Security

Verizon Enhances Defense Network Security with Innovative Design

LinkedIn Google+ Pinterest Tumblr

Verizon‘s approach to defense network security entails integrating security into the design of the network itself, rather than attaching it afterwards. At the Defense Communications Forum, Lamont Copeland from Verizon highlighted the importance of considering security as a natural result of a well-constructed network where various modalities, applications, and user needs are interconnected.

Copeland emphasized that for military networks, security needs to be inherent in the design. This involves aligning applications, system data, and user requirements with the technological infrastructure from the outset. This methodology supports security across various modalities. Traditional wireline forms the backbone of the infrastructure, covering fiber, Ethernet, and modernizing legacy Time-Division Multiplexing (TDM) services. Wireless supports mobile users, while satellite and space communications address hard-to-reach areas.

Once connected, a centralized management system oversees user, device, and data interactions, enhancing security and visibility across all components. It’s crucial to match the network modality to each specific mission. For example, sensitive AR/VR training operates over a private network, while telemedicine uses standard wireline for base communication. Furthermore, smart warehousing requires dedicated fiber to handle large data sets and blueprints efficiently.

The introduction of SD-WAN and VPNs allows for traffic prioritization and isolation based on application needs. Satellite integration is increasingly becoming part of this system, allowing additional services to be protected similarly. This central management point is critical, particularly in flexible responses to threats.

SD-WAN offers resilience; if a network faces an attack, traffic can be redirected. This requires an operational plan that prioritizes traffic and matches user profiles to mission priorities. However, transitioning from legacy systems poses challenges. Networks often carry technological debt, requiring modernization within budget constraints. Copeland likened this process to eating an elephant—accomplished in stages, starting with TDM upgrades and gradually incorporating wireless and satellite technologies.

Instead of adhering strictly to government specifications, the conversation is shifting towards outcome-based partnerships. By focusing on user and mission requirements within budgetary limits, this approach promises a more effective transition to modern networks. This proactive, cooperative strategy aligns more closely with today’s defense communication needs. The goal is to plan for more flexible and secure networks that align with both technology and financial realities, setting the stage for continued improvement and adaptation.

Write A Comment