When should enterprises consider when using the new Ethernet as a service? Are there any security concerns to be...
The next generation of Ethernet, dubbed the Third Network, is an initiative of the Metro Ethernet Forum to bring Ethernet as a service. The way I understand it, you can think of it as Ethernet in the cloud via (or in lieu of) an ISP that offers "network as a service"-like software-defined networking connectivity on-demand and across multiple carriers and service providers.
The Third Network sounds like a great solution in search of a problem, at least for the masses. As the need for cloud services grows among enterprises, government agencies and even consumers, I could see this technology being useful in the future.
As for security concerns, I suspect we will see the traditional network protocol and application level security flaws around denial of service and user sessions.
However, I can also see additional security challenges related to network/user provisioning, access and the like. Of course, as with any cloud-based service, there's always the resiliency factor: denial-of-service protection, uptime and so on. Just how resilient Ethernet as a service will be remains to be seen. Given that resiliency is a fundamental aspect of such a service, I have faith in the smart minds that are working to pull it together.
As with any new technology, beware of jumping in headfirst. Your organization will have to perform its own business impact and risk analysis to ensure it's going to be a good fit.
Ask the Expert:
SearchSecurity expert Kevin Beaver is ready to answer your application security questions -- submit them now. (All questions are anonymous.)
Uncover must-ask questions when selecting a service provider
Get help evaluating, choosing and working securely with cloud service providers
Dig Deeper on IPv6 security and network protocols security
Related Q&A from Kevin Beaver
The WannaCry TCP port 445 exploit returned the spotlight to Microsoft's long-abused networking port. Network security expert Kevin Beaver explains ... Continue Reading
While most mobile platforms provide levels of security from mobile cryptojacking, IT must still be aware of the risks and procedures to address an ... Continue Reading
Android Oreo replaced the allow unknown sources setting with a new feature that enables users to selectively install unknown apps. Kevin Beaver ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.