Pipe Cleaners: Telcos Offer Managed Security Services

AT&T and other telcos want to clean up your Internet traffic - for a fee. A look inside in-the-cloud scrubbing services.

From AT&T’s Global Network Operations Center 40 miles west of New York City, CISO Ed Amoroso has as wide a window into the Internet as anyone. With a glance at a two-story wall covered with computer monitors and television screens, Amoroso can tell at any given moment how much e-mail, Web and voice-over-IP traffic is streaming across AT&T’s data networks, buzzing its way from business to business, person to person. The amount of Internet traffic represented in the room is staggering. On the average business day, almost 10 petabytes of data pass through AT&T’s networks—more information than the entire Web contained in 2000.

Too bad that almost all of it is garbage.

More than 80 percent of the e-mail coming in to AT&T is spam. About 1 million of the home computers AT&T sees each day are thought to be infected with bots, reaching out to hundreds of other IP addresses far more quickly than any Internet surfer with DSL or a cable modem ever would. Before a worm strikes, technicians see strange spikes of traffic going to normally obscure ports, as malware developers test and tweak their code. A sudden, sharp increase in the amount of Web traffic worldwide could mean breaking news—or a distributed denial-of-service (DDoS) attack being lobbed at a single company halfway around the world.

But Amoroso’s window into a rapidly junkifying Internet is largely just that: a window. For the most part, he says, all he can do is sit and watch through the glass, as unwanted or malicious traffic makes its way from point A to point B.

“The standard service-level agreement is that we just push the traffic in and out,” he says. “We don’t touch it. We can do some upstream and downstream filtering if we see something that will affect our infrastructure, but you getting a spam, or you having some weird protocol aiming at you—I would love to filter that, but it’s not that simple.”

That’s because a telecommunications company’s job has always been to pass traffic, not pass judgment. “The starting point [for Internet carriers] is no responsibility whatsoever,” says Jonathan Zittrain, professor of Internet Governance and Regulation at Oxford University. “Echoing the original spirit of Internet protocol design, the job of a router is simply to move a packet one hop closer to its destination.”

This is the reason for the intense debate over whether to forgo so-called net neutrality, in which Internet carriers treat all packets the same. Even as carriers argue that they should be allowed to prioritize high-revenue content, however, AT&T has been quietly getting permission from its customers to stop certain kinds of traffic altogether. Already, some businesses have signed up to have AT&T filter out spam, viruses, DoS attacks and other malicious activity behind the scenes, before the traffic touches their enterprises. AT&T is now working on the “productization” of similar services for its home customers. In Amoroso’s vision of the future, telecom companies will routinely deliver not the diseased mélange of today’s pure Internet, but a “clean pipe” of good (or at least decent) traffic. Less junk, fewer risks. Here’s your bill.

It’s a necessary gambit for an ocean-ship of a company ($63 billion) in an industry that faces new competition and downward pricing pressure, the result of the excess telecommunications capacity laid during the late 1990s and early 2000s. “The carriers are looking for ways to differentiate themselves so they’re not just competing on who’s got the cheapest bits per second, and they’re also looking for ways to stop the decline in dollars per bits per second,” says John Pescatore, a vice president at the IT research firm Gartner.

According to Pescatore and other observers, AT&T is farthest along in the journey of telecom companies to position themselves as security providers—although competitor Verizon took a huge leap forward in May, when it announced that it was acquiring Cybertrust, one of the country’s biggest names in information security, for an undisclosed amount. Verizon said the acquisition would add 800 employees to its 300-person information security team, along with expertise in computer forensics and identity management and a solid presence in Asia.

The growing security ambitions of telecom companies could have a profound impact on how “security” is packaged and sold—by standalone security companies or by network or IT providers; to CSOs as standalone services or to CIOs within a bundle of other services; as products or in a software-as-a-service model. What’s more, the outcome of what AT&T is attempting could influence the very future of the Internet as a free and unfettered, if increasingly dangerous, communications platform. The question is whether the strategy will pay off—whether AT&T’s vast customer base really wants to pay extra for an Internet as safe, banal and micromanaged as a shopping mall.

Bruce Schneier, whose own security company was purchased last year by the United Kingdom’s largest telecom carrier, BT, says that right now, it’s not the telecom industry’s role to stop bad traffic. But if a telecom company can make it profitable to do so, that role will change. And fast.

“They’ll do it if it makes them money,” says Schneier, chief technology officer of BT Counterpane. Until then, he believes, Internet carriers have little incentive to clean up the Internet. Why should they bother? “Bandwidth is cheap.”

Telcos as Security Companies

The idea of a telecommunications company acting as a security provider is nothing new. For years, telephone companies and Internet service providers have used their existing relationships with businesses to spread security services onto the network connectivity that’s their bread and butter. Gene McLean, CSO of Telus, the

$7 billion Canadian telecom company, says security services have always been part of his company’s offerings; they’ve just never really been marketed. “When we’re dealing with big clients or government contracts, then we put on our security consulting hat,” McLean says simply. “We look at it as a differentiator.”

Typically, telecom companies sell virtual private networks (VPNs) and take over such rote tasks as managing firewalls, intrusion detection systems or other customer premises equipment. This frees up business customers to keep lean staffs or focus on more strategic operations. While standalone managed security service providers (MSSPs) have the same capabilities and, arguably, deeper security expertise, telecom companies have one gigantic advantage: They are already on the payroll.

“Telcos don’t find themselves in the position of having to market the way that pure-plays do,” says Loren Rudd, an industry analyst at Frost & Sullivan, a research and consulting company. “The pure-plays have to evangelize on almost every sale that they make. It’s easy for the enterprises who are migrating to managed security services to call up their telco [and add a feature] like you were adding a cable channel to your TV.”

That’s basically what Dan Antion of American Nuclear Insurers did when he chose to outsource security to AT&T, which had been his phone and Internet vendor for seven years. “It just seemed to make sense,” says Antion, VP of information services at the Glastonbury, Conn.-based underwriter for the nuclear power industry. “We’d been through a lot of projects with them.”

Given the middling need for marketing, it shouldn’t be surprising that few people noticed when the telecom companies overtook most of the pure-plays in terms of market share for security services. According to Frost & Sullivan, three of the eight largest MSSPs in North America are telecom companies: AT&T, Sprint and Verizon. Three more are IT services companies—Getronics, IBM and VeriSign—that have gotten big in the MSSP space mostly by eating up smaller pure-plays (most notably IBM’s purchase of Internet Security Systems earlier this year). Until recently, Cybertrust and Symantec were the last two large MSSPs with an information security focus. Symantec, though, is positioning itself more as a purveyor of “infrastructure software,” and the pending purchase by Verizon of Cybertrust further narrows the field. (See chart on Page 33 for details.)

The market is still fragmented, though, with plenty of room for competition. Frost & Sullivan estimates that these large companies combined have only 40 percent of the MSSP market—a market it expects to grow about 20 percent a year through 2010. “I personally think that, if implemented correctly, telcos are a good match for the managed security market,” Rudd says. “The growth trajectory of MSSPs has proven itself in recent years. It’s not speculative for a telco to get involved.”

Telecom companies have reach and resources in their favor, of course. But “it’s not just economies of scale” that give them an advantage, Gartner’s Pescatore says. “It’s that the carriers have access to information that the individual enterprise doesn’t.”

That’s the information that AT&T CSO Amoroso sees through his window on the Internet in northern New Jersey. And that’s the information that he’s hoping to use to move AT&T’s security business from one focused on simply managing customers’ security equipment, to one that’s truly cleaning up the pipes and plumbing of the Internet. “It’s like the blind men and the elephant,” Amoroso says, referencing the folktale of the blind men who each, upon feeling a different part of an elephant, draw vastly different conclusions about the creature before them. “When you sit as one node on the network, you don’t have context. The service provider sits right smack in the middle of the context and has a vantage point that nobody else can have.” His favorite example is that AT&T security analysts knew about the 2003 Slammer worm before it hit, because of strange traffic going to port 1434.

“I’ve looked at this traffic,” Amoroso continues, “and realized that there’s just a gold mine of security information.”

Virtual Security

The centerpiece of AT&T’s strategy to build security into the network—dubbed “in-the-cloud” security services—is a concept that’s gotten increasing attention over the past couple of years. Right now, as CSOs are all too aware, most companies purchase and manage (or outsource the management of) a slew of security devices, from antivirus software to firewalls to intrusion detection and prevention systems. With an in-the-cloud setup, however, many of these tasks can be handled using a virtual device administered by an MSSP. It’s basically a software-as-a-service model, with monthly service fees replacing product, installation and maintenance costs. Gartner projects that as early as 2008, 30 percent of managed security service revenue could come from services delivered in the cloud.

Telecom companies aren’t the only ones pushing for this model. Antispam companies such as MessageLabs and Postini have adopted it, as have pure-play MSSPs such as Perimeter eSecurity and VigilantMinds (which recently merged with another MSSP, Solutionary). “Think of us like the water utility,” says Brad Miller, CEO of Perimeter

eSecurity, a $24 million, venture-capital-backed company in Milford, Conn., that used to call itself Perimeter Internetworking. “You could have one big water utility that cleans the water, or every house could have its own water filter. Which way is more efficient?” Obviously, Miller thinks the former.

A security company like Perimeter eSecurity has to either partner with telecom companies (which it does), or convince direct customers to route all their Internet traffic first to Perimeter and then back to their enterprise (which it also does). Telecom companies, on the other hand, need only to get permission from existing customers to filter the traffic that they’re already handling anyway. Rather than evaluating a brand-new contract, the CIO, and perhaps CSO, are just looking at making changes to a service-level agreement and pricing for bandwidth.

1 2 Page 1
Page 1 of 2
FREE Download: Get the Spring 2019 digital issue of CSO magazine today!