Security threats might encourage more hosting

1 min read

Convergence of computing and telephony onto IP networks is still being held back by concerns over security, according to research by the Economist Intelligence Unit for network services giant AT&T. Brian Tinham reports

Convergence of computing and telephony onto IP networks is still being held back by concerns over security, according to research by the Economist Intelligence Unit for network services giant AT&T. According to the study of 230 senior executives of global firms, 89% of firms see this as the biggest barrier to adoption. It also shows that despite flat IT budgets, spending on security rose to 14% during 2005 from 11% in 2003. Additionally, it’s clear that businesses are concerned about their own employees as sources of vulnerability. AT&T business continuity and security services manager Kees Vos says the research proves the value of external robust network services. “From our perspective it emphasises that the AT&T strategy – providing holistic network and security services, not just security on the edge of the networks – is the way to go.” He makes the point that anything less misses one important component – the network itself. “Think about denial of service attacks. Trying to resolve those at the edges doesn’t work. We take measures inside the network and, by spreading defence inside, allow defensive measures in lots of places.” Vos also suggests that unless much of an Internet-based WAN is accessible, holistic coverage is not possible. “Also, a lot of ISPs won’t be able to take action: they you don’t have access to the backbone system, so can only protect at the boundaries.” It’s a clear play for AT&T’s growing network and hosting services – which are among the best kept secrets in the industry. “Our offering is holistic,” insists Vos. “We run 18% of Internet traffic, and with that slice of overall networking, we have some capabilities there. Also, we can access intelligence from the Internet.” Worth noting that its services run from basic co-location business continuity to fully managed platforms – operating systems, servers, database (everything except the applications). “For manufacturers we provide network services for their factories: those could be VPN services, Internet services – making sure they are secure connections. A lot of companies don’t have good facilities for their IT infrastructure so we can put it right in the middle of our networks.” With many manufacturers recognising their own workers as serious sources for vulnerability, he also emphasises the controls there. “ We offer a managed service – so control over what software runs on their machines and, for remote workers, ensuring they haven’t brought in worms, Trojans, viruses and so on, through connection at wireless access points.”