Next Generation Communications Blog

Security tag

Drill down on Security search:

10 result(s) displayed for Security (1 - 10 of 10):

Network Analytics Show the Rise of Mobile Phone Malware

By Mae Kowalke, TMCnet Contributor

It is a scene out of a Mission Impossible movie, only the threat is real. Two product managers and a VP sit down to discuss the latest product release, one that’s been under wraps for months. While the group thinks it is safely beyond the ears of its competition, unknowingly one of those present in the meeting has had malware installed on his Android phone. The malware activates the microphone on the smartphone, and the whole meeting is taped and sent to the competition.

This nightmare scenario is unfortunately not beyond the possible these days.

Kindsight, an Alcatel-Lucent suite of solutions, leverages network-based security analytics such as its 9900 Wireless Network Guardian to reveal the latest trends on security threats to fixed and mobile networks, and its Q2 2013 Kindsight Security Labs Malware Quarterly Report reveals that the number of mobile spyware applications discovered this quarter is on the rise, according to an Alcatel-Lucent blog post, Android phones playing “I spy” at home and at work..

Rail Security Essential to Modern-Day Transportation Systems

By Erin Harrison

“Your surveillance network should dictate your power and equipment requirements, not the other way around. Often operators tell me they want 50 cameras. I ask them what they think every one of those cameras should be doing. It’s very easy to over-engineer systems and overwhelm your ICT network with unnecessary data.”

In addressing network operators in a recent article in Alcatel-Lucent’s Tracktalk, Making the case for Enhanced Rail Security Systems, the above expert advice was provided by Dave Gorshkov, CEO of Digital Grape Business Services.  

Security is essential to the modern railway, protecting passengers, staff the operator’s assets from diverse range of risks including terrorism, crime, trespass, and vandalism,” he continued, noting that few security systems are installed without the support of a robust business case.

Video Surveillance: Minimizing Cost and Maximizing Return on Investment

By Mae Kowalke

The use of video surveillance as a public safety and security tool is growing. Partially, that’s because homeland security regulations and initiatives around the world are driving deployment. It’s also because high capacity wireless data networks have brought down the cost of infrastructure to the point where the ability to provide comprehensive coverage is practical and cost-effective.

However, it should be noted that the initial investment and operation and maintenance costs of video surveillance can be significant. This is highlighted by the fact that protection responsibility is shifting from police/military to infrastructure owners.

“In the US energy market, for example, the North American Electric Reliability Corporation-Critical Infrastructure Protection regulations require that utilities tightly control access to their most important infrastructure,” notes Sheridan Nye, Senior Analyst at Informa Telecoms and Media’s Enterprise Verticals practice, in a LifeTalk article, “Is Video Surveillance Worth the Investment?

IP Transformation Enables Network Operators to Maximize Market Opportunities

The face of the market is changing drastically for the network operator and unless they are willing to change with it and evolve, they will miss out on important opportunities for growth, revenues, profit and even survival. As a result,...

The Key Benefits of Managing Security at a Network Level vs. a Device Level

I recently had the opportunity to chat with Cliff Grossner of security solutions marketing at Alcatel-Lucent. He explained that while certain kinds of security can be derived from managing security at the end point, Alcatel-Lucent's brand of enterprise security is...

Embarking on 2010 as a Trusted, Dynamic Enterprise

As we enter the second decade of the twenty-first century, the  prospects of Web 2.0 (and eventually Web 3.0) are giving enterprises a new threshold of opportunity to leverage the Web to conduct business. At the same time, these opportunities...

Collaborative Security: Shifting the Security Paradigm to Create Innovative Enterprise Security Solutions

In today's age of Web 2.0 and cloud computing, security can actually be a positive enabler for driving business performance. To achieve this objective, enterprises can benefit from having a corporate-wide strategy, or a "security blueprint," that allows the enterprise...

Key Factors Driving the Need for a Comprehensive Security Blueprint

A recent U.S. Government Accountability Office report warned that cyber-threats facing federal networks and the country's critical infrastructure are becoming increasingly sophisticated. And while the number of attacks is exponentially growing - security incidents grew by over 200 percent from...

Alcatel-Lucent Joins RSA Secured Partner Program

Alcatel-Lucent has joined the RSA Secured Partner Program, which means that moving forward, the company's mobile security solution for enterprises can offer even more security for the mobile workforce by leveraging the industry-leading RSA SecurID two-factor authentication system designed for...

Laptop Guardian Security Solution Goes Global

In order for all the exciting next-generation communications services to be widely adopted by corporate users, certain conditions must be in place, among them ubiquity and security. Not only do business users need access to their applications everywhere and anywhere,...
Featured Events