When should enterprises consider when using the new Ethernet as a service? Are there any security concerns to be...
The next generation of Ethernet, dubbed the Third Network, is an initiative of the Metro Ethernet Forum to bring Ethernet as a service. The way I understand it, you can think of it as Ethernet in the cloud via (or in lieu of) an ISP that offers "network as a service"-like software-defined networking connectivity on-demand and across multiple carriers and service providers.
The Third Network sounds like a great solution in search of a problem, at least for the masses. As the need for cloud services grows among enterprises, government agencies and even consumers, I could see this technology being useful in the future.
As for security concerns, I suspect we will see the traditional network protocol and application level security flaws around denial of service and user sessions.
However, I can also see additional security challenges related to network/user provisioning, access and the like. Of course, as with any cloud-based service, there's always the resiliency factor: denial-of-service protection, uptime and so on. Just how resilient Ethernet as a service will be remains to be seen. Given that resiliency is a fundamental aspect of such a service, I have faith in the smart minds that are working to pull it together.
As with any new technology, beware of jumping in headfirst. Your organization will have to perform its own business impact and risk analysis to ensure it's going to be a good fit.
Ask the Expert:
SearchSecurity expert Kevin Beaver is ready to answer your application security questions -- submit them now. (All questions are anonymous.)
Uncover must-ask questions when selecting a service provider
Get help evaluating, choosing and working securely with cloud service providers
Dig Deeper on IPv6 security and network protocols security
Related Q&A from Kevin Beaver
Android Oreo replaced the allow unknown sources setting with a new feature that enables users to selectively install unknown apps. Kevin Beaver ... Continue Reading
Equifax's Apache Struts vulnerability was an example of a scan not being read correctly. Kevin Beaver explains vulnerability scans and how issues can... Continue Reading
Several vulnerabilities were recently discovered in Android bootloaders via the BootStomp tool. Kevin Beaver explains how they work and what risk ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.