Cloud

Broadband Forum Unveils New Ground-breaking CloudCO Capabilities

Broadband Forum | October 29, 2021

A cutting-edge Broadband Forum demonstration has showcased how operators can utilize industry standards and existing investments to achieve a virtualized infrastructure that enables zero touch provisioning, service activation and session steering within a multi-vendor and white box environment.

Bringing together leading service providers, vendors and interoperability labs at this year’s Broadband World Forum, the Cloud Central Office (CloudCO) project enables dynamic use cases, including multi-vendor service creation and activation and a truly virtualized disaggregated multi-vendor network.

In a world-first, the demonstration also presented a new gaming session steering application, demonstrating how operators can use CloudCO to detect a change in user traffic type, check network conditions against defined service levels and reprogram session steering to meet them and preserve the user experience.

“Dynamic session steering brings numerous benefits to a service provider’s business, allowing them to provide new and competitive service offerings with assurance capabilities that can seamlessly act on the network in a timely manner to ensure the assurance objectives of the service being offered."

Tim Carey, Chairman of the Broadband Forum's OB-BAA open source project

The CloudCO project recasts the Central Office hosting infrastructure to utilize Software Defined Networking (SDN), Network Functions Virtualization (NFV) and cloud technologies. Key components include disaggregated control plane functions in the Access and Edge networks, dynamic session steering as well as subscriber session steering, a Broadband Access Abstraction (BAA) layer with disaggregated control and management plane functions. The flagship architecture brings network and services agility, automation and orchestration and a unified vision of interoperable and streamlined service deployments.

Supporting this year’s CloudCO demonstration was consulting and system integrator Reply, and service providers BT, TIM, and Vodafone, alongside engineers from Altice Labs, Capgemini Engineering, Broadcom, EANTC, Nokia, ufiSpace, VMware, and the University of New Hampshire – InterOperability Laboratory.

“This year’s CloudCO demonstration continues to highlight the great work across many of the Broadband Forum working groups, including Access and Transport Architecture (ATA) as well as the formidable work within the OB-BAA,” said Craig Thomas, Vice President Strategic Marketing and Business Development at Broadband Forum. “The demonstration emphasizes the importance of a truly virtualized disaggregated multi-vendor network, and how operators can take full advantage of all of the open source benefits by leveraging specification standards.”

The CloudCO framework is built from the ground up with components from the vendor community. To ensure full accessibility for participants, the demonstration was hosted both virtually and in-person to encourage safe participation during the Coronavirus pandemic.

About the Broadband Forum
Broadband Forum is the communications industry’s leading open standards development organization focused on accelerating broadband innovation, standards, and ecosystem development. Our members’ passion – delivering on the promise of broadband by enabling smarter and faster broadband networks and a thriving broadband ecosystem.

Broadband Forum is an open, non-profit industry organization composed of the industry’s leading broadband operators, vendors, thought leaders who are shaping the future of broadband, and observers who closely track our progress. Its work to date has been the foundation for broadband’s global proliferation and innovation. For example, the Forum’s flagship TR-069 CPE WAN Management Protocol has nearly 1 billion installations worldwide.

Broadband Forum’s projects span across 5G, Connected Home, Cloud, and Access. Its working groups collaborate to define best practices for global networks, enable new revenue-generating service and content delivery, establish technology migration strategies, and engineer critical device, service & development management tools in the home and business IP networking infrastructure. We develop multi-service broadband packet networking specifications addressing architecture, device and service management, software data models, interoperability and certification in the broadband market.

Spotlight

Onsite host Joe Zollo asks VMware CEO Raghu Raghuram and President Sumit Dhawan to break down the news coming out of VMware Explore Las Vegas.

Spotlight

Onsite host Joe Zollo asks VMware CEO Raghu Raghuram and President Sumit Dhawan to break down the news coming out of VMware Explore Las Vegas.

Related News

Virtual Desktop Strategies, Backup and Disaster Recovery

eSentire's New MDR Agent Brings Unmatched Cybersecurity Value to Small and Medium Businesses

businesswire | August 10, 2023

eSentire, Inc., the Authority in Managed Detection and Response (MDR), today announced the expansion of its proprietary software and services portfolio with the introduction of its new MDR Agent. The eSentire Agent is the latest innovation of the firm's SaaS-based Extended Detection and Response (XDR) Platform, developed specifically for small and medium businesses (SMBs) seeking affordable prevention, detection, investigation, and response capabilities as part of an all-in-one 24/7 solution. eSentire will be elevating the eSentire Agent’s differentiated capabilities this week at Black Hat USA in Las Vegas and will begin offering its Agent as part of eSentire’s value-rich MDR service bundles, including endpoint, log, and network protection, in October 2023. eSentire created the category ofManaged Detection and Responsewith the vision of arming 24/7 Security Operations Center (SOC) Analysts with the tools to perform digital forensic-grade investigations to rapidly contain attacks before they spread. As the firm has scaled to protect over 2000 leading organizations across 35 industries globally, its focus on deep investigation to drive proactive threat response and remediation has never wavered. In 2021, eSentire acquired state-of-the-art, digital forensics and investigative software, CyFIR, transforming its Incident Response practice and disrupting the industry with a 4-hour threat suppression SLA commitment as part of its24/7 On-Demand IR Retaineroffering. Over the last 24 months, eSentire has scaled its digital forensics software to also power MDR outcomes – delivering unmatched time to value and choice for SMBs. eSentire Agent’s Prevention, Detection, Investigation, and Response Capabilities eSentire’s MDR Agent begins with a prevention-first approach, stopping malware and ransomware using deep learning technology with incredible efficacy: Blocking 99% of known and unknown threats <0.1% false positive rate <20 millisecond time to prevent Delivering on eSentire’s service promise of world-class threat response that prevents business disruption, the Agent acts as a protective presence across customer endpoints, extracting unfiltered, rich telemetry data. These insights into potential threats are processed by eSentire’s XDR Platform and investigated by its SOC, driving improved security outcomes, including the containment of lateral movement and data exfiltration efforts. As SMBs grapple with a significant shortage of cybersecurity experts and the need to prioritize security investments, eSentire is delivering unmatched cybersecurity value with its XDR Platform and Agent as part of its MDR service, including: Rapid time to value with expert onboarding and one-push install 24/7 security monitoring and expertise to offset resource constraints Operationalized threat intelligence from eSentire’sThreat Response Unit (TRU) 150+ novel detections added per quarter to augment security threat detection Automated blocking of 99% of known and unknown threats Full-scale detection, prevention, investigation, and response Mean Time to Contain active security threats of 15 minutes The introduction of the eSentire Agent complements eSentire’s robust, best-of-breed ecosystem of endpoint partners, including CrowdStrike, Microsoft, SentinelOne, and VMWare Carbon Black, which can all be managed within eSentire’s MDR offering as a fully licensed solution or in a Bring Your Own Subscription model. “As the cybersecurity landscape continues to evolve and grow more complex, service providers everywhere have to remember the customer always gets a vote,” said Rahul Bakshi, Chief Product Officer, eSentire. “eSentire believes they will choose value, every time. That’s why we are bringing the eSentire MDR Agent to market as part of full-service bundles that offer enterprise-grade security at a fraction of the price. We have made great strides in advancing the Agent from a digital forensics tool to a MDR force multiplier and plan to leverage its innovative capabilities as a universal investigation and response enabler across all technology types in the near future.” eSentire will showcase its MDR Agent and full-service offering with demonstrations on the Black Hat USA show floor at booth #2823 from August 9-10, 2023. About eSentire eSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization's cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world's most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire's award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks

Read More

VPN

Internet Engineering Task Force standardises quantum-safe VPN protocol created by Post-Quantum

Businesswire | July 18, 2023

The world’s efforts to secure digital communications from the threat posed by quantum computers took a significant leap forward today as a new standard for quantum-safe Virtual Private Networks (VPN) was ratified by the Internet Engineering Task Force (IETF). The new protocol has already been used by Banque de France and Deutsche Bundesbank to secure payments messages, paving the way for full adoption by the Bank for International Settlements to secure communications between the world’s central banks. ‘Harvest Now Decrypt Later’ (HNDL) attacks currently represent the greatest quantum cybersecurity threat. These attacks see hostile actors steal encrypted data now which can be decrypted once a sufficiently mature quantum computer comes online. The new US Quantum Computing Cybersecurity Preparedness Act states that the HNDL risk presents the highest threat to humankind and stipulates that quantum migration must start now. Deploying a VPN based on new post quantum cryptography is the easiest way to protect data-in-transit from such attacks. The new IETF standard specifies how VPNs can exchange communications securely in the quantum age. The novel approach prioritises interoperability by making it possible for multiple post-quantum and classical encryption algorithms to be incorporated into VPNs. Combining both old and new encryption is essential to ensure no disruption to the functioning of existing IT systems, and to protect data from attack by both classical and quantum computers. This is a particularly important milestone for internet connectivity and security as we are transitioning from an era where the world relied upon just one or two algorithms (RSA and Elliptic Curve), to a situation where different nation states are deploying a wide variety of different post-quantum algorithms. This new IETF standard is the glue that allows parties using different public key encryption algorithms to talk with one another. The new IETF standard was proposed and designed by Post-Quantum, a British cyber security company that’s built a portfolio of market-ready quantum-safe cyber security products. Post-Quantum’s own Hybrid PQ VPN uses the new IETF standard and is already in use by NATO to secure its communications from quantum attack, supporting interoperable communications between NATO members. CJ Tjhai, CTO, Post-Quantum and original author of the new IETF standard said: “I’d like to thank all the technologists that collaborated with us on this IETF standard. Much of the focus has been on NIST’s new post quantum encryption algorithms themselves, but this is insufficient unless you have a protocol that defines how the connectivity is done. The easiest way to prevent Harvest Now Decrypt Later attacks is to deploy a PQ VPN based on the new IETF standard. NIST’s new algorithms are only useful if we have agreed standards for their use and mature products that can accommodate them.” Andersen Cheng, Executive Chairman, Post-Quantum added: “CJ and his collaborators have completed important work that makes it possible for tech companies to build quantum-safe VPNs that communicate to one another. We are entering a period where different countries are now recommending different encryption algorithms, so engineering our communications infrastructure to be interoperable and backward compatible is absolutely crucial. That’s the value our own VPN is bringing to organisations like NATO, a diverse member organisation with a variety of post-quantum algorithms in use. “In the commercial sector, we are pleased that Banque de France and Deutsche Bundesbank have also recently completed their project in transmitting payment messages using our protocol, which will pave the way for the Bank for International Settlements to build a complete chain of trust for central bank applications to counter any HNDL risks they already face today.” José María Lucía Moreno, Lead Partner, EY Wavespace and a Post-Quantum partner added: “Our agreement with Post-Quantum is an important step in helping EY and its clients to become quantum-safe. We’re increasingly consulting with our clients to identify where they use traditional encryption that will need to be upgraded, and to help them prepare for the quantum era. Post-Quantum’s approach is particularly interesting because they have modular software-based products like the VPN, which can be implemented together, or as standalones within existing environments, to offer protection today.” The IETF is the non-profit organisation with responsibility for developing the standards that define how the internet is built and used. Now that the IETF has ratified this work, VPN providers will adapt their protocols to match it, making this a defining standard for the future of cybersecurity as the world transitions from classical to new post-quantum encryption. Ratification represents the culmination of work dating back to 2017 when Post-Quantum took the lead in creating the original proposal for this standard. About Post-Quantum Post-Quantum is upgrading the world to next-generation encryption. Our quantum-safe platform includes modular software for Identity, Transmission and Encryption that protect organisations across their entire digital footprint. Products are interoperable, backward compatible and crypto-agile - ensuring a smooth transition to the next generation of encryption. Post-Quantum works with organisations in defence, critical national infrastructure and financial services, including a multi-year relationship with NATO to ensure its communications are secure against quantum attack.

Read More

Virtual Desktop Strategies, Virtual Server Infrastructure

Databloom AI Announces Beta Release of Blossom Sky in Google Cloud

prnewswire | August 21, 2023

DataBloom AI, a leading provider of virtual data lakehouse solutions, today announced the beta release of Blossom Sky for Google Cloud. The beta release is part of Databloom AI's cooperation with Google for Startups Cloud Program. Blossom Skyis the first virtual data lakehouse (VDL) on the market. It enables organizations to store, process, and analyze data within multiple data lakes and data warehouses via a single, unified platform. Federated data processing enables customers and users to manage and process their data directly at the source through data pipelines, including low-level data operations like map, join, filter, or map reduce and high-level machine learning operations such as KMeans, SGD or PageRank. This provides organizations with a number of benefits, including: Increased Data Scalability and Flexibility: Blossom Sky enables organizations to leverage their existing data infrastructure without centralizing data. This provides organizations with the ability to scale up or down as required. Reduced Data Duplication and Complexity: Blossom Sky removes the need for expensive Extract, Transform, Load (ETL) and data transfer costs, reducing data duplication and making data management easier for organizations. Better Data Security and Governance: Blossom Sky brings federated data processing to every organization as a Software as a Service (SaaS) solution. Time to insights (T2I): Blossom Sky brings together data silos in a single data management platform, making it easier for organizations to discover, analyze, and act on data, resulting in faster T2I. "We are excited to partner with Google Cloud to bring Blossom Sky to market," saidAlexander Alten, CEO of Databloom AI. "Google Cloud's infrastructure and services provide the perfect foundation for our platform, and we believe that this partnership will help us to accelerate our growth and reach more organizations around the world." AboutDatabloom AI Databloom AI, headquartered inMiami, FL, is one of the world's leading virtual data lakehouse providers. Databloom's cloud-based data lakehouse platform allows organizations to consolidate, manage, and analyze data across multiple data lakes or data warehouses in one, single platform.

Read More