Gulf Air boosts network

From 22 February there will be four daily flights between Bahrain International Airport and King Abdulaziz International Airport in Jeddah the Kingdom of Saudi Arabia. Six daily flights between Bahrain International Airport and Kuwait International Airport are now in operation.

Spotlight

Elfiq Networks

With today’s growing Internet demands, Elfiq Networks enhances network performance and business continuity through innovative link balancing, cloud computing and bandwidth management technologies. Using Elfiq Networks Link Balancers, companies can leverage simultaneous ISPs, mix public and private links for added flexibility, seamless failover, increased throughput and smarter WAN path selection. Every day, local and global organizations of all sizes and verticals rely on Elfiq Networks’ Link Balancers and advanced network solutions.

OTHER ARTICLES
Unified Communications, Network Security

SA and NSA: The Difference Between 5G Architectures

Article | July 10, 2023

Choosing the right 5G architecture is crucial for enhancing operations while keeping scalability and budget in mind. Learn whether SA or NSA is more suitable for your business needs with this article. 1. Introduction to 5G Network Architectures 2. What is 5G SA? 2.1 Characteristics of SA Architecture 2.2 Benefits of SA Architecture 3. What is 5G NSA? 3.1 Characteristics of NSA Architecture 3.2 Benefits of NSA Architecture 4. Factors to Consider When Choosing Between SA and NSA 4.1 Cost Implications of Each Architecture 4.2 Future Implications of Each Architecture 5. Conclusion 1. Introduction to 5G Network Architectures Widespread implementation of 5G is transforming how businesses across verticals operate, providing enhanced speed, low latency, and massive connectivity. The advancements in 5G system architecture enable new use cases, from autonomous vehicles to smart cities. There are currently two types of 5G network architecture, namely 5G standalone (5G SA) and 5G non-standalone (5G NSA). These two architectures differ in how they connect to the existing 4G infrastructure, the type of equipment required, and the level of network independence. Therefore, understanding the difference between SA and NSA is crucial for companies and organizations implementing 5G architecture. 2. What is 5G SA? 5G SA architecture is an entirely new technology that uses 5G core network architecture, independent of the current 4G LTE network. It has various use cases, such as combining 5G with AI and edge use cases. 2.1 Characteristics of SA Architecture Independent Network: All components of the architecture, including the 5G core architecture, radio access network, and user equipment, are not reliant on any 4G technology. High Performance: 5G SA architecture is optimized for high performance and low latency, enabling fast data transfer rates and near-instantaneous response times. Distributed Architecture: This allows efficient resource allocation and dynamic management of network resources. End-to-End Encryption: It provides end-to-end encryption, which ensures that data is secure and protected from unauthorized access. Higher Cost: 5G SA architecture is more expensive to implement than NSA architecture due to the need for a fully independent 5G network infrastructure. 2.2 Benefits of SA Architecture Low Latency: Applications of 5G that require real-time processing are only possible with SA architecture. Customization: As SA does not depend on existing network architecture, it can be tailored to company requirements. It also enables network slicing for 5G enterprise private network use cases. Security: End-to-end encryptions ensure a more secure network, and 5G network slicing keeps various access levels separate. Scalability: 5G architecture is designed to be highly scalable and handle large volumes of data and devices. Future-proofing: SA architecture will be able to support upcoming 5G features and capabilities by design. 3. What is 5G NSA? 5G NSA provides a transition into 'true' 5G architecture by incorporating 4G network infrastructure for deployment. 3.1 Characteristics of NSA Architecture Non-Independent Network: 5G NSA architecture is designed to leverage the existing 4G infrastructure to deliver 5G services. Transition to SA: NSA offers lower latencies and faster speeds than 4G LTE without deploying 5G architecture. Integrated Deployment: 5G NSA can be deployed quickly since it integrates existing infrastructure. Limited Scalability: As it relies on the existing 4G infrastructure, NSA is limited in scaling. Low Scalability: There is a lower limit on how many devices can join the network and the data volume that can be processed on NSA. 3.2 Benefits of NSA Architecture Faster Deployment: 5G NSA architecture can be deployed more rapidly than SA architecture. Easier Integration: 4G integration with existing networks is easier since it uses architecture. Cost-effective: 5G NSA architecture is generally less expensive to implement as it doesn't require a complete overhaul of the existing infrastructure to a 5G core architecture. Improvement Over 4G: While not providing the speed and low latency of 'true' 5G, NSA offers significant improvements over 4G networks. 4. Factors to Consider When Choosing Between SA and NSA 4.1 Cost Implications of Each Architecture SA architecture requires a complete overhaul of the existing infrastructure, which can result in higher infrastructure and deployment costs. However, SA architecture can be more cost-effective in the long run due to its future-proof design and ability to provide greater scalability and customization. On the other hand, NSA architecture leverages the existing 4G infrastructure, resulting in lower infrastructure and deployment costs. However, upgrading and maintaining an existing 4G network to support 5G technology can be complex and may result in higher operational costs in the long run. 4.2 Future Implications of Each Architecture SA architecture is designed to be future-proof and scalable, supporting upcoming 5G features and capabilities. This can give organizations greater flexibility and agility to respond to changing business needs and emerging technologies. On the other hand, NSA architecture may be less future-proof and require additional investments in infrastructure and resources to support new 5G features and capabilities. 5. Conclusion While NSA architecture may offer lower upfront costs and a faster deployment timeline, SA architecture may be more future-proof and scalable in the long run. Choosing the appropriate 5G architecture is a critical determinant for organizations aiming to utilize 5G technology in building a connected industry of the future. Organizations must evaluate their requirements and consider each architecture's short and long-term costs and operational implications before making a decision.

Read More
5G

4G vs. 5G: We Explain the Difference and Why You Need to Care

Article | May 18, 2023

Latency – the time it takes for devices to communicate with each other or with the server that’s imparting information – was already pretty low with 4G, but 5G will basically make it disappear. This development is great news for new tech forays into remote real-time gaming and self-driving cars, as the communication needs to be instantaneous for hiccup-free gameplay and to guarantee the safety of passengers. lthough there has been much media coverage regarding 5G’s health-related dangers and conspiracy-driven connection to the coronavirus, many people are still in the dark about what the 5G network can bring to the everyday internet user.

Read More
5G

Upcoming 7 Conferences to Attend in Network Monitoring

Article | September 28, 2023

Uncover the future of network monitoring at computer networking conferences. Explore insights, collaborations, and growth opportunities to harness the power of secured network infrastructures. Network monitoring is a critical aspect of the ever-evolving networking industry; helping ensure efficient and secure operation. It involves the continuous surveillance, analysis, and management of network infrastructure, performance, and security. To stay abreast of the latest developments and advancements in this field, industry executives and managers must attend the upcoming network monitoring conferences scheduled between June and September 2023. The events provide a crucial platform for professionals to gain in-depth insights into emerging trends, innovative technologies, and best practices in network monitoring. The computer network monitoring conferences aims to address challenges businesses face with IT infrastructure, operations and cloud. The conferences are broken up into several tracks, each with a different area of focus. The agenda and key speakers offer more opportunities to learn and discover knowledge and improve the network monitoring operations. Top 7 Network Monitoring Conferences of 2023 1.TMA Conference 2023 June 26-30, 2023 | Naples (Italy) The 7th edition of Network Traffic Measurement and Analysis Conference will offer a significant opportunity for leaders in the networking industry. Organized by the prestigious University of Naples Federico II, the TMA Conference 2023 provides a platform for presenting cutting-edge research and controversial work in network measurements. One of the Technical Program Committee (TPC) chairs for this year's conference is Johanna Ullrich, a renowned researcher at SBA Research and the Head of the Networks and Critical Infrastructures Security Research Group. With her expertise and insights, Ullrich will share insights with a compelling keynote speech that will offer valuable knowledge to attendees. Moreover, the event boasts technical sponsorship from reputable organizations such as IFIP, IFIP TC6-WG6.6, IEEE, and IEEE ComSoc, further solidifying its significance in the networking industry. 2.IEEE International Black Sea Conference on Communications and Networking July 4-7, 2023 | Istanbul (Turkey) A significant event for networking industry leaders, IEEE BlackSeaCom 2023, offers grants to participants who have registered and co-authored accepted papers, fostering engagement and recognition within the conference networks. The special session on machine learning and intelligent algorithms for emerging wireless communications brings forth groundbreaking research. Esteemed speakers like Henning Schulzrinne, Melike Erol-Kantarci, Bülent Kaytaz, and BASIL MANOUSSOS to offer valuable insights about network monitoring in the event. Attending this network monitoring conference will allow industry leaders to network, collaborate, and stay updated on the latest advancements in event monitoring and network monitoring events. 3.IEEE International Symposium on Local and Metropolitan Area Networks July 10-11, 2023 | London (UK) IEEE LANMAN 2023 provides a robust platform for industry leaders by bringing together experts to discuss the latest technical advances in local and metropolitan area networking. With a focus on theory and experimentation, LANMAN 2023 invites advanced papers pushing network monitoring events' boundaries. The keynote speakers, including Tommaso Melodia and William Lincoln Smith, are to delve into topics like open RAN systems, edge computing, routing, and network functions. Attending LANMAN 2023 allows industry leaders to expand their conference networks, gain valuable insights, and stay at the forefront of network events and management, empowering them to drive innovation and enhance their network monitoring strategies. 4.International Conference on Computer Communications and Networks (ICCCN 2023) July 24-26 2024 | Hawaii (US) A must-attend event for computer communications and network industry leaders serves as a platform for presenting innovative ideas and fundamental advancements in computer communications and networks. The conference facilitates communication and collaboration among researchers and practitioners, driving scientific and technological innovation to enhance communications and networking. Keynote speakers including, Ness B. Shroff, Puneet Sharma, and Dr. Gene Tsudik will address designing future XG networks, complexities of edge-to-cloud platforms, and compromise/malware detection for low-end devices. Attending ICCCN will help expand network through conferences, gain a deeper understanding, and advance their network monitoring techniques with shared expertise and knowledge. 5.SmartNets 2023 July 25-27, 2023| Istanbul (Turkey) SmartNets 2023 is a pivotal networking conference aiming to bridge the gap between the physical world and cyberspace by connecting everything. The event will bring together experts and researchers from academia to discuss the challenges and solutions in areas like embedded equipment design, resource-constrained media communications, security, data analysis, and services. The conference will be focusing on future scientific issues, covering topics such as Industry 4.0, smart cities, healthcare systems, big data analytics, edge computing, next-generation networks, and more. SmartNets 2023 will enable leaders to gain access to the latest research findings, address digital transformation challenges, explore wireless communication technologies, and exchange experiences on implementing secure and reliable communication services. 6.IEEE International Mediterranean Conference on Communications and Networking September 4-7, 2023 | Dubrovnik (Croatia) IEEE MeditCom is a highly anticipated networking conference that brings together worldwide visionaries from academia, research labs, and industry. The event will focus on addressing the challenges in communications and networking. It will provide a platform for researchers to present their work on various topics, including theoretical and systems research and vertical technologies. By attending IEEE MeditCom, industry leaders in the networking industry will be able to discover the latest advancements and research findings. Furthermore, the conference will offer an opportunity to engage with local IEEE Sections, ComSoc Chapters, and Sister Societies from the Mediterranean region. The presence of distinguished keynote speakers like Gerhard P. Fettweis, Petar Popovski, Jean-Claude Belfiore, Mohamed-Slim Alouini, and Antonia M. Tulino will further enhance the value of this event. 7.Cyber Security Training at SANS Network Security Las Vegas 2023 September 6-11, 2023 | Las Vegas (US) SANS Network Security 2023 offers industry leaders in the network industry the opportunity to learn valuable real-world cybersecurity skills from experts. The event, both live online and in Las Vegas, will provide interactive training with hands-on labs and the chance to participate in NetWars Tournaments. Attending SANS Network Security will allow professionals to enhance their knowledge, network with peers in real-time, and stay up-to-date with industry trends. With courses aligned with GIAC certifications, attendees can validate their expertise in specialized InfoSec, network monitoring domains and job-specific roles. Jon Gorenflo, a prominent figure in the field, is a keynote speaker at the event, and will be sharing his expertise and on-field experience. Conclusion The event listing showcases numerous opportunities for networking businesses to gain a competitive edge. By experiencing these upcoming conferences, industry leaders can tap into the latest research, emerging technologies, and best methods in network monitoring. This invaluable knowledge equips them to make informed decisions, develop innovative solutions, and optimize processes. The conferences allow to connect and enable businesses to explore new avenues, forge strategic alliances, and unlock potential growth opportunities. Ultimately, the comprehensive insights gained from these conferences empower networking businesses to adapt to evolving market dynamics, enhance their capabilities, and thrive in an innovative environment.

Read More
Data Center Networking

Why Should You Choose an Added Protection Layer with a VPN?

Article | August 10, 2022

There was a time when network security meant having servers on-site. A firewall would protect company data whenever internet traffic entered and exited the network. But, what about today? Modern businesses do not strictly function on-premise. With the COVID-19 pandemic, the number of people working off-site part-time or full-time increased enormously – and suddenly. This change compelled cybersecurity professionals to reconsider their security measures. Their online privacy solutions had to ensure that their most precious asset — their data — was secure regardless of where workers accessed it. Even when restrictions are lifted, businesses continue to use remote teams. As a result, more and more of a company's critical data and services are being housed in the cloud. These two criteria indicate that the need to examine network security on a regular basis is here to stay. The good news is that a VPN, or virtual private network, is one of the most simple and widely accessible network security solutions for remote worker internet access. Do VPNs Provide Reliable Business Security? A virtual private network is a kind of Internet security service that enables users to connect to the internet as if they were on a private network. VPNs utilize encryption to provide a secure connection across vulnerable Internet infrastructure. VPNs are one method for protecting business data and controlling user access to that data. The VPNs safeguard data as users interact with applications and websites through the Internet, and they can conceal specific resources. They are typically used for access control, although alternative identity and access management (IAM) systems can also assist with user access management. VPN Encryption Enhances Network Security Data is encrypted so that only authorized parties can view it. Anyone who manages to intercept it, whether a hacker, a fraudster, or another bad actor, is out of luck. Imagine an employee is working from a coffeehouse, shared workspace, hotel, or airport and has access to your company's business-grade VPN. (Please keep in mind that business-or enterprise-grade VPNs are not the same as free VPN services.) The employee can create an encrypted connection between both the user's device and your VPN by using a VPN client installed on their preferred device and a public Wi-Fi network. This device, as well as any others that connect to your VPN, will establish encryption keys on both sides of the network connection. These keys will then encrypt and decrypt the information being exchanged. The data of the person working at the coffeehouse is secured by the VPN after they create an encrypted VPN connection by utilizing the coffeehouse's Wi-Fi as a hotspot with a VPN client. Even if cybercriminals get access to the network of that coffeehouse, your employees and their data are secure within the VPN tunnel. Closing Lines Network security requires a VPN service from a trustworthy VPN provider. Our next-generation VPN enables enterprises to fully protect their assets in a dynamic, cost-effective, and scalable manner. A VPN solution enables you to connect private networks, devices, and servers quickly and simply to create a secure, virtualized, modern internet.

Read More

Spotlight

Elfiq Networks

With today’s growing Internet demands, Elfiq Networks enhances network performance and business continuity through innovative link balancing, cloud computing and bandwidth management technologies. Using Elfiq Networks Link Balancers, companies can leverage simultaneous ISPs, mix public and private links for added flexibility, seamless failover, increased throughput and smarter WAN path selection. Every day, local and global organizations of all sizes and verticals rely on Elfiq Networks’ Link Balancers and advanced network solutions.

Related News

Network Security

Ampliphae, HPE Athonet and Arqit deliver Quantum-Safe Private 5G using Symmetric Key Agreement

PR Newswire | January 19, 2024

Arqit Quantum Inc, a leader in quantum-safe encryption, and Ampliphae Ltd (Ampliphae), a leader in network cyber security solutions, have today announced successful completion of a project that will deliver enhanced quantum-safe security for Private 5G networks. The Security Enhanced Virtualised Networking for 5G (SEViN-5G) project, funded by Innovate UK, the UK Government’s innovation agency, leveraged Ampliphae’s network security analytics technology and Arqit’s Symmetric Key Agreement Platform to deliver a quantum-secure Private 5G testbed that can protect against both current and future cyber threats. Athonet, a Hewlett Packard Enterprise acquisition, provided the Radio Access Network (RAN) equipment for the project with a cloud core hosted on AWS. Private enterprise networks based on 5G cellular technology are accelerating digital transformation across industries including manufacturing, healthcare, defence and smart cities. Private 5G gives enterprises access to high-speed, massively scalable, and ultra-reliable wireless connectivity, allowing them to implement innovative IoT and mobile solutions that enhance productivity, drive automation and improve customer engagement. The security of these networks will be paramount as they will support safety-critical infrastructure and carry highly sensitive data. But like any new technology, 5G comes with potential new threats and security risks including the threat from quantum computing. The project finished in December 2023 and customer engagement has already begun. David Williams, Arqit Founder, Chairman and CEO said: “Enterprises want to deploy Private 5G networks with complete confidence that they will be safe from both current and future cyber threats including from quantum computers. Working alongside Ampliphae, we have shown that a quantum-safe Private 5G network is deliverable using Arqit’s unique encryption technology.” Trevor Graham, Ampliphae CEO said: “Private 5G can be hosted partly or completely in the Cloud, giving enterprises the opportunity to rapidly set up their own cellular networks customised to support their operations. With Ampliphae and Arqit they can now be certain that those Private 5G networks are monitored and secure against eavesdropping and disruption.” Nanda Menon, Senior Advisor Hewlett Packard Enterprise said: “In an era where security is paramount, the completion of the SEViN-5G project is a significant milestone. The delivery of a quantum-secure Private 5G testbed, achieved where Athonet have combined the Athonet core with CableFree radios, underscores the commitment to innovation and reinforces the confidence enterprises can have in deploying networks that are both cutting-edge and secure from both present and future threats.” About Arqit Arqit Quantum Inc. (Nasdaq: ARQQ, ARQQW) (Arqit) supplies a unique encryption Platform as a Service which makes the communications links of any networked device, cloud machine or data at rest secure against both current and future forms of attack on encryption – even from a quantum computer. Compliant with NSA standards, Arqit’s Symmetric Key Agreement Platform delivers a lightweight software agent that allows devices to create encryption keys locally in partnership with any number of other devices. The keys are computationally secure and operate over zero trust networks. It can create limitless volumes of keys with any group size and refresh rate and can regulate the secure entrance and exit of a device in a group. The agent is lightweight and will thus run on the smallest of end point devices. The Product sits within a growing portfolio of granted patents. It also works in a standards compliant manner which does not oblige customers to make a disruptive rip and replace of their technology. Recognised for groundbreaking innovation at the Institution of Engineering and Technology awards in 2023, Arqit has also won the Innovation in Cyber Award at the National Cyber Awards and Cyber Security Software Company of the Year Award at the Cyber Security Awards. Arqit is ISO 27001 Standard certified. www.arqit.uk About Ampliphae Ampliphae’s distributed network analytics technology provides insight into how networks are used to support enterprise operations at every level. A graduate of the prestigious LORCA cyber accelerator in London, and the AWS European Defence Accelerator, Ampliphae’s technology is already used by enterprises across multiple verticals to discover, analyse and secure the network traffic that supports their key applications and business processes. Ampliphae’s Encryption Intelligence product operates at enterprise scale to discover devices and applications that use cryptography, analysing their encryption capabilities to detect risks, including assets that are vulnerable to future quantum computer attack. Using Encryption Intelligence, the organisation can gather effective operational intelligence about their encryption landscape, both within and outside the organisation, and build an effective mitigation program to address current and future vulnerabilities.

Read More

Network Security

Cato Networks Introduces World's First SASE-based XDR

PR Newswire | January 25, 2024

Cato Networks, the leader in SASE, announced the expansion of the Cato SASE Cloud platform into threat detection and incident response with Cato XDR, the world's first SASE-based, extended detection and response (XDR) solution. Available immediately, Cato XDR utilizes the functional and operational capabilities of the Cato SASE Cloud to overcome the protracted deployment times, limited data quality, and inadequate investigation and response experience too often associated with legacy XDR solutions. Cato also introduced Cato EPP, the first SASE-managed endpoint protection platform (EPP/EDR). Together, Cato XDR and Cato EPP mark the first expansion beyond the original SASE scope pioneered by Cato in 2016 and defined by industry analysts in 2019. SASE's security capabilities encompassed threat prevention and data protection in a common, easy-to-manage, and easy-to-adopt global platform. With today's announcement, Cato is expanding SASE into threat detection, incident response, and endpoint protection without compromising on the architectural elegance captured by the original SASE definition. "Cato SASE continues to be the antidote to security complexity," says Shlomo Kramer, CEO and co-founder of Cato Networks. "Today, we extend our one-of-a-kind SASE platform beyond threat prevention and into threat detection and response. Only Cato and our simple, automated, and elegant platform can streamline security this way." An early adopter of Cato XDR is Redner's Markets, an employee-owned supermarket chain headquartered in Reading, Pennsylvania, with 75 locations. Redner's Markets' vice president of IT and Infrastructure, Nick Hidalgo, said, "The Cato platform gave us better visibility, saved time on incident response, resolved application issues, and improved network performance ten-fold." (Read more about Redner's Markets and Cato in this blog. "The convergence of XDR and EPP into SASE is not just another product; it's a game-changer for the industry," said Art Nichols, CTO of Windstream Enterprise, a Cato partner. "The innovative integration of these capabilities brings together advanced threat detection, response capabilities, and endpoint security within a unified, cloud-native architecture—revolutionizing the way enterprises protect their networks and data against increasingly sophisticated cyber threats." (Read more about what Cato partners are saying about today's news in this blog.) Platform vs. Product: The Difference Matters Cato XDR takes full advantage of the enormous benefits of the Cato SASE Cloud platform, the first platform built from the ground up to enable enterprises to connect, secure, and manage sites, users, and cloud resources anywhere in the world. Unlike disjointed point solutions and security appliances, Cato capabilities are instantly on, always available at scale, and fully converged, giving IT teams a single, shared context worldwide to understand their networks, prevent threats, and resolve problems. As an autonomous platform, Cato SASE Cloud sustains its evolution, resiliency, optimal performance, and security posture, saving enterprises the operational overhead of maintaining enterprise infrastructure. Enterprises simply subscribe to Cato to meet their business needs. Cato's cloud-native model revolutionized security and networking operations when it was introduced in 2016, a fact validated three years later in 2019 when the Cato approach was formally recognized by the industry as SASE. Breach Times Still Too Long; Limitations of Legacy XDR Cato is again revolutionizing cybersecurity with the first SASE platform to expand into threat detection, empowering security teams to become smarter and remediate incidents faster. The flood of security alerts triggered by network sensors, such as firewalls and IPS, complicates threat identification. In 2023, enterprises required 204 days on average to identify breaches.1 XDR tools help security analysts close this gap by ingesting, correlating, and contextualizing threat intelligence information with the data from native and third-party sensors. However, legacy XDR tools suffer from numerous problems relating to data quality. Sensor deployment extends the time-to-value as IT must not only install the sensors but also develop a baseline of specific organizational activity for accurate assessments. Data quality is also compromised when importing and normalizing third-party sensor data, complicating threat identification and incident response. Security analysts waste time sorting through incident stories to identify the ones most critical for immediate remediation. Once determined, incident remediation is often hampered by missing information, requiring analysts to master and switch between disparate tools. No wonder in 2023, average breach containment required more than two months.1 Cato XDR and Cato EPP Expands the Meaning of SASE Cato XDR addresses legacy XDR's limitations. Instantly activated globally, Cato XDR provides enterprises with immediate insights into threats on their networks. Incident detection is accurate due to Cato's many native sensors – NGFW, advanced threat prevention (IPS, NGAM, and DNS Security), SWG, CASB, DLP, ZTNA, RBI, and now EPP/EDR. Powered by Bitdefender's world-leading malware prevention technology, Cato EPP protects endpoints from attack – in the Cato way. Endpoint threat and user data are stored in the same converged Cato data lake as the rest of the customer's network data, simplifying cross-domain event correlation. The result is incredibly high-quality data that improves the incident identification and remediation process. Cato AI uses the data to accurately identify and rank incidents, empowering analysts to focus critical resources on an organization's most important remediation cases. Cato AI is battle-tested and proven across years of threat hunting and remediation handling by Cato MDR service agents. Remediation times reduce as detected incident stories contain the relevant information for in-depth investigation. Cato's tools sit in the same console as the native engines, enabling security analysts to view everything in one place -- the current security policy and the reviewed story. Finally, incident reporting is simplified with generative AI. Purpose-built for investigations, this natural language engine provides human-readable explanations of incident stories. Analysts save time sharing incident information with other teams and reporting to their managers.

Read More

Network Infrastructure

DISH Wireless Awarded $50 Million NTIA Grant for 5G Open RAN Integration and Deployment Center

PR Newswire | January 16, 2024

DISH Wireless, a subsidiary of EchoStar, was awarded a historic $50 million grant from the U.S. Department of Commerce's National Telecommunications and Information Administration (NTIA) to establish the Open RAN Center for Integration & Deployment (ORCID). ORCID will allow participants to test and validate their hardware and software solutions (RU, DU and CU) against a complete commercial-grade Open RAN network deployed by DISH. "The Open RAN Center for Integration and Deployment (ORCID) will serve a critical role in strengthening the global Open RAN ecosystem and building the next generation of wireless networks," said Charlie Ergen, co-founder and chairman, EchoStar. "By leveraging DISH's experience deploying the world's first standalone Open RAN 5G network, ORCID will be uniquely positioned to test and evaluate Open RAN interoperability, performance and security from domestic and international vendors. We appreciate NTIA's recognition of DISH and ORCID's role in driving Open RAN innovation and the Administration's ongoing commitment to U.S. leadership in wireless connectivity." To date, this grant represents NTIA's largest award under the Public Wireless Supply Chain Innovation Fund (Innovation Fund). ORCID will be housed in DISH's secure Cheyenne, Wyoming campus and will be supported by consortium partners Fujitsu, Mavenir and VMware by Broadcom and technology partners Analog Devices, ARM, Cisco, Dell Technologies, Intel, JMA Wireless, NVIDIA, Qualcomm and Samsung. NTIA Administrator Alan Davidson and Innovation Fund Director Amanda Toman will join EchoStar Co-Founder and Chairman Charlie Ergen, EchoStar CEO Hamid Akhavan, EVP and Chief Network Officer Marc Rouanne and other stakeholders to announce the grant and tour a DISH 5G Open RAN cell site later today in Las Vegas. During this event, DISH will outline ORCID's unique advantages, including that it will leverage DISH's experience as the only operator in the United States to commercially deploy a standalone Open RAN 5G network. DISH and its industry partners have validated Open RAN technology at scale across the country; today DISH's network covers over 246 million Americans nationwide. At ORCID, participants will be able to test and evaluate individual or multiple network elements to ensure Open RAN interoperability, performance and security, and contribute to the development, deployment and adoption of open and interoperable standards-based radio access networks. ORCID's "living laboratory" will drive the Open RAN ecosystem — from lab testing to commercial deployment. Below are highlights of ORCID: ORCID will combine both lab and field testing and evaluation activities. ORCID will be able to test elements brought by any qualified vendor against DISH's live, complete and commercial-grade Open RAN stack. ORCID will use DISH's spectrum holdings, a combination of low-, mid- and high-band frequencies, enabling field testing and evaluation. ORCID will evaluate Open RAN elements through mixing and matching with those of other vendors, rather than validating a single vendor's stack. DISH's experience in a multi-vendor environment will give ORCID unique insights about the integration of Open RAN into brownfield networks. ORCID's multi-tenant lab and field testing will occur in DISH's secure Cheyenne, Wyoming facility, which is already compliant with stringent security protocols in light of its satellite functions. About DISH Wireless DISH Wireless, a subsidiary of EchoStar Corporation (NASDAQ: SATS), is changing the way the world communicates with the Boost Wireless Network. In 2020, the company became a nationwide U.S. wireless carrier through the acquisition of Boost Mobile. The company continues to innovate in wireless, building the nation's first virtualized, Open RAN 5G broadband network, and is inclusive of the Boost Infinite, Boost Mobile and Gen Mobile wireless brands.

Read More

Network Security

Ampliphae, HPE Athonet and Arqit deliver Quantum-Safe Private 5G using Symmetric Key Agreement

PR Newswire | January 19, 2024

Arqit Quantum Inc, a leader in quantum-safe encryption, and Ampliphae Ltd (Ampliphae), a leader in network cyber security solutions, have today announced successful completion of a project that will deliver enhanced quantum-safe security for Private 5G networks. The Security Enhanced Virtualised Networking for 5G (SEViN-5G) project, funded by Innovate UK, the UK Government’s innovation agency, leveraged Ampliphae’s network security analytics technology and Arqit’s Symmetric Key Agreement Platform to deliver a quantum-secure Private 5G testbed that can protect against both current and future cyber threats. Athonet, a Hewlett Packard Enterprise acquisition, provided the Radio Access Network (RAN) equipment for the project with a cloud core hosted on AWS. Private enterprise networks based on 5G cellular technology are accelerating digital transformation across industries including manufacturing, healthcare, defence and smart cities. Private 5G gives enterprises access to high-speed, massively scalable, and ultra-reliable wireless connectivity, allowing them to implement innovative IoT and mobile solutions that enhance productivity, drive automation and improve customer engagement. The security of these networks will be paramount as they will support safety-critical infrastructure and carry highly sensitive data. But like any new technology, 5G comes with potential new threats and security risks including the threat from quantum computing. The project finished in December 2023 and customer engagement has already begun. David Williams, Arqit Founder, Chairman and CEO said: “Enterprises want to deploy Private 5G networks with complete confidence that they will be safe from both current and future cyber threats including from quantum computers. Working alongside Ampliphae, we have shown that a quantum-safe Private 5G network is deliverable using Arqit’s unique encryption technology.” Trevor Graham, Ampliphae CEO said: “Private 5G can be hosted partly or completely in the Cloud, giving enterprises the opportunity to rapidly set up their own cellular networks customised to support their operations. With Ampliphae and Arqit they can now be certain that those Private 5G networks are monitored and secure against eavesdropping and disruption.” Nanda Menon, Senior Advisor Hewlett Packard Enterprise said: “In an era where security is paramount, the completion of the SEViN-5G project is a significant milestone. The delivery of a quantum-secure Private 5G testbed, achieved where Athonet have combined the Athonet core with CableFree radios, underscores the commitment to innovation and reinforces the confidence enterprises can have in deploying networks that are both cutting-edge and secure from both present and future threats.” About Arqit Arqit Quantum Inc. (Nasdaq: ARQQ, ARQQW) (Arqit) supplies a unique encryption Platform as a Service which makes the communications links of any networked device, cloud machine or data at rest secure against both current and future forms of attack on encryption – even from a quantum computer. Compliant with NSA standards, Arqit’s Symmetric Key Agreement Platform delivers a lightweight software agent that allows devices to create encryption keys locally in partnership with any number of other devices. The keys are computationally secure and operate over zero trust networks. It can create limitless volumes of keys with any group size and refresh rate and can regulate the secure entrance and exit of a device in a group. The agent is lightweight and will thus run on the smallest of end point devices. The Product sits within a growing portfolio of granted patents. It also works in a standards compliant manner which does not oblige customers to make a disruptive rip and replace of their technology. Recognised for groundbreaking innovation at the Institution of Engineering and Technology awards in 2023, Arqit has also won the Innovation in Cyber Award at the National Cyber Awards and Cyber Security Software Company of the Year Award at the Cyber Security Awards. Arqit is ISO 27001 Standard certified. www.arqit.uk About Ampliphae Ampliphae’s distributed network analytics technology provides insight into how networks are used to support enterprise operations at every level. A graduate of the prestigious LORCA cyber accelerator in London, and the AWS European Defence Accelerator, Ampliphae’s technology is already used by enterprises across multiple verticals to discover, analyse and secure the network traffic that supports their key applications and business processes. Ampliphae’s Encryption Intelligence product operates at enterprise scale to discover devices and applications that use cryptography, analysing their encryption capabilities to detect risks, including assets that are vulnerable to future quantum computer attack. Using Encryption Intelligence, the organisation can gather effective operational intelligence about their encryption landscape, both within and outside the organisation, and build an effective mitigation program to address current and future vulnerabilities.

Read More

Network Security

Cato Networks Introduces World's First SASE-based XDR

PR Newswire | January 25, 2024

Cato Networks, the leader in SASE, announced the expansion of the Cato SASE Cloud platform into threat detection and incident response with Cato XDR, the world's first SASE-based, extended detection and response (XDR) solution. Available immediately, Cato XDR utilizes the functional and operational capabilities of the Cato SASE Cloud to overcome the protracted deployment times, limited data quality, and inadequate investigation and response experience too often associated with legacy XDR solutions. Cato also introduced Cato EPP, the first SASE-managed endpoint protection platform (EPP/EDR). Together, Cato XDR and Cato EPP mark the first expansion beyond the original SASE scope pioneered by Cato in 2016 and defined by industry analysts in 2019. SASE's security capabilities encompassed threat prevention and data protection in a common, easy-to-manage, and easy-to-adopt global platform. With today's announcement, Cato is expanding SASE into threat detection, incident response, and endpoint protection without compromising on the architectural elegance captured by the original SASE definition. "Cato SASE continues to be the antidote to security complexity," says Shlomo Kramer, CEO and co-founder of Cato Networks. "Today, we extend our one-of-a-kind SASE platform beyond threat prevention and into threat detection and response. Only Cato and our simple, automated, and elegant platform can streamline security this way." An early adopter of Cato XDR is Redner's Markets, an employee-owned supermarket chain headquartered in Reading, Pennsylvania, with 75 locations. Redner's Markets' vice president of IT and Infrastructure, Nick Hidalgo, said, "The Cato platform gave us better visibility, saved time on incident response, resolved application issues, and improved network performance ten-fold." (Read more about Redner's Markets and Cato in this blog. "The convergence of XDR and EPP into SASE is not just another product; it's a game-changer for the industry," said Art Nichols, CTO of Windstream Enterprise, a Cato partner. "The innovative integration of these capabilities brings together advanced threat detection, response capabilities, and endpoint security within a unified, cloud-native architecture—revolutionizing the way enterprises protect their networks and data against increasingly sophisticated cyber threats." (Read more about what Cato partners are saying about today's news in this blog.) Platform vs. Product: The Difference Matters Cato XDR takes full advantage of the enormous benefits of the Cato SASE Cloud platform, the first platform built from the ground up to enable enterprises to connect, secure, and manage sites, users, and cloud resources anywhere in the world. Unlike disjointed point solutions and security appliances, Cato capabilities are instantly on, always available at scale, and fully converged, giving IT teams a single, shared context worldwide to understand their networks, prevent threats, and resolve problems. As an autonomous platform, Cato SASE Cloud sustains its evolution, resiliency, optimal performance, and security posture, saving enterprises the operational overhead of maintaining enterprise infrastructure. Enterprises simply subscribe to Cato to meet their business needs. Cato's cloud-native model revolutionized security and networking operations when it was introduced in 2016, a fact validated three years later in 2019 when the Cato approach was formally recognized by the industry as SASE. Breach Times Still Too Long; Limitations of Legacy XDR Cato is again revolutionizing cybersecurity with the first SASE platform to expand into threat detection, empowering security teams to become smarter and remediate incidents faster. The flood of security alerts triggered by network sensors, such as firewalls and IPS, complicates threat identification. In 2023, enterprises required 204 days on average to identify breaches.1 XDR tools help security analysts close this gap by ingesting, correlating, and contextualizing threat intelligence information with the data from native and third-party sensors. However, legacy XDR tools suffer from numerous problems relating to data quality. Sensor deployment extends the time-to-value as IT must not only install the sensors but also develop a baseline of specific organizational activity for accurate assessments. Data quality is also compromised when importing and normalizing third-party sensor data, complicating threat identification and incident response. Security analysts waste time sorting through incident stories to identify the ones most critical for immediate remediation. Once determined, incident remediation is often hampered by missing information, requiring analysts to master and switch between disparate tools. No wonder in 2023, average breach containment required more than two months.1 Cato XDR and Cato EPP Expands the Meaning of SASE Cato XDR addresses legacy XDR's limitations. Instantly activated globally, Cato XDR provides enterprises with immediate insights into threats on their networks. Incident detection is accurate due to Cato's many native sensors – NGFW, advanced threat prevention (IPS, NGAM, and DNS Security), SWG, CASB, DLP, ZTNA, RBI, and now EPP/EDR. Powered by Bitdefender's world-leading malware prevention technology, Cato EPP protects endpoints from attack – in the Cato way. Endpoint threat and user data are stored in the same converged Cato data lake as the rest of the customer's network data, simplifying cross-domain event correlation. The result is incredibly high-quality data that improves the incident identification and remediation process. Cato AI uses the data to accurately identify and rank incidents, empowering analysts to focus critical resources on an organization's most important remediation cases. Cato AI is battle-tested and proven across years of threat hunting and remediation handling by Cato MDR service agents. Remediation times reduce as detected incident stories contain the relevant information for in-depth investigation. Cato's tools sit in the same console as the native engines, enabling security analysts to view everything in one place -- the current security policy and the reviewed story. Finally, incident reporting is simplified with generative AI. Purpose-built for investigations, this natural language engine provides human-readable explanations of incident stories. Analysts save time sharing incident information with other teams and reporting to their managers.

Read More

Network Infrastructure

DISH Wireless Awarded $50 Million NTIA Grant for 5G Open RAN Integration and Deployment Center

PR Newswire | January 16, 2024

DISH Wireless, a subsidiary of EchoStar, was awarded a historic $50 million grant from the U.S. Department of Commerce's National Telecommunications and Information Administration (NTIA) to establish the Open RAN Center for Integration & Deployment (ORCID). ORCID will allow participants to test and validate their hardware and software solutions (RU, DU and CU) against a complete commercial-grade Open RAN network deployed by DISH. "The Open RAN Center for Integration and Deployment (ORCID) will serve a critical role in strengthening the global Open RAN ecosystem and building the next generation of wireless networks," said Charlie Ergen, co-founder and chairman, EchoStar. "By leveraging DISH's experience deploying the world's first standalone Open RAN 5G network, ORCID will be uniquely positioned to test and evaluate Open RAN interoperability, performance and security from domestic and international vendors. We appreciate NTIA's recognition of DISH and ORCID's role in driving Open RAN innovation and the Administration's ongoing commitment to U.S. leadership in wireless connectivity." To date, this grant represents NTIA's largest award under the Public Wireless Supply Chain Innovation Fund (Innovation Fund). ORCID will be housed in DISH's secure Cheyenne, Wyoming campus and will be supported by consortium partners Fujitsu, Mavenir and VMware by Broadcom and technology partners Analog Devices, ARM, Cisco, Dell Technologies, Intel, JMA Wireless, NVIDIA, Qualcomm and Samsung. NTIA Administrator Alan Davidson and Innovation Fund Director Amanda Toman will join EchoStar Co-Founder and Chairman Charlie Ergen, EchoStar CEO Hamid Akhavan, EVP and Chief Network Officer Marc Rouanne and other stakeholders to announce the grant and tour a DISH 5G Open RAN cell site later today in Las Vegas. During this event, DISH will outline ORCID's unique advantages, including that it will leverage DISH's experience as the only operator in the United States to commercially deploy a standalone Open RAN 5G network. DISH and its industry partners have validated Open RAN technology at scale across the country; today DISH's network covers over 246 million Americans nationwide. At ORCID, participants will be able to test and evaluate individual or multiple network elements to ensure Open RAN interoperability, performance and security, and contribute to the development, deployment and adoption of open and interoperable standards-based radio access networks. ORCID's "living laboratory" will drive the Open RAN ecosystem — from lab testing to commercial deployment. Below are highlights of ORCID: ORCID will combine both lab and field testing and evaluation activities. ORCID will be able to test elements brought by any qualified vendor against DISH's live, complete and commercial-grade Open RAN stack. ORCID will use DISH's spectrum holdings, a combination of low-, mid- and high-band frequencies, enabling field testing and evaluation. ORCID will evaluate Open RAN elements through mixing and matching with those of other vendors, rather than validating a single vendor's stack. DISH's experience in a multi-vendor environment will give ORCID unique insights about the integration of Open RAN into brownfield networks. ORCID's multi-tenant lab and field testing will occur in DISH's secure Cheyenne, Wyoming facility, which is already compliant with stringent security protocols in light of its satellite functions. About DISH Wireless DISH Wireless, a subsidiary of EchoStar Corporation (NASDAQ: SATS), is changing the way the world communicates with the Boost Wireless Network. In 2020, the company became a nationwide U.S. wireless carrier through the acquisition of Boost Mobile. The company continues to innovate in wireless, building the nation's first virtualized, Open RAN 5G broadband network, and is inclusive of the Boost Infinite, Boost Mobile and Gen Mobile wireless brands.

Read More

Events