The use of standard, off-the-shelf components for telecom equipment and network elements seem a good idea. Adoption of standard operating systems such as Linux also seem like a good idea. In fact, it enables adoption of contemporary best practices in security but also enables a greatest number of attackers to be already familiar with the telecom architecture that was previously unknown to many.
In this webcast, we will talk about the typical implication of ATCA in term of security, security management and vulnerability. Practical examples of vulnerabilities will be detailed and it will be shown how one operator can take advantage of ATCA rather than suffering from its remaining insecurity and exposure.