Wednesday, May 16, 2007

IMS networks face security challenges

Network World

Networking Technology Update




Networking Technology Update, 05/16/07

IMS networks face security challenges

By Jim Duffy

There may be no hotter topic in telecom right now than IP Multimedia Subsystem (IMS), an evolving standard that promises to offer a common way for multiple wireless and wireline networks to deliver multimedia applications.

Get more out of your IT dollar

Business Services Management lets you get more out of your IT investments by aligning business goals and your core infrastructure. Network World Editor-in-Chief John Dix and IDC Research Manager Stephen Elliot examine BSM's benefits and how enterprises are starting to take advantage of this strategy.

Attend now!

Fixed and mobile network operators are expected to invest $10.1 billion in IMS capital infrastructure between 2006 and 2011, and generate $49.6 billion in service revenue from IMS-enabled applications within that time, according to ABI Research.

But there may be no more discouraging a topic than securing an IMS network. Recent events and published reports indicate that IMS security specifications are lacking, and that the architecture may open up more vulnerabilities than benefits.

“There definitely were security gaps in the standard right out of the gate,” says Tom Valovic, a telecom analyst at IDC. “Many vendors are somewhat vague concerning the types of security issues associated with wireless.”

Gaps in fixed-line applications are being addressed with standards efforts such as TISPAN and products such as session border controllers, Valovic says. Yet wireless remains a challenge, he says.

“I’ve seen less definition on the wireless side,” Valovic says.

That’s one of the reasons Verizon Wireless decided to develop Advances to IMS (A-IMS), a framework for mobile networks that attempts to fill in perceived gaps in IMS. And Sipera Systems, a maker of products for VoIP, mobile and multimedia security, recently authored an article in a monthly industry periodical describing a litany of vulnerabilities unique to and inherited by IMS.

For more on this story, please click here.

TODAY'S MOST-READ STORIES:

1. Top 10 things Microsoft loves/hates about open source
2. Top 15 controversial Microsoft quotes
3. A quarter of under-30s now go cell-only
4. Force10 says it has Cisco Catalyst killer
5. Microsoft and open source patents controversy
6. Google: Ghost in the machine is malware
7. Your IT summer blockbuster guide
8. Deciphering Google's language translation
9. Using 'offensive technologies' to secure networks
10. Analysts squash IBM layoff rumors

MOST-READ REVIEW:
Midtier management tools register high marks


Contact the author:
Network World Managing Editor Jim Duffy can be reached at jduffy@nww.com

BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments:

Post a Comment