Network Transactions

I have been spending quite some time understanding what the meaning of network transactions is to my customers, and the differences have been fascinating to explore. As more and more information moves around in the network, and the nature of that information is more readily available and potentially private to both personal users and business systems, it is important as ever to define and understand those transactions in order to protect those transactions and the information contained within them.

My Service Provider friends have spent quite some time and effort to build scalable, robust and price appropriate access service networks, and customers have responded by putting everything and anything that could be connected – from the photos in a photo album to the personal account history of 2 million households – onto the network. Once all this information is connected, transactions begin happening and information is accessed without enough understanding of what it means, where the information is going, who is using it, and what its used for.

So I have been spending a lot of effort to understand the networks of our Provider customers, and tailoring solutions that allow them to understand the transactions happening in their networks, as well as the transactions that are happening on within their customer networks. Whether its a security related problem solver, a transaction visibility tool, a network or policy engine for normal transactional behavior, I am fascinated by understanding how the user (authorized or not) is using the network and interacting with the transactions within the network, and how our Provider partners will use these tools to build better networks and better services.

When I was asked to join the ASERT blog, I was flattered and energized at the same time. Most of the work I do at Arbor revolves around helping customers enable Managed Services, and helping Arbor understand what that actually means to our business – I have been blessed to have such an interesting position. As we have progressed together over the last three years, I have seen the ‘Network Transactions’ theme drive how I want to help our customers build better networks, and better services for the customers that connect to those networks. In the weeks and months to come, I hope to build on the general theme of transactions, and dive a bit more into some specifics around the success and failures I see in my experiences with Service Providers as well as in the market. It should be fun.

One Response to “Network Transactions”

March 19, 2007 at 6:16 am, R. Kerns said:

I think the quote “My Service Provider friends have spent quite some time and effort to build scalable, robust and price appropriate access service networks, and customers have responded by putting everything and anything that could be connected – from the photos in a photo album to the personal account history of 2 million households – onto the network” is very, very true in the fact that a very key word was left out of the description of these networks. Secure!

Although I think companies and government have come to realize that Security is something to implement up-front it is still not being done adequately. I think the last estimates I saw were around $182 per lost record for a data breach. One company spent $24 million in a single month alone on credit monitoring after three data breaches. Identifying/Estimating the data architecture and security needed to protect it up front is not an option anymore, it is a must do!

I think we will really see a change soon when things like HIPAA start getting enforced via fines and more enforceable policy in regards to disk encryption for mobile devices comes out (the white house OPM sent out a memo a while back in regards to that, but it was more of a should instead of a shall…)

-EW

Comments are closed.