Join Our Newsletter





Events Calendar

« < March 2017 > »
S M T W T F S
26 27 28 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1
Home arrow Marketing Research News arrow Latest Market Research Findings arrow Research finds Network Function Virtualization among the game-changers
Research finds Network Function Virtualization among the game-changers PDF Print E-mail
Written by AdaptiveMobile   
26 Feb 2015

AdaptiveMobile (www.adaptivemobile.com ), the world leader in mobile security, today issued research that outlines the opportunity that communications service providers (CSPs) have in securing the enterprise by offering Security-as-a-Service (SaaS). The company has issued the findings in a new white paper, which found that trends such as remote working, the adoption of public and private cloud services, BYOD and shadow IT are making the traditional perimeter approach to security almost impossible to maintain.

The research found that two developments in technology --network function virtualization and software defined networking – allow CPSs to offer shortened network configuration times as well as a combination of network services and hosted security offerings that better meet the changing nature of enterprise security. CSPs can deploy Internet-facing services -- such as enterprise firewalls, mail relays, anti-virus, VPN concentrators, and intrusion prevention systems -- as Virtual Network Functions, which give the level of security that larger enterprises need while also offering a level of protection not fully available to small to medium businesses today.

Among the points covered in the whitepaper:

Why enterprises of all sizes are living below the “security poverty line” due to factors as diverse as limitations from best of breed security vendors, ad hoc security deployments, and poor security practices associated with practices like Single Sign On How the mobile carrier network is best suited to provide security in a perimeter-less world, where always-on, easy access and data access across devices is the norm What Identity Access Management means for enterprises and why CSPs are best equipped to manage it “We are looking at an enterprise security environment in which it is necessary to monitor data from the network perimeter, server farms and all endpoint devices,” said Jim Donnelly, Director of Strategic Programmes, AdaptiveMobile. “Given the changes in technology, mobile operators are now positioned to protect the enterprise network to give carrier-grade protection against a host of security threats. This opportunity will give a powerful version of SaaS that will help in data protection as the enterprise network continues to evolve.”

To download a copy of the whitepaper, visit http://www.adaptivemobile.com/downloads/enterprise-security-as-a-service-delivered-by-csps .
Last Updated ( 26 Feb 2015 )
 
< Prev   Next >

Polls

How important is market research to start-ups in the current economic climate?
 

RSS Feeds

Subscribe Now