F5 Features

 

Articles Archive   Search Articles
Article

Want the complete Heavy Reading report? Download Now

Can your network architecture handle VoLTE, IoT, and 5G?

A 2016 survey by Heavy Reading revealed the priorities and concerns of global service providers.

Operators say they feel pressure to improve service delivery.

Those surveyed say their top 4 challenges are:

57%

Time To Market

for new services and applications

55%

Customer

experience management (CEM)

54%

Capex

for bandwidth and infrastructure

53%

Profitability

and efficiency

Network capacity and performance are the highest-priority upgrades today.

Most agree that signifiocant improvements are needed.

Ran Capacity and Latency Improvements

Architecture Changes

EPC Capacity and Throughput Increase

The control plane is emerging as a priority for tomorrow.

56% call control plane optimization and scale a mid-term priority.

Operators think these improvements are still needed to consolidate network functions and secure roaming networks:

Service Function Chaining
Roaming Network Policy
GI Firewall
DNSSEC

Everyone is committing
to virtualization.

Want to see the full report?

Show Me

WHAT KEEPS GLOBAL OPERATORS AWAKE AT NIGHT?

A 2016 survey by Heavy Reading explores how global service providers are addressing security concerns as they prepare for a 5G world.

Security still feels like a nightmare.

83%

OF OPERATORS ARE CONCERNED OR
EXTREMELY CONCERNED ABOUT THE
DATA CENTER AND APPLICATIONS

DDoS

REPRESENTS THE MOST
TROUBLING VULNERABILITY.

Areas of greatest concern:

Operators worry about security across the network: from devices through the core to applications.

83%

Data Centers

76%

Devices

76%

IP Multimedia Subsystems

76%

GI Lans

69%

EPC

Are you investing enough to protect these critical areas?

Read More to Find Out

NO ONE SHOULD OVERLOOK DNS THREATS.

A 2016 survey by Heavy Reading revealed what global service providers are thinking about security today.

64%

EXPECT DNS ATTACKS
TO CONTINUE OR INCREASE

Volumetric attacks are the toughest to handle.

That attack type was cited three times as often as the next nearest attack type.

Volumetric Attacks

Trickle Attacks

Cache Poisoning

DNS Tunnel Vectors

More than half of operators take an “all available means” approach to mitigating DNS attacks.

But 15 percent aren’t using any methodical, policy-based approach (such as threshhold control).

Ad-Hoc Approaches

Policy-Based Enforcement

Combined Methods