The CCA Voice - Fall/Winter 2017 - 50

E V ERY T HING CON N EC T ED: M A K ING IoT A R E A LI T Y

IoT Security: Threat to an Opportunity

By Tal Rotman
Director Sales CSP North America,
Allot Communications

T

he promise of connected things
has finally started to make itself
felt as carriers launch their IoT
offerings preparing for the massive
burst of growth as connected device
growth begins to outstrip that of mobile
handsets. From fleet tracking telemetry
to home alert systems, the use cases
have been endless and many carriers
are already seeing significant revenue
generation. Competitive carriers who
cover underserved regions now have an
advantage in these areas, with massive
potential for rural based industries such
as farming and resource extraction.
One threat to this revenue source
is the increased incidence of security
breaches enabled by weak security on
IoT devices as evidenced by the Mirai
and attacks which gained notoriety
earlier this year. Whether its webcams
or heating supply, smart connected
devices with limited resources have
become a prime target and have
resulted in severe impact to some
carriers' reputations and bottom lines.
Carriers, vendors and regulators are
working tirelessly to define methods to
avoid these sorts of impacts.
But what if these threats are also
an opportunity for adding value to
the simple connectivity proposition?
Carriers should be more than an IoT data
pipe, and can be, by providing value
50

THE

added services to their connectivity
packages such as IoT security solutions.
While security should be inherent
in the design of mobile networks, the
purpose of these offerings is to provide
enterprise customers visibility & control
over the security of their devices. The
three key elements to that end are:
* Acceptable Use Policies
* Prevention of Malware Infection
* Identify & Quarantine Infected Devices
Acceptable Use Policies
Most industrial IoT devices
communicate within a set traffic profile, to
specific control servers, at specific times,
and using specific protocols. By defining
the profile as an enforceable policy carriers
can help prevent anomalous behavior.
Allowing enterprise IoT customers to
configure their own Acceptable Use
Policies can reduce the attack surface,
preventing the majority of attacks from
occurring in the first place. These should
range from simple rules templates to rich
configuration capabilities for the most
sophisticated customer admins.
Prevention of Malware Infection
Many IoT devices will communicate on
open channels with the Internet and are
often subject to malicious traffic. Malware,
spyware and ransomware are even more
of a threat to IoT as they are to consumer
mobile devices, given the limited
on-board ability to handle these attacks.
Therefore, infections must be prevented
by network based devices, through
inspection of traffic for malware. However,
the key to generating value is to ensure
that enterprise customers are aware of the
protection through both reporting and
alerting of prevented attacks.
Identify & Quarantine
Infected Devices
Once devices are infected, the
intention of such a solution would be
to prevent harm to both the enterprise

VOICE * www.ccamobile.org * Fall/Winter 2017

customer and the carrier network itself.
Botnets emanating from a carrier network
can damage reputation and also result
in blacklisting in some extreme cases.
Detection of anomalous behavior should
block or limit traffic from malfunctioning
devices to avoid these instances. Once
again customers must be made aware
of the quarantining of devices through
notifications to understand the value
provided by the service.
Finally, all of these capabilities should
be available via a carrier-branded portal
for easy provisioning of new devices. This
also will offer a frictionless onboarding
experience to ensure new enterprise
customers enjoy a smooth transition and
excellent first impression.
As the uses of IoT technology
proliferate so will the security concerns
of carriers and their customers. Embrace
these challenges to generate new
revenue streams as we enter the next
phase of the mobile data evolution.
Allot Communications (NASDAQ, TASE:
ALLT) is a leading provider of security and
monetization solutions that enable service
providers and enterprises to protect and
personalize the digital experience. Allot's
pre-integrated and highly scalable service
delivery framework leverages the traffic
intelligence in data networks to enable
service providers to get closer to their
customers, to safeguard network assets and
users, and to accelerate time-to-revenue for
value-added services.


http://www.ccamobile.org

Table of Contents for the Digital Edition of The CCA Voice - Fall/Winter 2017

Board of Directors/Staff
Chairman’s Letter by Brian L. Spurgeon
A Message from the President & CEO by Steven K. Berry
CCA’s 2017 Excellence in Marketing Awards
Trusting the Internet of Things
The Internet of Things Requires the Infrastructure of Tomorrow, Today
Hidden in Plain Sight: The Next Generation of Urban Wireless Infrastructure
The Internet of Everything: How Will We Meet the Demand for Data When Everything is Connected?
Filling the Right Network Coverage Gaps and Improving Customer Experiences
Things Once Imagined Are Becoming Possibilities
4 Steps to Enabling Cost-Effective Rural Coverage
The Future of Mobile: How to Take Advantage of IoT
Get Ready for the 5G Era
Maximizing Value in the New Paradigm of Smartphone Buying and Selling
Internet of Things: Simplifying Device-to-Human Communication with CPaaS
How Far We’ve Come: Three Ways Technology Has Shaped Interactive Wireless Retail
Remote Monitoring IoT Connectivity
Building a Profitable IoT Service by Design Not Accident
Supplemental Rich-Data Delivery Beyond ALI
A Simple Taxability Test for the Internet of Things
Looking for an Edge? Creating the Best Customer Experience is Paramount
Delivering the Bandwidth for Mobile IoT to Succeed
IoT Requires a Different Mindset
IoT Security: Threat to an Opportunity
Gateway to the IoT
Congressional Spotlight: Senator Cory Gardner (R-CO)
Company Profiles
Index of Advertisers
The CCA Voice - Fall/Winter 2017 - intro
The CCA Voice - Fall/Winter 2017 - bellyband1
The CCA Voice - Fall/Winter 2017 - bellyband2
The CCA Voice - Fall/Winter 2017 - cover1
The CCA Voice - Fall/Winter 2017 - cover2
The CCA Voice - Fall/Winter 2017 - 3
The CCA Voice - Fall/Winter 2017 - 4
The CCA Voice - Fall/Winter 2017 - 5
The CCA Voice - Fall/Winter 2017 - 6
The CCA Voice - Fall/Winter 2017 - 7
The CCA Voice - Fall/Winter 2017 - Board of Directors/Staff
The CCA Voice - Fall/Winter 2017 - Chairman’s Letter by Brian L. Spurgeon
The CCA Voice - Fall/Winter 2017 - 10
The CCA Voice - Fall/Winter 2017 - A Message from the President & CEO by Steven K. Berry
The CCA Voice - Fall/Winter 2017 - 12
The CCA Voice - Fall/Winter 2017 - CCA’s 2017 Excellence in Marketing Awards
The CCA Voice - Fall/Winter 2017 - 14
The CCA Voice - Fall/Winter 2017 - Trusting the Internet of Things
The CCA Voice - Fall/Winter 2017 - 16
The CCA Voice - Fall/Winter 2017 - The Internet of Things Requires the Infrastructure of Tomorrow, Today
The CCA Voice - Fall/Winter 2017 - 18
The CCA Voice - Fall/Winter 2017 - Hidden in Plain Sight: The Next Generation of Urban Wireless Infrastructure
The CCA Voice - Fall/Winter 2017 - 20
The CCA Voice - Fall/Winter 2017 - The Internet of Everything: How Will We Meet the Demand for Data When Everything is Connected?
The CCA Voice - Fall/Winter 2017 - 22
The CCA Voice - Fall/Winter 2017 - Filling the Right Network Coverage Gaps and Improving Customer Experiences
The CCA Voice - Fall/Winter 2017 - 24
The CCA Voice - Fall/Winter 2017 - Things Once Imagined Are Becoming Possibilities
The CCA Voice - Fall/Winter 2017 - 26
The CCA Voice - Fall/Winter 2017 - 4 Steps to Enabling Cost-Effective Rural Coverage
The CCA Voice - Fall/Winter 2017 - 28
The CCA Voice - Fall/Winter 2017 - The Future of Mobile: How to Take Advantage of IoT
The CCA Voice - Fall/Winter 2017 - 30
The CCA Voice - Fall/Winter 2017 - Get Ready for the 5G Era
The CCA Voice - Fall/Winter 2017 - 32
The CCA Voice - Fall/Winter 2017 - Maximizing Value in the New Paradigm of Smartphone Buying and Selling
The CCA Voice - Fall/Winter 2017 - 34
The CCA Voice - Fall/Winter 2017 - Internet of Things: Simplifying Device-to-Human Communication with CPaaS
The CCA Voice - Fall/Winter 2017 - 36
The CCA Voice - Fall/Winter 2017 - How Far We’ve Come: Three Ways Technology Has Shaped Interactive Wireless Retail
The CCA Voice - Fall/Winter 2017 - 38
The CCA Voice - Fall/Winter 2017 - Remote Monitoring IoT Connectivity
The CCA Voice - Fall/Winter 2017 - 40
The CCA Voice - Fall/Winter 2017 - Building a Profitable IoT Service by Design Not Accident
The CCA Voice - Fall/Winter 2017 - 42
The CCA Voice - Fall/Winter 2017 - Supplemental Rich-Data Delivery Beyond ALI
The CCA Voice - Fall/Winter 2017 - 44
The CCA Voice - Fall/Winter 2017 - A Simple Taxability Test for the Internet of Things
The CCA Voice - Fall/Winter 2017 - 46
The CCA Voice - Fall/Winter 2017 - Looking for an Edge? Creating the Best Customer Experience is Paramount
The CCA Voice - Fall/Winter 2017 - Delivering the Bandwidth for Mobile IoT to Succeed
The CCA Voice - Fall/Winter 2017 - IoT Requires a Different Mindset
The CCA Voice - Fall/Winter 2017 - IoT Security: Threat to an Opportunity
The CCA Voice - Fall/Winter 2017 - Gateway to the IoT
The CCA Voice - Fall/Winter 2017 - Congressional Spotlight: Senator Cory Gardner (R-CO)
The CCA Voice - Fall/Winter 2017 - Company Profiles
The CCA Voice - Fall/Winter 2017 - Index of Advertisers
The CCA Voice - Fall/Winter 2017 - cover3
The CCA Voice - Fall/Winter 2017 - cover4
https://www.nxtbook.com/naylor/RCAB/RCAB0118
https://www.nxtbook.com/naylor/RCAB/RCAB0217
https://www.nxtbook.com/naylor/RCAB/RCAB0117
https://www.nxtbook.com/naylor/RCAB/RCAB0216
https://www.nxtbook.com/naylor/RCAB/RCAB0116
https://www.nxtbook.com/naylor/RCAB/RCAB0215
https://www.nxtbook.com/naylor/RCAB/RCAB0115
https://www.nxtbookmedia.com