How to Fail a Hacking Challenge
32 million Twitter passwords stolen, 117 million LinkedIn accounts compromised, and even Marc Zuckerberg’s Pinterest account hacked—there seems to be no let-up in IT security breach news those days.
It’s no surprise then that network security remains a key concern of CIOs the world over. According to research from the IT publication Computer Weekly, data loss prevention is the security project that tops IT decision makers’ priority lists. It’s certainly something our customers are always asking us about. This is why I’m so excited by the results of our recent SDN-Fx hacking challenge.
Over the past few months, at our highly-successful Avaya Technology Forum events in Bangkok, Dubai, Dublin and Orlando, we’ve held hacking challenges. Similar to hackathons, we invited engineers to try to penetrate our Avaya SDN-Fx stealth network. We even offered valuable prizes to encourage their endeavors. But the prize remains unclaimed—and the network unhacked.
Just last month, in fact, in Dublin, more than 50 engineers took part in the challenge. In total, over the four events more than 125 engineers have unsuccessfully tried to penetrate and cross between virtual service networks at these hackathons. While they might be disappointed, I’m delighted by this news! To me this result is a clear demonstration of the strength of the SDN-Fx stealth approach, and in particular of Avaya’s Fabric architecture.
For CIOs facing the continual threat of a security breach, knowing that their corporate network, which provides access to so many devices and so much critical data, is proven to be secure is vital to them. The consistent hackathon results, across three continents and four distinct regions, demonstrate the solid security features of our SDN Fx Fabric Networking architecture.
One of the reasons our network is so secure is the level of innovation we drive in our portfolio. Avaya’s fabric provides end-to-end tunneling of traffic across Layer 2, which makes it completely immune to IP Hacking attempts.
One great example of this is the Fabric Shield, which we demonstrated at our Avaya Technology Forums. This is a demo that combines Avaya Breeze™ and SDN Fx technology to identify a malicious intruder and their activity and to place the intruder into a forensics quarantine zone, where everything coming in and out of the attacker’s machine is monitored and recorded. Project Fabric Shield extends Avaya Fabric to the application developer by providing a Snap-in on the Avaya Breeze platform. By combining Avaya SDN Fx with Avaya Breeze, organizations can effectively control risks and ensure a secure network infrastructure.
With events like the hacking challenge and innovations like Fabric Shield, I am confident that we can continue to address the very legitimate security concerns of CIOs when it comes to choosing a secure, simple, and flexible corporate network architecture, and demonstrate the strength of the Avaya full stack solution.