When should enterprises consider when using the new Ethernet as a service? Are there any security concerns to be...
The next generation of Ethernet, dubbed the Third Network, is an initiative of the Metro Ethernet Forum to bring Ethernet as a service. The way I understand it, you can think of it as Ethernet in the cloud via (or in lieu of) an ISP that offers "network as a service"-like software-defined networking connectivity on-demand and across multiple carriers and service providers.
The Third Network sounds like a great solution in search of a problem, at least for the masses. As the need for cloud services grows among enterprises, government agencies and even consumers, I could see this technology being useful in the future.
As for security concerns, I suspect we will see the traditional network protocol and application level security flaws around denial of service and user sessions.
However, I can also see additional security challenges related to network/user provisioning, access and the like. Of course, as with any cloud-based service, there's always the resiliency factor: denial-of-service protection, uptime and so on. Just how resilient Ethernet as a service will be remains to be seen. Given that resiliency is a fundamental aspect of such a service, I have faith in the smart minds that are working to pull it together.
As with any new technology, beware of jumping in headfirst. Your organization will have to perform its own business impact and risk analysis to ensure it's going to be a good fit.
Ask the Expert:
SearchSecurity expert Kevin Beaver is ready to answer your application security questions -- submit them now. (All questions are anonymous.)
Uncover must-ask questions when selecting a service provider
Get help evaluating, choosing and working securely with cloud service providers
Dig Deeper on IPv6 security and network protocols security
Related Q&A from Kevin Beaver
Explore the differing roles of inbound versus outbound firewall rules for enterprise network security and the varying use cases for each. Continue Reading
Compare host IDS vs. network IDS through the pros and cons of each, and learn how more modern systems may be better suited to ensure effective ... Continue Reading
Different tools protect different assets at the network and application layers. But both network and application security need to support the larger ... Continue Reading