NGN: Carriers and Vendors Must Take Security Seriously

Size: px
Start display at page:

Download "NGN: Carriers and Vendors Must Take Security Seriously"

Transcription

1 Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place by mid-2004 and carriers will offer secure services by By Andy Rolfe Recommendations Equipment vendors and carriers must recognize the importance of standards to the nextgeneration network (NGN) and contribute to the development of robust and timely specifications. Enterprises should be aware of the risks of premature adoption of open, packet-based networks for simple communications. Carriers and enterprises need to be sure that security measures in the NGN are adequate and effective before using the technology. Publication Date:21 February 2003

2 2 NGN: Carriers and Vendors Must Take Security Seriously Introduction Today's public switched telephone network (PSTN) is inherently secure. Individual telephones can originate only very simple control messages. Control instructions cannot easily masquerade as voice content. Digital access from a private branch exchange (PBX) has strictly limited ability to send control messages. And carriers' core signaling system (known as SS7) is protected from external access. These security features will be lost as networks migrate to the next-generation network (NGN), which will be founded on packet-based architectures. This type of architecture is currently vulnerable to many forms of malicious activity. But the industry is working to address its vulnerabilities and Gartner Dataquest expects the first set of comprehensive standards to be completed during 2004, with products following in Security in the Network for 2010 By 2010, the PSTN will have moved from the current connection-oriented, voiceoptimized service to a packet-based architecture supporting seamless integration of many different media and content types. Implementation of the NGN will be an evolutionary process, and protection from vulnerabilities will need to be embedded in much of the new infrastructure. Carriers offering network services based on Internet Protocol (IP) will not only need to protect their infrastructure from attacks, but will also be expected to protect their customers' end-systems. By 2010, monitoring and preventing security and denial-of-service attacks will have become a significant part of the roles of national and international carriers. Indeed, Gartner Dataquest expects governments to mandate minimum levels of security from carriers well before The architecture of the network in 2010 will incorporate protection against vulnerabilities at every level. All external interfaces will be secured, be they to customer equipment, the traditional PSTN or other IP networks, including the Internet. Every component of the infrastructure will be "hardened" against intrusion and denial-of-service attack. Finally, all vulnerable control and communications traffic will be encrypted. Points of Contact With the Internet The NGN will be logically separate from the Internet, but there will be many points of contact between the two, including: Formal NGN-to-Internet connections. Probably implemented at each NGN carrier, these will allow users of voice on the Internet to communicate with NGN users. Global IP control links. The NGN will need to be part of the global IP address space, requiring links from the Domain Naming System (DNS) to the NGN and the Internet. Links at every customer's premises. These will include devices used for Internet and NGN communications (for example, soft phones and PCs in contact centers) Gartner, Inc. and/or its Affiliates. All Rights Reserved. 21 February 2003

3 Internet Vulnerabilities Attacks on an IP network infrastructure rely on the need for at least some of the infrastructure's components to be visible to end-systems. IP communication is not feasible without end-system visibility of at least the domain name servers and a default router both potentially vulnerable infrastructure components. Common attacks exploit potential known weaknesses in equipment, including "buffer overflow," "infinite routing table" and weaknesses in the Simple Network Management Protocol (SNMP). Once control has been gained of a router or domain name server, access to other components in the IP infrastructure is possible. An IP infrastructure allows any device to communicate with any other device. To be accessible, hosts and servers advertise their presence through the DNS. The structure of domain names, IP addresses and addresses makes it relatively easy for hackers to guess the names and addresses of connected resources. End-systems are potentially vulnerable to intrusion attacks, viruses and denial-ofservice attacks. 3 Challenges for the NGN Network Address Translation Many enterprises use Network Address Translation (NAT) at the boundary between their private network and the Internet. However, the Session Initiation Protocol (SIP) that the NGN will use to locate users and set up calls will not work through many current routers or firewalls that implement NAT. There are (unfortunately) many different ways to solve the SIP and NAT firewall problem, but none is yet a standard. Session Initiation Protocol There are security vulnerabilities associated with SIP itself: SIP messages are, by default, sent in plain, unencoded text, and are therefore easy to intercept and alter. There are some security options in SIP, and SIP messages can also use other security and encryption protocols. However, there is currently no method for SIP entities to securely negotiate what security mechanism they will use. This leaves SIP vulnerable to "man in the middle" and other attacks that force the use of low levels of security, which are easily breached. These problems and privacy issues are being addressed by the Internet Engineering Task Force (IETF). Reliable Transport Protocol Calls in the NGN will be carried by the Reliable Transport Protocol (RTP). This protocol is vulnerable to interception and alteration of, for example, source or destination addresses. Without encryption of RTP calls, the NGN will be unable to offer protection from identity theft or alteration of call contents. Early proposals do specify an "interim" encryption scheme, but also state that lower-layer protocols are expected to provide security in the future. As with many other security vulnerabilities, there is no clear standard for RTP security. Code and Script Attacks Real and soft IP telephones and PBXs are potentially vulnerable to attack from executable code or scripts. These could be used to manipulate users or NGN interfaces, or to propagate other types of attack, such as distributed denial of service Gartner, Inc. and/or its Affiliates. All Rights Reserved. 21 February 2003

4 4 NGN: Carriers and Vendors Must Take Security Seriously Gartner Dataquest expects to see widespread attempts at theft of service, where hackers divert the telephone services of legitimate subscribers to their own uses. IP-based voice services will require protection similar to the firewalls and malicious code protection that protect corporate data networks. Over-the-air upgrades and any area where users or administrators can download executables represent potential attack paths. Risks are also inherent in downloads of scripts written in Extensible Markup Language (XML). These and others are being addressed by the IETF's media gateway control standards. Transition to a Secure NGN Gartner Dataquest believes that, by 2010, there will have been much progress toward a secure NGN, and maintaining security will have become a significant part of carriers' roles. Governments and other organizations will become increasingly involved in defining and promoting NGN security. We expect several developments by 2010: Standards The first set of comprehensive NGN security standards should be completed during 2004, with standards-compliant products appearing in Certification Independent certification for NGN security will have emerged. Industry agreements Carriers will agree on secure integration or standardization of systems for authentication, authorization and access (AAA). Ways of integrating carrier and enterprise AAA systems will also emerge. Product developments Appropriate elements of the NGN security architecture will be integrated into the infrastructure. There will be voice-over-ip-aware, firewall-like barriers to the Internet and other carriers. There will be constraints on the propagation of XML, including XML codesigning. Service processes Carriers will have established and gained experience of operational security procedures. Carriers will use sophisticated, highly responsive systems for testing, monitoring and detecting intrusion. Carriers will collaborate globally to monitor for, detect and prevent the propagation of new attacks Gartner, Inc. and/or its Affiliates. All Rights Reserved. 21 February 2003

5 2003 Gartner, Inc. and/or its Affiliates. All Rights Reserved. 21 February

6 6 NGN: Carriers and Vendors Must Take Security Seriously This document has been published to the following Marketplace codes: TELC-WW-DP-0312 For More Information... In North America and Latin America: In Europe, the Middle East and Africa: In Asia/Pacific: In Japan: Worldwide via gartner.com: Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice

Central and Eastern Europe: Premises Switching Equipment Market Share, 2002 (Executive Summary) Executive Summary

Central and Eastern Europe: Premises Switching Equipment Market Share, 2002 (Executive Summary) Executive Summary Central and Eastern Europe: Premises Switching Equipment Market Share, (Executive Summary) Executive Summary Publication Date: 15 July 2003 Author Megan Fernandez This document has been published to the

More information

NGN: The Evolution of Wireless Networks

NGN: The Evolution of Wireless Networks NGN: The Evolution of Wireless Networks Research Brief Abstract: Operators of mobile phone networks are already working through the financial and technical challenges of their own next generation of networks.

More information

SOHO and Residential Routers: Worldwide Market Share and Forecast, (Executive Summary) Executive Summary

SOHO and Residential Routers: Worldwide Market Share and Forecast, (Executive Summary) Executive Summary SOHO and Residential Routers: Worldwide Market Share and Forecast, 2002-2007 (Executive Summary) Executive Summary Publication Date: 23 May 2003 Authors Rachna Ahlawat Gauri Pavate This document has been

More information

Global Telecommunications Market Take, 1Q03 (Executive Summary) Executive Summary

Global Telecommunications Market Take, 1Q03 (Executive Summary) Executive Summary Global Telecommunications Market Take, 1Q03 (Executive Summary) Executive Summary Publication Date: 9 April 2003 Author Wm.L.Hahn This document has been published to the following Marketplace codes: TELC-WW-EX-0576

More information

IT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary

IT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary IT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary Publication Date: 15 December 2003 Author Eric Goodness This document has been published to the

More information

Firewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary

Firewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary Firewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary Publication Date: 20 August 2003 Authors Caroline Jones Andy Rolfe This document has been published

More information

NGN: Enterprise IP Telephony

NGN: Enterprise IP Telephony NGN: Enterprise IP Telephony Research Brief Abstract: Enterprises have been slow to adopt Internet Protocol-based telephony. Vendors should educate them as to its benefits, using realistic calculations

More information

IT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary

IT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary IT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary Publication Date: 31 March 2003 Author Kobita Desai This document has been published to the

More information

Survey of Mobile Phone Users in Poland and Russia, 2003 (Executive Summary) Executive Summary

Survey of Mobile Phone Users in Poland and Russia, 2003 (Executive Summary) Executive Summary Survey of Mobile Phone Users in Poland and Russia, 2003 (Executive Summary) Executive Summary Publication Date: 3 December 2003 Author Sarah Randall This document has been published to the following Marketplace

More information

FICON Drives Fibre Channel Security

FICON Drives Fibre Channel Security FICON Drives Fibre Channel Security Research Brief Abstract: FICON products for mainframes impact the Fibre Channel switch market as FICON requirements drive improvements in security, benefiting all Fibre

More information

Push-to-Talk Brings Voice-Based Instant Messaging to Europe

Push-to-Talk Brings Voice-Based Instant Messaging to Europe Research Brief Push-to-Talk Brings Voice-Based Instant Messaging to Europe Abstract: Push-to-talk services will soon let Europe s mobile phone users send voice messages via IP, boosting data revenue. Young

More information

Worldwide 2002 Security Software Market and Vendor Shares (Executive Summary) Executive Summary

Worldwide 2002 Security Software Market and Vendor Shares (Executive Summary) Executive Summary Worldwide Security Software Market and Vendor Shares (Executive Summary) Executive Summary Publication Date: 21 July 2003 Author Norma Schroder This document has been published to the following Marketplace

More information

Mobile Terminals: Middle East, (Executive Summary) Executive Summary

Mobile Terminals: Middle East, (Executive Summary) Executive Summary Mobile Terminals: Middle East, 2001-2007 (Executive Summary) Executive Summary Publication Date: 25 July 2003 Authors Carolina Milanesi Ben Wood This document has been published to the following Marketplace

More information

DBMS Software Market Forecast, (Executive Summary) Executive Summary

DBMS Software Market Forecast, (Executive Summary) Executive Summary DBMS Software Market Forecast, 2003-2007 (Executive Summary) Executive Summary Publication Date: 4 September 2003 Author Colleen Graham This document has been published to the following Marketplace codes:

More information

Europe Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary

Europe Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary Europe Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary Publication Date: 1 July 2003 Authors Fabrizio Biscotti Alain Dang Van Mien Norma Schroder Chris Pang This document

More information

Leased-Line Market Thrives in Asia/ Pacific Despite Bandwidth Glut (Executive Summary) Executive Summary

Leased-Line Market Thrives in Asia/ Pacific Despite Bandwidth Glut (Executive Summary) Executive Summary Leased-Line Market Thrives in Asia/ Pacific Despite Bandwidth Glut (Executive Summary) Executive Summary Publication Date: December 4, 2002 Authors Alayne Wong To Chee Eng Evelyn Goh Kenshi Tazaki Andrew

More information

Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary

Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary Publication Date: 21 March 2003 Authors Cathy Tornbohm Peter Redshaw This document has been published to the following Marketplace

More information

Trends in Fixed Public Network Services: Finland, (Executive Summary) Executive Summary

Trends in Fixed Public Network Services: Finland, (Executive Summary) Executive Summary Trends in Fixed Public Network Services: Finland, 2000-2006 (Executive Summary) Executive Summary Publication Date: October 17, 2002 Authors Susan Richardson Maureen Coulter Michal Halama Katja Ruud Lisa

More information

IP Backbone Opportunities in Asia/Pacific (Executive Summary) Executive Summary

IP Backbone Opportunities in Asia/Pacific (Executive Summary) Executive Summary IP Backbone Opportunities in Asia/Pacific (Executive Summary) Executive Summary Publication Date: September 9, 2002 Author Chee Eng To This document has been published to the following Cluster codes: TELC-WW-EX-0423

More information

Wireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary

Wireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary Wireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary Publication Date: October 14, 2002 Authors To Chee Eng Evelyn Goh Kobita Desai This document has been published to the following

More information

AIOs Displace Single-Function Printers in Latin America

AIOs Displace Single-Function Printers in Latin America ` Market Analysis AIOs Displace Single-Function Printers in Latin America Abstract: Stand-alone printer shipments have dropped sharply, while inkjet all-in-one printers continue to gain market share in

More information

Mobile Terminals: Western Europe, (Executive Summary) Executive Summary

Mobile Terminals: Western Europe, (Executive Summary) Executive Summary Mobile Terminals: Western Europe, 1998-2007 (Executive Summary) Executive Summary Publication Date: 6 June 2003 Authors Carolina Milanesi Ben Wood This document has been published to the following Marketplace

More information

Current and Next-Generation Switching in Asia/Pacific and Japan, 2003 (Executive Summary) Executive Summary

Current and Next-Generation Switching in Asia/Pacific and Japan, 2003 (Executive Summary) Executive Summary Current and Next-Generation Switching in Asia/Pacific and Japan, 2003 (Executive Summary) Executive Summary Publication Date: 25 August 2003 Authors Hyun-Sook Lee Sumit Malik John Calvert This document

More information

Finding Pure-Play Midtier ESPs: A Two-Step Process

Finding Pure-Play Midtier ESPs: A Two-Step Process Research Brief Finding Pure-Play Midtier ESPs: A Two-Step Process Abstract: The pure-play midtier consulting and integration sector can be a competitive option to global integrators. Tier 2 and 3 vendors

More information

Midsize Business Voice Service Spending Steady for 2003

Midsize Business Voice Service Spending Steady for 2003 End-User Analysis Midsize Business Voice Service Spending Steady for 23 Abstract: Telecom service providers need to know the voice telecom spending plans of the margin-rich midsize business segment in

More information

HDD Head and Media Markets Show Variable Growth and Decline, (Executive Summary) Executive Summary

HDD Head and Media Markets Show Variable Growth and Decline, (Executive Summary) Executive Summary HDD Head and Media Markets Show Variable Growth and Decline, 1998-2002 (Executive Summary) Executive Summary Publication Date: 12 March 2003 Author John Monroe This document has been published to the following

More information

Worldwide Workstation Shipments Rebound in Third Quarter

Worldwide Workstation Shipments Rebound in Third Quarter Market Analysis Worldwide Workstation Shipments Rebound in Third Quarter Abstract: Preliminary worldwide workstation shipments totaled 384,756 units in the third quarter of 2003, for a year-over-year increase

More information

Huawei: China's Leading Equipment Vendor Returns to Growth

Huawei: China's Leading Equipment Vendor Returns to Growth Research Brief Huawei: China's Leading Equipment Vendor Returns to Growth Abstract: Huawei has turned in a strong performance during the first half of 2003. The second half of the year could be even better.

More information

4Q02 Update: Disk Storage Forecast Scenarios,

4Q02 Update: Disk Storage Forecast Scenarios, Forecast Analysis 4Q02 Update: Disk Storage Forecast Scenarios, 2002-2003 Abstract: Clearly, the near-term fate of the disk storage system market is more tightly coupled with micro IT spending trends than

More information

Fixed Public Services Trends in CEE and MEA, (Executive Summary) Executive Summary

Fixed Public Services Trends in CEE and MEA, (Executive Summary) Executive Summary Fixed Public Trends in CEE and MEA, 2001-2007 (Executive Summary) Executive Summary Publication Date: 4 August 2003 Author William L. Hahn This document has been published to the following Marketplace

More information

Public Infrastructure: What s in Store for 2003?

Public Infrastructure: What s in Store for 2003? Forecast Analysis Public Infrastructure: What s in Store for 2003? Abstract: The markets for public infrastructure equipment will remain weak until 2004 because of scaled-back carrier capital spending,

More information

Users and Vendors Speak Out: Authentication and Biometrics

Users and Vendors Speak Out: Authentication and Biometrics Market Analysis Users and Vendors Speak Out: Authentication and Biometrics Abstract: Authentication and biometrics play an important part in enterprise security. However, their overuse has spawned a lofty

More information

External RAID-Based Storage System Analysis by Form Factor

External RAID-Based Storage System Analysis by Form Factor Research Brief External RAID-Based Storage System Analysis by Form Factor Abstract: Gartner Dataquest forecasts factory revenue for modular external RAID controllerbased storage systems will grow at a

More information

Semiconductor Market for Data Processing: Asia/Pacific, 3Q03

Semiconductor Market for Data Processing: Asia/Pacific, 3Q03 Research Brief Semiconductor Market for Data Processing: Asia/Pacific, 3Q03 Abstract: Semiconductor market conditions have improved since the second quarter of 2003, and the industry's recovery is continuing.

More information

Mobile Java: A New Opportunity for Data Services (Executive Summary) Executive Summary

Mobile Java: A New Opportunity for Data Services (Executive Summary) Executive Summary Mobile Java: A New Opportunity for Data Services (Executive Summary) Executive Summary Publication Date: November 1, 2002 Authors Ben Wood Alan Brown Ann Liang Nahoko Mitsuyama Delia MacMillan Sauk-Hun

More information

Trends in Fixed Public Network Services: Austria, (Executive Summary) Executive Summary

Trends in Fixed Public Network Services: Austria, (Executive Summary) Executive Summary Trends in Fixed Public Network Services: Austria, 2000-2006 (Executive Summary) Executive Summary Publication Date: September 25, 2002 Authors Michal Halama Maureen Coulter Katja Ruud Susan Richardson

More information

Asia/Pacific: Systems Consolidation, Hype or Reality?

Asia/Pacific: Systems Consolidation, Hype or Reality? Research Brief Asia/Pacific: Systems Consolidation, Hype or Reality? Abstract: Through 2005, consolidation will be of major concern to IT management in Asia/Pacific as organizations struggle to control

More information

Little Smart, Big Plans: PHS Storms Ahead in China

Little Smart, Big Plans: PHS Storms Ahead in China Research Brief Little Smart, Big Plans: PHS Storms Ahead in China Abstract: Based on personal handyphone system technology, Little Smart has emerged as one of the fastest-growing services in the telecom

More information

Spending on Service Provider Routers Begins to Grow in EMEA

Spending on Service Provider Routers Begins to Grow in EMEA Research Brief Spending on Service Provider Routers Begins to Grow in EMEA Abstract: 2Q03 brought the first rise in end-user spending on service provider routers in Europe, Middle East and Africa for a

More information

Trends in Fixed Public Network Services: Germany, (Executive Summary) Executive Summary

Trends in Fixed Public Network Services: Germany, (Executive Summary) Executive Summary Trends in Fixed Public Network Services: Germany, 2000-2006 (Executive Summary) Executive Summary Publication Date: October 18, 2002 Authors Michal Halama Katja Ruud Maureen Coulter Susan Richardson Lisa

More information

COM I. Keene, B. Hafner

COM I. Keene, B. Hafner I. Keene, B. Hafner Research Note 23 December 2002 Commentary The Telecommunications and Networking Hype Cycle New networking technologies and services continue to stream into the telecommunications marketplace.

More information

Web Services Take Root in Banks and With Asset Managers

Web Services Take Root in Banks and With Asset Managers Strategic Planning, M. Knox, W. Andrews, C. Abrams Research Note 18 December 2003 Web Services Take Root in Banks and With Asset Managers Financial-services providers' early Web services implementations

More information

TCPN-WW-CV-0102 Frank Fabricius

TCPN-WW-CV-0102 Frank Fabricius Frank Fabricius Cluster Research Catalog 30 December 2003 Public Network Infrastructure Worldwide Cluster Research Archive The Cluster Research Archive is a listing of deliverables for the Public Network

More information

China: User Perceptions and Plans for PCs and PDAs in 2003

China: User Perceptions and Plans for PCs and PDAs in 2003 End-User Analysis China: User Perceptions and Plans for PCs and PDAs in 2003 Abstract: The majority of the Chinese organizations' IT strategies and budget planning issues remain immature. It would not

More information

SONET Links Extend Fibre Channel SANs

SONET Links Extend Fibre Channel SANs SONET Links Extend Fibre Channel SANs Research Brief Abstract: Emerging product that support the transport of storage commands and data over Synchronous Optical Network or Synchronous Digital Hierarchy

More information

Choices Multiply in Midrange and High-End Color Printing

Choices Multiply in Midrange and High-End Color Printing Research Brief Choices Multiply in Midrange and High-End Color Printing Abstract: Color speed is no longer an oxymoron. Color copiers and printers with speeds between 30 and 50 pages per minute are commonly

More information

Hardware Decisions for Embedded Systems Design in Asia/Pacific

Hardware Decisions for Embedded Systems Design in Asia/Pacific End-User Analysis Hardware Decisions for Embedded Systems Design in Asia/Pacific Abstract: Over 900 embedded systems designers in Asia/Pacific responded to our survey of hardware decisions. Currently,

More information

Ericsson Rolls Out BT Next-Generation Switching Network

Ericsson Rolls Out BT Next-Generation Switching Network Market Analysis Ericsson Rolls Out BT Next-Generation Switching Network Abstract: The upgrade of BT's trunking network represents one of the largest next-generation switching deployments. Ericsson's ENGINE

More information

2002 Semiconductor Equipment Market Share Analysis (Executive Summary) Executive Summary

2002 Semiconductor Equipment Market Share Analysis (Executive Summary) Executive Summary 2002 Semiconductor Equipment Market Share Analysis (Executive Summary) Executive Summary Publication Date: 2 May 2003 Authors Mark Stromberg Klaus Rinnen Jim Walker Robert Johnson Dean Freeman Takashi

More information

Apple Computer Unveils New Hybrid X Server Operating System

Apple Computer Unveils New Hybrid X Server Operating System Research Brief Apple Computer Unveils New Hybrid X Server Operating System Abstract: Apple Computer recently unveiled the Apple OS Xserve operating system on its X Serve one-unit rack platforms. Apple's

More information

Final 2002 Asia/Pacific Semiconductor Market Share by Geographical Area (Executive Summary) Executive Summary

Final 2002 Asia/Pacific Semiconductor Market Share by Geographical Area (Executive Summary) Executive Summary Final Asia/Pacific Semiconductor Share by Geographical Area (Executive Summary) Executive Summary Publication Date: 22 May 2003 Authors Hee-Chan Lee Adriana Blanco Ada Cheng Jeremey Donovan Tamara Grant

More information

CIO Update: Security Platforms Will Transform the Network Security Arena

CIO Update: Security Platforms Will Transform the Network Security Arena IGG-11202002-02 J. Pescatore, M. Easley, R. Stiennon Article 20 November 2002 CIO Update: Security Platforms Will Transform the Network Security Arena An integrated network security platform approach will

More information

4Q03 Update: Wireless Communications Semiconductor Forecast,

4Q03 Update: Wireless Communications Semiconductor Forecast, Forecast Analysis 4Q03 Update: Wireless Communications Semiconductor Forecast, 2003-2005 Abstract: Mobile communications semiconductor revenue was strong in the third quarter. 2003 is on a path for 16

More information

Nortel Networks Optivity Policy Services

Nortel Networks Optivity Policy Services Sharon Fisher Product Report 7 January 2004 Nortel Networks Optivity Policy Services Summary Optivity Policy Services is system-level software for managing the traffic prioritization and network access

More information

South Korea Ponders Its High-Speed Future

South Korea Ponders Its High-Speed Future Research Brief South Korea Ponders Its High-Speed Future Abstract: The South Korean government may detail a radical proposal to create a new integrated high-speed network covering most of South Korea in

More information

Can you wait until 2010?

Can you wait until 2010? Decision Framework, M.Silver,A.Park Research Note 5 December 2003 Who Should Deploy Office 2003, and When Enterprises that intend to skip Office 2003 should ensure that they are comfortable with their

More information

Security for SIP-based VoIP Communications Solutions

Security for SIP-based VoIP Communications Solutions Tomorrow Starts Today Security for SIP-based VoIP Communications Solutions Enterprises and small to medium-sized businesses (SMBs) are exposed to potentially debilitating cyber attacks and exploitation

More information

These patterns include: The use of proprietary software

These patterns include: The use of proprietary software Strategic Planning, F. Kenney, J. Thompson Research Note 7 August 2003 B2B Security Patterns: Finding the Perfect Combination Achieving business-to-business security is a combination of examining internal

More information

Asia/Pacific and Japan: Optical Network Equipment Market, (Executive Summary) Executive Summary

Asia/Pacific and Japan: Optical Network Equipment Market, (Executive Summary) Executive Summary Asia/Pacific and Japan: Optical Network Equipment Market, 1998-2007 (Executive Summary) Executive Summary Publication Date: 30 June 2003 Authors Sumit Malik John Mazur This document has been published

More information

Should You Use Liberty or Passport for Digital Identities?

Should You Use Liberty or Passport for Digital Identities? Select Q&A, J. Pescatore, A. Litan Research Note 12 August 2003 Should You Use Liberty or Passport for Digital Identities? Federated digital identities, such as from the Liberty Alliance and Microsoft

More information

NetIQ's VoIP Management Products

NetIQ's VoIP Management Products Products, D. Neil Research Note 10 September 2002 NetIQ's VoIP Management Products NetIQ has announced its Voice over IP management strategy and has a number of pre- and post-implementation products available.

More information

What is SIP Trunking? ebook

What is SIP Trunking? ebook What is SIP Trunking? ebook A vast resource for information about all things SIP including SIP, security, VoIP, SIP trunking and Unified Communications. Table of Contents 3 4 5 6 7 8 9 10 11 What is the

More information

DPRO Kimberly K. Hiller, Gerald Arcuri

DPRO Kimberly K. Hiller, Gerald Arcuri Kimberly K. Hiller, Gerald Arcuri Technology Overview 27 August 2003 Routers: Overview Summary Routers continue to evolve with better performance and a larger variety of WAN and LAN options, and security.

More information

Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model

Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model 1. Description of Services. 1.1 SIP SBC with Field Trial Endpoint Deployment Verizon will assist

More information

2018 Trends in Hosting & Cloud Managed Services

2018 Trends in Hosting & Cloud Managed Services PREVIEW 2018 Trends in Hosting & Cloud Managed Services DEC 2017 Rory Duncan, Research Director, Managed Services & Hosting Penny Jones, Principal Analyst - MTDC & Managed Services Aaron Sherrill, Senior

More information

4Q03 Update: Global Semiconductor Forecast Scenarios

4Q03 Update: Global Semiconductor Forecast Scenarios Forecast Analysis 4Q03 Update: Global Semiconductor Forecast Scenarios Abstract Semiconductor revenue growth in 2003 is certain to exceed 11 percent. As the industry recovery gains pace in the coming quarters,

More information

Real-time Communications Security and SDN

Real-time Communications Security and SDN Real-time Communications Security and SDN 2016 [Type here] Securing the new generation of communications applications, those delivering real-time services including voice, video and Instant Messaging,

More information

Frequently Asked Questions (Dialogic BorderNet 500 Gateways)

Frequently Asked Questions (Dialogic BorderNet 500 Gateways) Frequently Asked Questions (Dialogic BorderNet 500 Gateways) Q: What is a Dialogic BorderNet 500 Gateway, and what are its main functions? A: A Dialogic BorderNet 500 Gateway consists of a full featured

More information

Ending the Confusion About Software- Defined Networking: A Taxonomy

Ending the Confusion About Software- Defined Networking: A Taxonomy Ending the Confusion About Software- Defined Networking: A Taxonomy This taxonomy cuts through confusion generated by the flood of vendor SDN announcements. It presents a framework that network and server

More information

Host-Bus RAID Controller Worldwide Market Share, 2002 (Executive Summary) Executive Summary

Host-Bus RAID Controller Worldwide Market Share, 2002 (Executive Summary) Executive Summary Host-Bus RAID Controller Worldwide Market Share, 2002 (Executive Summary) Executive Summary Publication Date: 23 July 2003 Author Roger W. Cox This document has been published to the following Marketplace

More information

Mobile Phones, Poor Economy to Dampen PDA Market to 2007

Mobile Phones, Poor Economy to Dampen PDA Market to 2007 Forecast Analysis Mobile Phones, Poor Economy to Dampen PDA Market to 2007 Abstract: A stagnant economy and growing competition from mobile phones have reduced our expectations for PDA market growth. Worldwide

More information

14th Edition. Global Macrocell Radio Transceiver (TRx) Unit Market Analysis and Forecast, April 2018

14th Edition. Global Macrocell Radio Transceiver (TRx) Unit Market Analysis and Forecast, April 2018 Market Analysis Earl J. Lum +1-650-430-2221 elum@ejlwireless.com 14th Edition Global Macrocell Radio Transceiver (TRx) Unit Market Analysis and Forecast, 2018-2022 April 2018 Entire contents. Reproduction

More information

RID IETF Draft Update

RID IETF Draft Update RID IETF Draft Update Kathleen M. Moriarty INCH Working Group 5 August 2004 This work was sponsored by the Air Force under Air Force Contract Number F19628-00-C-0002. "Opinions, interpretations, conclusions,

More information

Internet Peering Agreements Evolve

Internet Peering Agreements Evolve Internet Peering Agreements Evolve Research Brief Abstract: Gartner Dataquest examines the dynamics of traffic exchange between Internet backbone providers, and the revenue implications for network service

More information

Firewalls for Secure Unified Communications

Firewalls for Secure Unified Communications Firewalls for Secure Unified Communications Positioning Guide 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 12 Firewall protection for call control

More information

Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide

Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide 2 Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide The software described in this book is furnished under

More information

Datacenter Cooling Market Map 2016

Datacenter Cooling Market Map 2016 MARKET MAP Datacenter Cooling Market Map 2016 MAY 2016 Andrew Donoghue, European Research Manager This report provides an overview of the datacenter cooling market, focusing on suppliers of particularly

More information

Sybase Executes on Its Partnership Strategy

Sybase Executes on Its Partnership Strategy Event Summary Sybase Executes on Its Partnership Strategy Abstract: Sybase has implemented a corporate partnership with a vertical market focus that it believes will develop into profitable channels. By

More information

White Paper. SIP Trunking: Deployment Considerations at the Network Edge

White Paper. SIP Trunking: Deployment Considerations at the Network Edge SIP Trunking: Deployment Considerations at the Network Edge at the Network Edge Executive Summary The move to Voice over IP (VoIP) and Fax over IP (FoIP) in the enterprise has, until relatively recently,

More information

Enterprise Data Architecture: Why, What and How

Enterprise Data Architecture: Why, What and How Tutorials, G. James, T. Friedman Research Note 3 February 2003 Enterprise Data Architecture: Why, What and How The goal of data architecture is to introduce structure, control and consistency to the fragmented

More information

Best Practices for Deploying Web Services via Integration

Best Practices for Deploying Web Services via Integration Tactical Guidelines, M. Pezzini Research Note 23 September 2002 Best Practices for Deploying Web Services via Integration Web services can assemble application logic into coarsegrained business services.

More information

Ingate SIParator /Firewall SIP Security for the Enterprise

Ingate SIParator /Firewall SIP Security for the Enterprise Ingate SIParator /Firewall SIP Security for the Enterprise Ingate Systems Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?... 3 3

More information

Storage Network Infrastructure Market Definitions and Forecast Methodology Guide, Gartner Dataquest Guide

Storage Network Infrastructure Market Definitions and Forecast Methodology Guide, Gartner Dataquest Guide Storage Network Infrastructure Market Definitions and Forecast Methodology Guide, 2003 Gartner Dataquest Guide Publication Date: 21 July 2003 GARTNER WORLDWIDE HEADQUARTERS NORTH AMERICA Corporate Headquarters

More information

The Case for Secure Communications

The Case for Secure Communications Whitepaper The Case for Secure Communications The tapping of voice communications has occurred virtually as long as electronic communication has been in existence. In the early days of electronic communications,

More information

Continuing Weakness in Public Infrastructure Markets

Continuing Weakness in Public Infrastructure Markets Research Brief Continuing Weakness in Public Infrastructure Markets Abstract: The markets for public infrastructure equipment will remain weak until 2004 because of scaled-back carrier capital spending,

More information

DISRUPTIVE TECHNOLOGIES IN THE DATACENTER

DISRUPTIVE TECHNOLOGIES IN THE DATACENTER DISRUPTIVE TECHNOLOGIES IN THE DATACENTER Ten Technologies Driving a Wave of Change Are there new technologies out there that could disrupt the economics and infrastructure of the modern datacenter and

More information

WHITE PAPER. Session Border Controllers: Helping keep enterprise networks safe TABLE OF CONTENTS. Starting Points

WHITE PAPER. Session Border Controllers: Helping keep enterprise networks safe TABLE OF CONTENTS. Starting Points WHITE PAPER Session Border Controllers: Helping keep enterprise networks safe TABLE OF CONTENTS Starting Points...1 The Four Essentials...2 The Business Case for SIP Trunks...3 To benefit from the latest

More information

Production Surge Boosts Automotive Semiconductor Market

Production Surge Boosts Automotive Semiconductor Market Market Analysis Production Surge Boosts Automotive Semiconductor Market Abstract: Demand for automotive semiconductors revived in 2002, as car makers stepped up production. Consumer fears may stifle growth

More information

Leveraging China's Memory Market Opportunity

Leveraging China's Memory Market Opportunity Research Brief Leveraging China's Memory Market Opportunity Abstract: The Chinese memory market offers growth opportunities for local and global semiconductor companies alike. Investments in Chinese manufacturing

More information

Cisco Webex Cloud Connected Audio

Cisco Webex Cloud Connected Audio White Paper Cisco Webex Cloud Connected Audio Take full advantage of your existing IP telephony infrastructure to help enable a Webex integrated conferencing experience Introduction Cisco Webex Cloud Connected

More information

Secure Communications on VoIP Networks

Secure Communications on VoIP Networks Mediatrix Multi-service Gateways v. 2.0.41.762 2017-12-21 Table of Contents Table of Contents Internet Telephony Network Security 4 Authentication 4 X-509 Certificates 4 Transport Layer Security (TLS)

More information

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0 Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues v Noriyuki Fukuyama v Shingo Fujimoto v Masahiko Takenaka (Manuscript received September 26, 2003) IP telephony services using VoIP (Voice

More information

Storage Network Infrastructure FC SAN Components Guide, Gartner Dataquest Guide

Storage Network Infrastructure FC SAN Components Guide, Gartner Dataquest Guide Storage Network Infrastructure FC SAN Components Guide, 2002 Gartner Dataquest Guide Publication Date: 15 May 2003 GARTNER WORLDWIDE HEADQUARTERS NORTH AMERICA Corporate Headquarters 56 Top Gallant Road

More information

Maintaining High Availability for Enterprise Voice in Microsoft Office Communication Server 2007

Maintaining High Availability for Enterprise Voice in Microsoft Office Communication Server 2007 Maintaining High Availability for Enterprise Voice in Microsoft Office Communication Server 2007 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL

More information

Configuring Symantec. device

Configuring Symantec. device Configuring Symantec AntiVirus for Hitachi File OS device Configuring Symantec AntiVirus for Hitachi File OS device The software described in this book is furnished under a license agreement and may be

More information

Midsize Businesses Slowly Warm Up to Storage Services

Midsize Businesses Slowly Warm Up to Storage Services Research Brief Midsize Businesses Slowly Warm Up to Storage Services Abstract: A recent study reveals only lukewarm demand for new storage services among midsize businesses. Assessment tools and peer references

More information

Many Challenges Remain for Mobile Communications

Many Challenges Remain for Mobile Communications Market Analysis Many Challenges Remain for Mobile Communications Abstract: The marketplace for mobile services, terminals and infrastructure has been affected by the economic slowdown and the high cost

More information

Asia/Pacific: Embedded Systems Design, Software Decisions

Asia/Pacific: Embedded Systems Design, Software Decisions Market Analysis Asia/Pacific: Embedded Systems Design, Software Decisions Abstract: An in-depth look at embedded systems designers in Asia/Pacific shows usage patterns for real-time OSs and embedded software

More information

Guide to Fixed Public Network Services: Western Europe, Gartner Dataquest Guide

Guide to Fixed Public Network Services: Western Europe, Gartner Dataquest Guide Guide to Fixed Public Network Services: Western Europe, 2003 Gartner Dataquest Guide Publication Date: 4 December 2003 GARTNER WORLDWIDE HEADQUARTERS NORTH AMERICA Corporate Headquarters 56 Top Gallant

More information