe browsing, anti-bot and conditional access capabilities.

Lately, we have observed that every business is a mobile business. Using smartphones and tablets to access critical services while on the go has many benefits but can also expose sensitive data to risk.

We are beginning to see first SMS phishing messages regarding COVID-19, hit mobile users as well. Which stresses the need for organizations to secure mobile devices with immediate threat removal and real-time intelligence that extends the existing security and mobility infrastructures.

What are your views on network security, how secure are today's telecom networks?
<\/strong>
As the world becomes more connected and networks continue to evolve, securing telecom networks has also become more complex. Today, from simple voice calls to text and email, all the way to streaming video—the traffic mix and bandwidth requirements change daily. We believe that a large telecom network must be able to secure a growing attack surface with traffic entering the network from handsets, the Internet, and point-to-point vendor connections.

With India planning to launch 5G in the near future, we see the country becoming hyper-connected where real-time applications will traverse the 5G networks. Securing IoT within an organisational environment will be challenging because traditional security controls provide only limited effectiveness.

5G will change the way we work and live, as well as the number of devices we have. There could even be more devices than human beings and the vastly increased numbers of devices will mean many more 5G security threats and a broader, multifaceted attack surface.

In addition,
5G technology<\/a> uses cloud and NFV as part of its core technology. Because of their open, flexible, programmable nature, as well as their elevated use, SDN<\/a> and NFV will open up a new avenue of security threats.

According to you where does India stand from a cyber security standpoint and where does India stand in Check Point’s global scheme of things?
<\/strong>
According to our analysis, an organization in India is being attacked on average 1189 times per week in the last 6 months, compared to 465 attacks per organization globally. Today, cybersecurity cannot be reactive or incident driven rather there has to be a proactive focus towards security. Organizations in India need to close security gaps and secure their networks, from employees’ home PCs and mobiles to the enterprise data center, with a holistic, end-to-end security architecture. But if we look at the overall trends, these priorities are essential for organizations across the world. The big enterprises that we speak to in India are not very different from those in other parts of the world. Some are more advanced, some are behind in terms of the level of security.

India is amongst the top 10 countries for us and the largest in the Asia region. India is also home to one of the four technical support centres the company has globally. The three other centres are located in the US, Canada, and Israel.

Can you tell us about your key customers in India and how are you supporting them?
<\/strong>
We secure more than 100,000 organizations and millions of users worldwide, including 96% of Fortune 100 companies and 85% of Fortune 500 companies. In India, we provide cyber security solutions to support state data centers and India’s Smart Cities. We are also focused on the energy, utility, oil, and gas verticals for IoT and SCADA as well as airports for emerging technologies like mobile and cloud. Additionally, we have a presence in India’s top 8 cities namely- Mumbai, Delhi, Bangalore, Pune, Ahmedabad, Kolkata, Chennai & Hyderabad and our key verticals include BFSI, Telecom, IT & ITES, manufacturing, pharma, new tech and more.
<\/body>","next_sibling":[{"msid":78380642,"title":"BSNL launches new Bharat Fiber broadband plans priced from Rs 449: Report","entity_type":"ARTICLE","link":"\/news\/bsnl-launches-new-bharat-fiber-broadband-plans-priced-from-rs-449-report\/78380642","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[{"msid":"78381893","title":"5G Services","entity_type":"IMAGES","seopath":"telecomnews\/sdn-and-nfv-will-open-up-a-new-avenue-of-security-threats-for-telcos-in-5g-landscape-check-point\/5g-services","category_name":"SDN and NFV will open up a new avenue of security threats for telcos in 5G landscape: Check Point","synopsis":false,"thumb":"https:\/\/etimg.etb2bimg.com\/thumb\/img-size-819238\/78381893.cms?width=150&height=112","link":"\/image\/sdn-and-nfv-will-open-up-a-new-avenue-of-security-threats-for-telcos-in-5g-landscape-check-point\/5g-services\/78381893"}],"msid":78381095,"entity_type":"ARTICLE","title":"SDN and NFV will open up a new avenue of security threats for telcos in 5G landscape: Check Point","synopsis":"\"5G technology uses cloud and NFV as part of its core technology. Because of their open, flexible, programmable nature, as well as their elevated use, SDN and NFV will open up a new avenue of security threats.\"","titleseo":"telecomnews\/sdn-and-nfv-will-open-up-a-new-avenue-of-security-threats-for-telcos-in-5g-landscape-check-point","status":"ACTIVE","authors":[{"author_name":"Danish Khan","author_link":"\/author\/479206691\/danish-khan","author_image":"https:\/\/etimg.etb2bimg.com\/authorthumb\/479206691.cms?width=100&height=100&hostid=268","author_additional":{"thumbsize":true,"msid":479206691,"author_name":"Danish Khan","author_seo_name":"danish-khan","designation":"Senior Assistant Editor","agency":false}}],"analytics":{"comments":0,"views":2350,"shares":0,"engagementtimems":11314000},"Alttitle":{"minfo":""},"artag":"ETTelecom","artdate":"2020-09-29 13:25:52","lastupd":"2020-09-29 14:20:24","breadcrumbTags":["security threats","5G network","Industry","sundar balasubamanian","telecom networks","SDN","Cloud computing","5G technology","NFV","Interviews"],"secinfo":{"seolocation":"telecomnews\/sdn-and-nfv-will-open-up-a-new-avenue-of-security-threats-for-telcos-in-5g-landscape-check-point"}}" data-authors="[" danish khan"]" data-category-name="" data-category_id="" data-date="2020-09-29" data-index="article_1">

SDN和NFV将打开一个新的大道电信公司的安全威胁5 g景观:

“5 g技术使用云计算和NFV作为其核心技术的一部分。因为他们的开放、灵活、可编程的本质,以及他们使用升高,SDN NFV将打开一个新的安全威胁的大道。”

丹麦汗
  • 更新2020年9月29日下午02:20坚持
阅读: 100年行业专业人士
读者的形象读到100年行业专业人士
新德里:检查软件说,使用云NFV在5 g将开辟一条新途径安全威胁因为他们的开放和灵活的性质。

在交互等电信的丹麦汗Sundar Balasubramanian N,董事总经理、印度和南亚区域合作联盟说保护电信网络变得更加复杂的网络继续发展。他说保证物联网在一个组织环境对电信公司将是一个挑战,因为传统的安全控制只提供有限的有效性。

在目前的景观,你如何看待组织面临的安全挑战,因为他们转向一个在家工作的环境吗?

整个转变工作前提在家工作需要许多安全姿势的组织的变化。虽然世界各地许多国家规定全国性的封锁,组织转变员工在家工作,通过安全访问企业资源的访问。这种转变已经加速转向云在垂直行业。然而,在同一时间组织重组他们的网络和安全面料一夜之间,导致安全漏洞和网络犯罪的新机会。

广告
急于启用远程访问导致许多公司允许连接等非托管家用电脑,缺乏基本的网络安全软件补丁更新,反恶意软件等。此外,许多语言性和DevOps团队冲到云不规模的云安全环境水平的传统数据中心。今天的现实是,组织也需要确保员工的客厅也安全边界的一部分。“新常态”需要组织重新考虑和检查他们的网络的安全级别和相关性的基础设施、流程、合规连接手机和电脑设备、物联网等。云的增加意味着增加的安全级别,特别是在技术安全工作负载,容器和serverless应用多和混合云环境。

的趋势在过去六个月当谈到网络攻击?他们是如何进化的?

在过去的六个月里,我们的生活方式,工作就已经发生了翻天覆地的变化。我们的网络攻击趋势:2020年的年中报告显示了COVID-19大流行威胁的演员如何利用目标组织所有部门,包括政府、各行业,关键基础设施,和消费者。自爆发以来,COVID-19相关网络钓鱼和恶意软件攻击急剧增加。数据显示攻击数量的增加在500万年2月,每周超过200000每周4月下旬。

广告
如果我们专门看移动和云安全,我们看到两个非常明显的趋势。从手机的角度来看,网络罪犯部署创新方法和新的移动向量,感染和改善技术绕过安全保护将恶意软件在官方应用商店。同时迅速转移到公共云在大流行期间导致增加攻击目标云工作负载和数据敏感。威胁演员也使用云基础设施存储恶意载荷的恶意软件攻击。

这段时间内你的建议信息安全负责人吗?

采用实时预防而不是采用检测方法:疫苗接种比治疗——甚至当谈到网络安全。实时预防威胁,才能渗透网络,未来的关键是阻止攻击。

其次,“新常态”需要组织重新考虑和检查他们的网络的安全级别和相关性的基础设施、流程、合规连接手机和电脑设备,物联网等。云的增加意味着增加的安全级别,特别是在技术安全工作负载,容器和serverless应用多和混合云环境。

许多改变在公司的基础设施提供一个独特的机会来检查安全投资。最高水平的可见性,达到通过整合,保证最佳的效果。

很多公民为中心的公共服务是通过移动设备介绍。你对移动安全的看法是什么?

移动威胁在增加数量和复杂性。根据核对点威胁情报报告,11%的组织在印度已经被移动恶意软件而影响全球每周4.5%的图。

公民服务,有两个关键问题需要考虑:信息保密性和最小停机时间的服务。组织在公共部门需要确保他们有正确的网络安全解决方案以保证公民的重要信息存储安全,保护他们的网络和移动服务攻击,将导致停机时间。

同时,移动设备用户需要采取必要的措施来保护他们的设备。他们应该保持手机操作系统和应用程序更新,而且从不下载第三方来源的应用程序或点击可疑链接。喷砂手机使移动设备免受网络攻击检测和缓解通过广泛的威胁。其独特的,设备内置网络保护技术包括各种特性如反钓鱼,赢面安全浏览的反傀儡程式和有条件的访问能力。

最近,我们发现,每一个业务是移动业务。使用智能手机和平板电脑访问关键服务虽然有很多好处但也可以暴露敏感数据的风险。

我们正开始看到第一个关于COVID-19 SMS网络钓鱼信息,点击移动用户。强调组织需要安全直接威胁删除和移动设备实时情报,扩展了现有的安全和流动性的基础设施。

你的意见是什么网络安全,安全是如何今天的电信网络吗?

随着世界变得更加紧密和网络不断发展,确保电信网络也变得越来越复杂。今天,从简单的通话发短信和电子邮件,到流媒体视频流量混合和带宽需求每日更换。我们相信一个大电信网络必须能够获得越来越多的攻击表面与手机流量进入网络,互联网,点对点的供应商联系。

与印度计划在不久的将来推出5克,我们看到中国成为高度实时应用程序将遍历5 g网络。获得物联网在一个组织环境将是一个挑战,因为传统的安全控制只提供有限的有效性。

5 g将改变我们的工作和生活方式,以及设备的数量。甚至可能比人类更多的设备,大大提高了设备的数量将意味着更多的5 g安全威胁和更广泛的、多方面的攻击表面。

此外,5 g技术使用云计算和NFV作为其核心技术的一部分。因为他们的开放、灵活、可编程的本质,以及他们使用升高,SDN和NFV将打开一个安全威胁的新途径。

根据你哪里印度站从网络安全的角度来看,印度哪里站在检查站的全球计划的事情?

根据我们的分析,一个组织在印度被攻击平均每周1189次在过去的6个月,而465袭击全球组织。今天,网络安全不能反应或事件驱动的,而对安全必须有积极的关注。组织在印度需要关闭安全漏洞和安全的网络,从员工的家用电脑和手机到企业数据中心,一个整体,端到端安全架构。但是如果我们看一下总体趋势,这些优先事项是必不可少的组织在世界各地。印度的大企业,我们说话不是很不同于那些在世界的其他地方。一些更高级的,一些落后的的安全级别。

印度是在前十国家美国和亚洲最大的地区。印度也是一个四公司全球技术支持中心。其他三个中心位于美国、加拿大和以色列。

你能告诉我们关于你的关键客户在印度,你支持吗?

我们安全的100000多个组织和全球数以百万计的用户,其中包括96%的财富100强企业和85%的财富500强企业。在印度,我们提供网络安全解决方案来支持国家数据中心和印度的智能城市。我们也集中在能源、公用事业、石油、和气体垂直物联网和SCADA以及机场等新兴技术的移动和云。此外,我们有一个在印度的前8城市即——孟买、德里、班加罗尔、普纳,艾哈迈达巴德,加尔各答,钦奈和海德拉巴和关键的垂直包括BFSI、电信、&工艺,制造、制药、新技术等等。
  • 发布于2020年9月29日01:25点坚持
是第一个发表评论。
现在评论

加入2 m +行业专业人士的社区

订阅我们的通讯最新见解与分析。乐动扑克

下载ETTelec乐动娱乐招聘om应用

  • 得到实时更新
  • 保存您最喜爱的文章
扫描下载应用程序
\"\"
<\/span><\/figcaption><\/figure>NEW DELHI: Check Point Software said that usage of cloud and NFV<\/a> in 5G will open up a new avenue of security threats<\/a> because of their open and flexible nature.

In an interaction with ET Telecom's Danish Khan, Sundar N Balasubramanian, Managing Director, India and SAARC said that securing
telecom networks<\/a> has become more complex as networks continue to evolve. He said securing IoT within an organisational environment will be challenging for telcos because traditional security controls provide only limited effectiveness.

During the current landscape, how do you see security challenges that organizations are facing as they shift to a work-from-home environment?
<\/strong>
The entire shift from working on premise to working from home has necessitated many changes in security postures of organizations. While many countries across the world have mandated nationwide lockdowns, organizations have transitioned to employees working from home and accessing corporate resources through secure access. This transition has accelerated the shift to cloud for industries across verticals. However, at the same time organizations had to restructure their network and security fabrics overnight, resulting in security gaps and new opportunities for cyber criminals.

The rush to enable remote access led to many companies allowing connectivity from unmanaged home PCs that lacked basic cyber-hygiene such as updated software patches, anti-malware etc. In addition to this, many Infosec and DevOps teams rushing to the cloud did not scale their cloud security environment to the level of their traditional data centers. Today’s reality is that organizations also need to ensure that employees' living rooms are also a part of the security perimeter. The “new normal” requires organizations to revisit and check the security level and relevance of their network’s infrastructures, processes, compliance of connected mobile and PC devices, IoT etc. The increased use of the cloud means an increased level of security, especially in technologies that secure workloads, containers and serverless applications on multi and hybrid cloud environments.

What are the trends in the last six months when it comes to cyberattacks? How have they evolved?
<\/strong>
In the past six months, the way we live, and work has changed beyond recognition. Our ’Cyber Attack Trends: 2020 Mid-Year Report’ shows how threat actors have exploited the COVID-19 pandemic to target organizations across all sectors, including governments, various industries, critical infrastructure, and consumers. Ever since the outbreak, COVID-19 related phishing and malware attacks increased dramatically. Data suggests the number of attacks increased from under 5,000 thousand per week in February, to over 200,000 per week in late April.

If we specifically look at mobile and cloud security, we are seeing two very clear trends. From a mobile perspective, cybercriminals are deploying innovative methods and new mobile infection vectors, and improved techniques to bypass security protections to place malicious apps in official application stores. At the same time the rapid move to public clouds during the pandemic is leading to an increase in attacks targeting sensitive cloud workloads and data. Threat actors are also using cloud infrastructure to store the malicious payloads in their malware attacks.

During these times what is your piece of advice for information security heads?
<\/strong>
Adopt real time prevention rather than just adopt a detection approach: Vaccination is better than treatment – even when it comes to cyber security. Real-time prevention of threats, before they can infiltrate the network, is the key to blocking future attacks.

Secondly, the “new normal” requires organizations to revisit and check the security level and relevance of their network’s infrastructures, processes, compliance of connected mobile and PC devices, IoT etc. The increased use of the cloud means an increased level of security, especially in technologies that secure workloads, containers and serverless applications on multi and hybrid cloud environments.

Many changes in the company’s infrastructure present a unique opportunity to check security investments. The highest level of visibility, reached through consolidation, will guarantee the best effectiveness.

A lot of citizen centric public services are being introduced through mobile devices. What is your perspective on mobile security?<\/strong>

Mobile threats are increasing in quantity and sophistication. According to Check Point’s Threat Intelligence Report, 11% of organizations in India have been impacted by mobile malware as compared to the global figure of 4.5% on a weekly basis.

With citizen services, there are two key things to consider: information confidentiality and minimal downtime of services. Organizations in the public sector need to ensure that they have the right cybersecurity solutions in place to ensure that citizens’ vital information are stored securely, and that their online and mobile service offerings are protected against attacks that would result in downtime.

At the same time, mobile device users need to take the necessary precautions to protect their device. They should always keep their phone operating system and apps updated, and never download apps from third party sources or click on suspicious links. SandBlast Mobile keeps mobile devices safe from cyber attacks through extensive threat detection and mitigation. Its unique, on-device network protection technology includes various features such as anti-phishing, safe browsing, anti-bot and conditional access capabilities.

Lately, we have observed that every business is a mobile business. Using smartphones and tablets to access critical services while on the go has many benefits but can also expose sensitive data to risk.

We are beginning to see first SMS phishing messages regarding COVID-19, hit mobile users as well. Which stresses the need for organizations to secure mobile devices with immediate threat removal and real-time intelligence that extends the existing security and mobility infrastructures.

What are your views on network security, how secure are today's telecom networks?
<\/strong>
As the world becomes more connected and networks continue to evolve, securing telecom networks has also become more complex. Today, from simple voice calls to text and email, all the way to streaming video—the traffic mix and bandwidth requirements change daily. We believe that a large telecom network must be able to secure a growing attack surface with traffic entering the network from handsets, the Internet, and point-to-point vendor connections.

With India planning to launch 5G in the near future, we see the country becoming hyper-connected where real-time applications will traverse the 5G networks. Securing IoT within an organisational environment will be challenging because traditional security controls provide only limited effectiveness.

5G will change the way we work and live, as well as the number of devices we have. There could even be more devices than human beings and the vastly increased numbers of devices will mean many more 5G security threats and a broader, multifaceted attack surface.

In addition,
5G technology<\/a> uses cloud and NFV as part of its core technology. Because of their open, flexible, programmable nature, as well as their elevated use, SDN<\/a> and NFV will open up a new avenue of security threats.

According to you where does India stand from a cyber security standpoint and where does India stand in Check Point’s global scheme of things?
<\/strong>
According to our analysis, an organization in India is being attacked on average 1189 times per week in the last 6 months, compared to 465 attacks per organization globally. Today, cybersecurity cannot be reactive or incident driven rather there has to be a proactive focus towards security. Organizations in India need to close security gaps and secure their networks, from employees’ home PCs and mobiles to the enterprise data center, with a holistic, end-to-end security architecture. But if we look at the overall trends, these priorities are essential for organizations across the world. The big enterprises that we speak to in India are not very different from those in other parts of the world. Some are more advanced, some are behind in terms of the level of security.

India is amongst the top 10 countries for us and the largest in the Asia region. India is also home to one of the four technical support centres the company has globally. The three other centres are located in the US, Canada, and Israel.

Can you tell us about your key customers in India and how are you supporting them?
<\/strong>
We secure more than 100,000 organizations and millions of users worldwide, including 96% of Fortune 100 companies and 85% of Fortune 500 companies. In India, we provide cyber security solutions to support state data centers and India’s Smart Cities. We are also focused on the energy, utility, oil, and gas verticals for IoT and SCADA as well as airports for emerging technologies like mobile and cloud. Additionally, we have a presence in India’s top 8 cities namely- Mumbai, Delhi, Bangalore, Pune, Ahmedabad, Kolkata, Chennai & Hyderabad and our key verticals include BFSI, Telecom, IT & ITES, manufacturing, pharma, new tech and more.
<\/body>","next_sibling":[{"msid":78380642,"title":"BSNL launches new Bharat Fiber broadband plans priced from Rs 449: Report","entity_type":"ARTICLE","link":"\/news\/bsnl-launches-new-bharat-fiber-broadband-plans-priced-from-rs-449-report\/78380642","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[{"msid":"78381893","title":"5G Services","entity_type":"IMAGES","seopath":"telecomnews\/sdn-and-nfv-will-open-up-a-new-avenue-of-security-threats-for-telcos-in-5g-landscape-check-point\/5g-services","category_name":"SDN and NFV will open up a new avenue of security threats for telcos in 5G landscape: Check Point","synopsis":false,"thumb":"https:\/\/etimg.etb2bimg.com\/thumb\/img-size-819238\/78381893.cms?width=150&height=112","link":"\/image\/sdn-and-nfv-will-open-up-a-new-avenue-of-security-threats-for-telcos-in-5g-landscape-check-point\/5g-services\/78381893"}],"msid":78381095,"entity_type":"ARTICLE","title":"SDN and NFV will open up a new avenue of security threats for telcos in 5G landscape: Check Point","synopsis":"\"5G technology uses cloud and NFV as part of its core technology. Because of their open, flexible, programmable nature, as well as their elevated use, SDN and NFV will open up a new avenue of security threats.\"","titleseo":"telecomnews\/sdn-and-nfv-will-open-up-a-new-avenue-of-security-threats-for-telcos-in-5g-landscape-check-point","status":"ACTIVE","authors":[{"author_name":"Danish Khan","author_link":"\/author\/479206691\/danish-khan","author_image":"https:\/\/etimg.etb2bimg.com\/authorthumb\/479206691.cms?width=100&height=100&hostid=268","author_additional":{"thumbsize":true,"msid":479206691,"author_name":"Danish Khan","author_seo_name":"danish-khan","designation":"Senior Assistant Editor","agency":false}}],"analytics":{"comments":0,"views":2350,"shares":0,"engagementtimems":11314000},"Alttitle":{"minfo":""},"artag":"ETTelecom","artdate":"2020-09-29 13:25:52","lastupd":"2020-09-29 14:20:24","breadcrumbTags":["security threats","5G network","Industry","sundar balasubamanian","telecom networks","SDN","Cloud computing","5G technology","NFV","Interviews"],"secinfo":{"seolocation":"telecomnews\/sdn-and-nfv-will-open-up-a-new-avenue-of-security-threats-for-telcos-in-5g-landscape-check-point"}}" data-news_link="//www.iser-br.com/news/sdn-and-nfv-will-open-up-a-new-avenue-of-security-threats-for-telcos-in-5g-landscape-check-point/78381095">