In The Arena by TechArena - Delivering Security at the Edge with Radware

Episode Date: March 13, 2023

TechArena host Allyson Klein chats with Radware CTO David Aviv about the unique challenges of securing the edge and how his company is shaping security solutions to minimize attack threats....

Transcript
Discussion (0)
Starting point is 00:00:00 Welcome to the Tech Arena, featuring authentic discussions between tech's leading innovators and our host, Alison Klein. Now, let's step into the arena. Welcome to the Tech Arena. My name is Alison Klein, and today I'm coming live from the World Congress with David Aviv, CTO of Radware. Welcome to the program. Hi, thank you for having me. So David, first, thank you for taking some time out of your busy schedule at MWC to be with us. Why don't we just start with an introduction of
Starting point is 00:00:45 Radware and your role at the companies. Hi, Radware is an international leader with security solutions, network protection solutions, as well as application security solutions, covering network protection, data center protection, public and private accounts. Tecarina has been doing a number of interviews about the proliferation of the edge and the edge of the network, including numbers of interviews at MWC. And I was really interested in talking to Radware about how
Starting point is 00:01:19 to secure all of this data. Why don't we start with a question on how do you view the edge, and where do you see the most adoption of edge computing today? Well it's an excellent question because edge becomes a very amorphic term. I mean depending on everyone's definition of what is actually an edge. So classically everyone talks about edge, cloud, edge compute, network edge. Edge is becoming everything. The reason is very simple because everything is disaggregated and distributed. So edge becomes the point of presence where you locate either network resources, data resources,
Starting point is 00:02:10 whole edge resources, compute resources, you name it. I would say that currently, especially now in Barcelona, the 5G edge compute or mobile edge compute is definitely one of the best places which are more a couple of hotspots especially for mobile application get perusing that kind of edge service however we need to understand that we talk of edge as an edge. In order to run applications effectively, application needs to be built for to run, namely the backend, the edge, et cetera, where you store the critical data, the state-sensitive data.
Starting point is 00:02:58 So there are a lot of trade-offs. Let's say mobile, so-called mobile, the car industry, the next generation, mobile cars, so-called. We need to engineer the applications that are running, and to run what is needed to be running, to run at the edge, to run at the back. So definitely edge computing is starting to take a toll in the mobile edge, the mobile cloud as well, because the cloud pops are everywhere. And we do see that modern applications are restructuring
Starting point is 00:03:37 to be able to run at the edge. And the edge is not a new thing, like single-visibility content delivery. It's basically accelerating through the edge access. So edge becomes everywhere. And that provides new opportunities, but also new challenges, like security challenges. Well, that's why I'm here. And you deliver security solutions from cloud to edge.
Starting point is 00:04:09 Obviously, a lot of attention has been given to cloud security over the last 15 years. But edge security is a different beast. How do you view this, and how does that inform the decisions that you're making with your team about the security solutions you're bringing to market? Yeah, that's obviously the fact that the perimeter is being blurred, actually.
Starting point is 00:04:35 There's a whole perimeter, a certain perimeter. And it's to rethink how you define, let's say, not, I don't like to call it differential
Starting point is 00:04:48 matter, but a different kind of thing. So, there are a couple
Starting point is 00:04:52 of approaches to deal with it, and especially when the content delivery is
Starting point is 00:04:59 distributed through the supply chain, and through the supply chain, especially for web-based application.
Starting point is 00:05:07 You know, the browser, the consumer browser is connected directly to the supply chain contents anywhere actually, so pushes the security to the edge and when we say to the edge, up to the consumer itself, to the browser itself. So there are a couple of things. People like to say that identity forms the new perimeter. So what do we mean by identity? And the consumers, you know, in the enterprise is a well-known part, I'm the zero-trust part. Understandable. So we are building new security solutions to cope with this threat in order to build and establish an identity on the consumers, on the browsers, to be able to run and provide such tracking capability and a professionalization capability to be able to apply and detect
Starting point is 00:06:02 abnormal activities anywhere and behind any perimeter you access. Wow, okay. Tell me about the solutions that you brought to market and what has been the market response to them? Okay, so at the network, we are leading from the denial of service, protective networks, service provider networks, with large tier ones. And we are adding to that kind of service,
Starting point is 00:06:30 a new form of distributed line of service, once again, because of the distribution of the networks. This is on the application and application protection. We are providing now a new stack, a new stack. We like to call it providing a best-of-breed components to a best-of-sweet. While the layers, the security layers and the stack contain today application, seven details, anti bot protection, web application file, and API protection. So where brings four layers, packaging is one stack.
Starting point is 00:07:18 If you remember, we talked about identity. Identity, use crypto identity. Identity. Whose crypto identity? It's a cross, I call it, a cross layer anchor for our behavioral anomaly detection across all the stock. What has the market response been to the solutions?
Starting point is 00:07:42 And have you heard anything interesting from customers at Mobile World about things that are on their mind that maybe the industry hasn't paid attention to oh i think that everyone are coming now limit a lot of both enterprise customers they are building their 5g private so-called the private shop shop in Lebanon, obviously service provider abiding the core and 5G public. I would say that everyone now, especially the last year with the political tensions, CGPT coming and providing many new opportunities
Starting point is 00:08:24 probably for the healthcare community. Sure. and Chagipiti coming and providing many, many new opportunities, probably for the hacker community. Sure. Everyone starts to understand that usually every year we always say this is an inflection. I see something smelling there that this year is the real inflection. We pay a lot of attention on that one, and especially on publicly exposed web resources, where everyone understands that exposing everything will be open up to the media,
Starting point is 00:08:57 attack surface. And people understand that, especially those that are dealing now with the 5G private sector. Bringers of enterprise resources build on utilizing 5G, slicing technology for providing by service providers. You talked about some of the industry standards that are driving this space. Do you think that there's any industry standard of work that needs to be done
Starting point is 00:09:22 to address any of the attack challenges that we're still facing? Look, you know, some standards, let's say, built in to the 5G standards. We are talking in the 5G now. I think the 6G will address some of the others. Yeah, because always there will be a lag between the general telco community and protecting the network towards the new attack surfaces. And I think even in the 5G, there was no wind shift in the security technology, that especially when you listen to the 5G standalone, which the primary use case is enterprise,
Starting point is 00:10:13 is that the 5G and the 6G definitely is actually utilizing almost web-based protocols. All the 5G core, it says, is based on HTTP-based protocols. Right. Not the access office. It's still the traditional. It opens up. Yeah, sure.
Starting point is 00:10:38 The web-based attacks offices. I don't think that it's up to mine taking care of us, you know, enough. And I think we need to pay more attention to it. As you look forward into 2023, what are the key things that you're looking for in the market in terms of the continued adoption within customers? And are there any headwinds that we're facing? I think more and more, let's take example, the 5G.
Starting point is 00:11:13 The Kubernetes takes over data center technology. Technology, Kubernetes implementation, the microservices implementation. So if you go to the tool from the RIC, the radio intelligent controller, you will have their XAMPS running in Kubernetes. Then they go to the edge compute. They will have their application running in Kubernetes. And you go into the 5G control SBA.
Starting point is 00:11:39 Everything is running Kubernetes. So I think in that sense, everyone understands that the security for running those applications needs to have two things. It needs to be able to run as a Kubernetes citizen in order to protect those applications. And secondly, be able to cope with the cadence of this application, of those applications. Those applications are running and changing very fast. Security needs to adapt and want and adapt very fast to adapt the security model to the image that runs in those containers. So there are new trends in the security itself and those are some of the key things that we do see. Besides that, remember, security is now downloaded as software. It's a software.
Starting point is 00:12:35 We write from the CI-CD pipeline. So the same way you download the image, the application image, we have built our security to run the same way from the CI CD pipeline adapted to the image running into the to the cluster. David, I really enjoyed the conversation and I've learned a lot about Redware and security at the edge. So thank you for the time. I'm sure my listeners are also intrigued. Where can they find out more information about the company and touch your team? Radware, www.radware.com. We have a sales force all over the globe, especially in North America.
Starting point is 00:13:18 So through that, you can find a lot of information, contact our sales team, and we will be more than happy to come and support you. Thank you, and have a great Mobile World Congress. Thank you very much. Thanks for joining the Tech Arena. Subscribe and engage at our website, thetecharena.net. All content is copyright by The Tech Arena.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.