• Technologies
    • Black Lotus Labs
    • Cloud
    • Edge Compute
    • Collaboration
    • Managed Services
    • Network
    • Security
  • Business Advice
    • Business Continuity & Disaster Recovery
    • Customer Experience
    • Data Driven Business
    • Operational Efficiency
    • Tech Trends
  • Industries
    • Financial Services
    • Healthcare
    • Gaming
    • Manufacturing
    • Media and Entertainment
    • Pharmaceutical
    • Public Sector
    • Retail
    • Technology
  • About Us
    • Leadership Perspectives
    • NewsRoom
  • Technologies
    • Black Lotus Labs
    • Cloud
    • Edge Compute
    • Collaboration
    • Managed Services
    • Network
    • Security
  • Business Advice
    • Business Continuity & Disaster Recovery
    • Customer Experience
    • Data Driven Business
    • Operational Efficiency
    • Tech Trends
  • Industries
    • Financial Services
    • Healthcare
    • Gaming
    • Manufacturing
    • Media and Entertainment
    • Pharmaceutical
    • Public Sector
    • Retail
    • Technology
  • About Us
    • Leadership Perspectives
    • NewsRoom

It takes a team to build a secure, public-sector platform

Nick Andersen Posted On September 23, 2021
0
579 Views


0
Shares
  • Share On Facebook
  • Tweet It

We are living through a sea change in federal technology procurement. This sea change is more than just modernization mandates. It is the mindset shift from purchasing discrete pieces of infrastructure to architecting a platform that arrays many moving parts into a global, secure whole.

This raises the stakes on everyone in the value chain. Being a good vendor isn’t enough anymore. Providers need to be good partners – both to their government customers and to each other. Platforms have many moving parts that can be too complicated for any one company to go it alone.

Lumen understands this evolution better than most companies serving the public sector. We worked hard in recent years to take discrete offerings and integrate them into a platform composed of adaptive networking, edge cloud, connected security with threat intelligence and collaboration services. Our roots are in networks, so we know how to build and manage complicated, layered, secure networks. We also know how to weave them together with all the applications and other resources that modern enterprises rely on.

Security as architecture and mindset

As headlines remind us all too frequently, security is one of the primary challenges in modernizing government IT. Viewing capability and security as tradeoffs will erode the effectiveness of one or the other. There has to be a better way – and there is.

Layered networks are increasingly typical. We have built many of them. They are part of a zero-trust approach to security. The network is functionally separated into different layers with different access permissions and authentication needs that can restrict pathways to more sensitive resources for those not authorized to see or use that data. This approach can help secure any agency’s platform.

The use case that provides the archetype of this layered approach is national security. Consider the very real needs of intelligence agencies to protect information, but also make it readily available to those with the need to know. The layered approach can achieve both goals. In a simple hypothetical example, the network can grant high-level access to User X from certain locations or through certain gateways, and require enhanced authentication if that pattern is violated. Meanwhile, User Y might have a very different access profile. There are ways of making this layered access as fine-grained as necessary.

Lumen has built expertise and resources that can enhance both access and security in these layered networks. Edge cloud, often called edge computing, puts intelligence at the network edge where access, data ingestion and application usage originates. It is also the most vulnerable within the attack surface of any IT architecture. As access devices and new technologies such as the Internet of Things (IoT) and 5G native deployment proliferate, the danger potentially grows.

Edge cloud makes it possible to put data and applications closer to the point of access, reducing application latency to as little as 5 milliseconds. Because many of the large cloud providers already have data centers on our fiber network, we can replicate resources at the edge and maintain coordination with the centralized repositories in the cloud.

We can also move security functionality closer to the point of access. Authentication and other protocols can execute faster while acting as a primary checkpoint before any extensive network resources are made available. Lumen’s ability to deploy security protocols through the edge cloud is another layer of capability we bring to the public sector. Our edge resources also add leverage to our ability to monitor Internet traffic for DDoS and other threats as well as analyzing the emerging threats in Lumen’s Black Lotus Labs. Our cyber experts at Black Lotus are constantly learning how to improve security by monitoring and analyzing billions of DNS inquiries and NetFlow sessions, tens of thousands of Command and Control (C2) networks and other potential threats each day.

The right partner

Yet, with all our capability, Lumen recognizes that the ability to work with others is a key core competency in a fast-changing world. Going it alone or having just a single vendor build one of these complex platforms all but guarantees that some part of it will always be out of date. Collaboration with others is an important part of serving the public sector and the best way to bring the best-in-class technologies to bear on a solution.

Lumen works with many other companies, across major contracting vehicles. We ensure the technology handshakes are in place when data or application handoffs are necessary. In some instances, we even manage the accounting processes for a multi-vendor solution across an agency.

Check out our platform and our many public sector services. We are players on many teams.

This blog is provided for informational purposes only and may require additional research and substantiation by the end user. In addition, the information is provided “as is” without any warranty or condition of any kind, either express or implied. Use of this information is at the end user’s own risk. Lumen does not warrant that the information will meet the end user’s requirements or that the implementation or usage of this information will result in the desired outcome of the end user. ©2021 Lumen Technologies. All Rights Reserved.

Post Views: 579

Related posts:

  1. Lumen Opens New Federal Security Operations Centers
  2. Securing the public sector’s edge in a new era of cloud computing
  3. Simplifying Government Cybersecurity in an Increasingly Complicated World
  4. Collaborating with Government to Help Secure Federal Networks
0
Shares
  • Share On Facebook
  • Tweet It


public sector


Author

Nick Andersen

Nick Andersen is the Chief Information Security Officer (CISO) for Public Sector at Lumen Technologies. Andersen served previously as the Principal Deputy Assistant Secretary for the Office of Cybersecurity, Energy Security, and Emergency Response (CESER) at the U.S. Department of Energy. Andersen holds a Bachelor of Science in Information Technology Management and a Master of Science in Information Security and Assurance. He has received awards from the U.S. Navy, U.S. Marine Corps, U.S. Coast Guard, and Intelligence Community.

Trending Now
Unlock the Full Value of Managed Services for UC&C
Amy Foster September 5, 2023
Cloud and Data Security for Remote Work – When and Where you need it.
Jaden Morga September 29, 2023
You may also like
Seamless, Secure, and Smart: SASE Revolution in Higher Education
June 22, 2023
It takes an ecosystem to secure the future of K‑12
May 4, 2023
Defending the Evolving 21st Century Battlefield
March 23, 2023
SD-WAN and MPLS—Complementary (Not Competing) Technologies
Read Next

SD-WAN and MPLS—Complementary (Not Competing) Technologies

  • Categories

    Adaptive Networking

    Connected Security

    Hybrid Cloud

    Communications and Collaboration

    Edge Computing

    SASE


  • Lumen is guided by our belief that humanity is at its best when technology advances the way we live and work. With 450,000 route fiber miles serving customers in more than 60 countries, we deliver the fastest, most secure platform for applications and data to help businesses, government and communities deliver amazing experiences.

Services not available everywhere. ©2022 Lumen Technologies. All Rights Reserved.
Press enter/return to begin your search