Check out all of our upcoming events


Latest cybersecurity news, insights and commentary by Telesoft engineers and specialists

The Evolution of NFV Network Visibility and Security at Scale

Written by Steve Patton on Wednesday, 27 March 2019. Posted in Cyber

NFV (Network Function Virtualisation) migration continues on our large scale, country-wide national network infrastructure.  This reduces previously proprietary network functions that ran on dedicated hardware into software building blocks that run on commodity hardware. This includes firewalls, routing functions, mobile network functions and many others. It delivers business benefits, flexibility and cost reduction.

The changes are greater for the tools that monitor and analyse network traffic for performance monitoring, behavioural analytics, cyber security and “network visualisation”. Firstly, to realise the business benefits of NFV, the tools themselves should be NFV ready, to run on commodity hardware. Secondly, the infrastructure that is being monitored may no longer exist in physical form. Interfaces and traffic flows may be internalised and no longer exist on physical fibres. However – the network functions are still subject to cyber-attack and the best way to protect infrastructure is by monitoring and analysing traffic on those virtual interfaces.

What is Network Function Virtualization via OSS Line

So where physical traffic sensors or FlowProbes have been previously used, on NFV infrastructure, we need virtual probes monitoring virtual interfaces. Where physical fibres and monitoring infrastructure such as packet brokers are still present, traffic sensors can still be virtualised in an NFV environment, but be configured to monitor traffic from a real, physical interface.

We should also talk about cloud. Cloud provides an infrastructure agnostic environment for applications to run. Those applications assume that the underlying infrastructure, including the network, is always available. It’s usually the cloud providers responsibility to monitor and protect the infrastructure. So, from one point of view, Cloud cyber protection is different from NFV infrastructure cyber protection. One cares about infrastructure availability, the other application availability. We will talk about that more in future blog posts.

At Telesoft, we are busy preparing our NFV ready cyber tool set. This re-uses our existing carrier strength cyber analytics – check back soon to hear more.

About the Author

Steve Patton

Steve Patton

Steve is an experienced technical B2B cyber security specialist and Director. Steve is a frequent speaker on topics including security breaches, big data analytics, audit and compliance, and IT forensics.

Information cookies

Cookies are short reports that are sent and stored on the hard drive of the user's computer through your browser when it connects to a web. Cookies can be used to collect and store user data while connected to provide you the requested services and sometimes tend not to keep. Cookies can be themselves or others.

There are several types of cookies:

  • Technical cookies that facilitate user navigation and use of the various options or services offered by the web as identify the session, allow access to certain areas, facilitate orders, purchases, filling out forms, registration, security, facilitating functionalities (videos, social networks, etc..).
  • Customization cookies that allow users to access services according to their preferences (language, browser, configuration, etc..).
  • Analytical cookies which allow anonymous analysis of the behavior of web users and allow to measure user activity and develop navigation profiles in order to improve the websites.

So when you access our website, in compliance with Article 22 of Law 34/2002 of the Information Society Services, in the analytical cookies treatment, we have requested your consent to their use. All of this is to improve our services. We use Google Analytics to collect anonymous statistical information such as the number of visitors to our site. Cookies added by Google Analytics are governed by the privacy policies of Google Analytics. If you want you can disable cookies from Google Analytics.

However, please note that you can enable or disable cookies by following the instructions of your browser.