Available Now
It's no secret that a rapidly-growing proportion of broadband Internet connections are being delivered using 4G and 5G Fixed Wireless Access (FWA) technology. FWA is growing fast EVERYWHERE, with 330 million connections forecast globally by the end of 2029. FWA services represent a huge opportunity for mobile operators to grow revenue, as they deliver connectivity to fixed home and office infrastructure for both work and play, but these services bring with them new risks.
Wireline ISPs have long managed threats from their subscribers, such as DDoS related to gaming or compromised IoT; with FWA, mobile operators open themselves up to these same threats, with additional network complexity and cost thrown in for good measure.
Attend this webinar to understand:
Analyst:
Jim Hodges, Chief Analyst - Cloud and Security, Heavy Reading
Jim leads Heavy Reading's research on the impact of NFV on the control plane and application layers at the core and edge. This includes the evolution path of SIP applications, unified communications (UC), IP Multimedia Subsystem (IMS), session border controllers (SBCs), Diameter signaling controllers (DSCs), policy controllers and WebRTC. Jim is also focused on the network and subscriber impact of Big Data and Analytics. He authors Heavy Reading's NFV and SDN Market Trackers. Other areas of research coverage include Subscriber Data Management (SDM) and fixed-line TDM replacement. Jim joined Heavy Reading from Nortel Networks, where he tracked the VoIP and application server market landscape and was a key contributor to the development of Wireless Intelligent Network (WIN) standards. Additional technical experience was gained with Bell Canada, where he performed IN and SS7 network planning, numbering administration, technical model forecast creation and definition of regulatory-based interconnection models. Jim is based in Ottawa, Canada.
Speaker:
Darren Anstee, CTO for Security, NETSCOUT
Darren joined NETSCOUT in 2015 through the company’s acquisition of Arbor Networks, initially serving as Chief Security Technologist. He spent the previous 12 years working in a variety of leadership roles at Arbor Networks, including stints in consulting engineering and solutions architecture.
Offered Free by: NETSCOUT
See All Resources from: NETSCOUT
Thank you
This download should complete shortly. If the resource doesn't automatically download, please, click here.
Thank you
This download should complete shortly. If the resource doesn't automatically download, please, click here.