In my previous blog posts titled “Why do we need Zero Trust?” and “What are the benefits & challenges of implementing ZTNA?,” I discussed the rationale, benefits, and challenges associated with implementing Zero Trust Network Architecture (ZNTA). Now, the question arises: how can we effectively put the Zero Trust Model into action? In this concluding instalment of CACI’s Zero Trust series, I will provide a concise overview of the necessary steps to advance ZTNA implementation.
The Zero Trust Network Architecture deployment cycle
Below is a typical deployment cycle as created by the U.S. National Institute of Standards and Technology. Before you bring ZNTA to your company, you need to first assess your system and user inventory and then perform a business process review to understand the current state of your operations.
After creating the initial inventory, you should put in place a regular cycle of maintenance and updating as well as continuing to evaluate your business processes to progressively improve your architecture.
The Zero Trust Maturity Model
As I said in my previous blogs, Zero Trust is a transformative journey and you must invest considerable time and resources to build a mature Zero Trust Network Architecture. The model below shows you a gradient of Zero Trust implementation across five distinct pillars, where minor advancements can be made over time towards optimisation. It can be described using three stages, with increasing levels of protection, detail and complexity of adoption. All these descriptions are used to identify maturity for each Zero Trust technology pillar and to provide consistency across the maturity model:
Traditional – Manual configurations and assignment of attributes; static security policies; pillar-level solutions with coarse dependencies on external systems; least-function established at provisioning; proprietary and inflexible pillars of policy enforcement; manual incident response and mitigation deployment.
Advanced – Some cross-pillar coordination; centralised visibility; centralised identity control; policy enforcement based on cross-pillar inputs and outputs; some incident responses to predefined mitigations; increased detail in dependencies with external systems and some least-privilege changes based on posture assessments.
Optimal – Fully automated assigning of attributes to assets and resources; dynamic policies based on automated/observed triggers; assets have self-enumerating dependencies for dynamic least-privilege access (within thresholds); alignment with open standards for cross-pillar
interoperability; centralised visibility with historian functionality for point-in-time recollection of
state.
Unlike other technologies which are ‘all or nothing’ capabilities, Zero Trust is an extendable spectrum of capability. I know some companies may find it hard to reach the ‘Optimal’ stage because they must invest far more resources than they are comfortable with. Even though their technological capability may be mature enough, their IT team also needs to be upgraded and end-users educated in parallel. Technology and company culture are interdependent.
How CACI can help
CACI has cybersecurity experts who can improve the protection levels of your business. Capabilities include Zero Trust Network Architecture, Threat Analytics, Systems Hardening, Network Analytics and Next Generation Firewalls. We can perform a risk assessment to advise you on what cybersecurity you need.
Together, we can rethink your cybersecurity strategy in this cloud-first world – have you incorporated Zero Trust Model as part of your plan? To build the future of trust from ‘zero’, have a read of our Zero Trust Model whitepaper where we cover everything in this blog series and more. Download your copy now.
In my last blog, I explained the reasons for transforming to a Zero Trust Model. In this next blog of CACI’s Zero Trust series, I’ll explore some of the benefits and challenges to implementing Zero Trust Network Architecture (ZTNA) in your business.
Benefits of implementing Zero Trust Network Architecture
ZTNA not only improves your network security, but also enhances your business processes and protects your end-users. A few of the ways in which you and your business can benefit from Zero Trust include:
Your Network
– Secure remote connectivity Traditional on-premises architecture cannot support remote access at scale. ZTNA allows more remote users to securely connect to your company network via multi-factor authentication (MFA).
– Secure cloud adoption ZTNA enables the classification of access rights on the cloud so that only authorised users can access your selected assets
Overall Security
– Improved data protection
You can secure confidential data by implementing least-privileged access control and strict user authentication. This minimises the blast radius in any data leakage incident. – Protection against threats
Any configuration changes are automatically triggered and analysed for suspicious activities in ZTNA, keeping down the overall risk exposure.
User Enablement
– Enabling a global workforce
ZTNA sets up your network infrastructure so that global employees and business contractors can access your company network safely via a Virtual Protected Network (VPN). – Optimised customer experience
ZTNA allows your customers to securely access any confidential data and to complete transactions anywhere by verifying their identities.
Challenges to implementation
Transforming to modern technology is always easier said than done. There are a few common hurdles to overcome in order to complete the Zero Trust journey:
‘Implicit trust’ in the legacy system
A few of my clients’ legacy systems still rely on ‘implicit trust’, which conflicts with the core principles of ZTNA. Some of their upper-layer applications are built from older protocols or conventions from when the public internet was a trustworthy space. These dated applications have been bolted onto security and data encryption layers since the evolution of technology.
You’ll need an appetite for bold change and significant investment to transform to ZTNA, and it won’t be built in one day! Most companies operate in a hybrid Zero Trust or perimeter-based mode while they make the transition.
No standardised frameworks for component creation
There are no standardised frameworks for creating commoditised Zero Trust components. Different frameworks are suggested by governments or experienced IT consulting companies based on their knowledge and experience. For instance, there are many competing products for user authentication, such as Microsoft Active Directory, Okta, Azure AD and OneTrust.
Insufficient workforce support
I’ve spoken to some companies that have admittedly not invested enough in their networking and security. This led to a lack of leadership support and security experts to drive their transformation to Zero Trust.
If this is the case in your business, you can partner with an IT outsourcing provider that will advise you on the best fit Zero Trust framework and equip you with a team of security experts to help you get there. We have some top tips on how to find the right IT outsourcing partner which you might find useful.
How CACI can help
CACI’s team of cybersecurity experts can help you improve the protection levels of your business, from Zero Trust Network Architecture, Threat Analytics, Systems Hardening, Network Analytics and Next Generation Firewalls. We perform a risk assessment to advise you on the comprehensive cybersecurity you need.
We also have experts in Cloud Network on-ramp Connectivity, such as Microsoft ExpressRoute, AWS Direct Connect, GCP Cloud Dedicated Connect and SASE/SdP/VPN technologies like Zscaler and Tailscale.
Stay tuned for my final blog, where I’ll be sharing some efficient ways to implement ZTNA. If you’d like the whole story, take a look at our Zero Trust Model whitepaper where we cover everything in these blogs and more. Download your copy now.
Traditional cybersecurity paradigms focus on network-based security strategies like firewalls and other tools to monitor user activities on the network. However, digital transformation and social environment factors have driven new cybersecurity strategies to focus on protecting end-users, assets and resources. This is the prototype of the ‘Zero Trust Model’.
In this new blog series, I’ll explain the reasons for transforming to a Zero Trust Model as well as the benefits and challenges of implementing Zero Trust Network Architecture. I’ll also cover how you might efficiently implement it.
What is a Zero Trust Model?
But first things first, what exactly do we mean by ‘Zero Trust’? Well, Zero Trust is not a technology, it’s a security model with a set of guiding principles for workflow, system design and operations that can be used to improve the security posture of any classification or sensitivity level.
Zero Trust is a transformative journey rather than a complete replacement of technology. Ideally you should evaluate the security risks in your business model to before you start shifting to Zero Trust. Yet, during the COVID-19 pandemic, many companies were forced to quickly change their central-breakout remote access VPN to a Zero Trust using cloud-based equivalents such as Netskope, Zscaler or Tailscale. They then had to progressively apply Zero Trust principles, process changes and technology solutions that protect their data assets and business functions as they went along.
Now, they are often left having to operate in a hybrid Zero Trust/ perimeter-based mode while continuing to invest in IT modernisation initiatives and improve business processes – not ideal.
Why do we need a Zero Trust Model?
In the new working environment that we find ourselves, we need to look at a Zero Trust Model for a number of reasons:
Remote work and BYOD policy for employees
In the post-COVID era, remote working and a BYOD (Bring Your Own Device) policy have become the new normal. The “castle-and-moat” network security model in fixed office locations and employer-owned devices cannot cater for every employee’s needs. More staff are working out of the office using their own devices and Wi-Fi networks which are less secure in a remote working environment than in an office. You need to take a micro-level approach to authenticate and approve every access request in your network to make sure it’s secure.
Digital transformation of customer experience
The customer journey is not limited to retail shops and customers are rapidly shifting their buying behaviour to the internet and mobile applications. Thousands of personal computers and devices across the globe connect to company networks to complete transactions. This means that identity verification is critical for customers before they access their confidential data.
The high complexity of network architecture
In response to the high demand for rapid and secure access to data, anytime and anywhere, your company may operate several internal and external networks. These can include on-premises systems and cloud environments. Perimeter-based network security is then insufficient once attackers breach it whereas Zero Trust Network Architecture adds additional security layers to identity verification, such as a least-privilege access control, multi-factor authentication and endpoint verification for improved security.
Zero Trust forms a strong defence line against cyberattacks
With all these social and network environment changes, the opportunity for your network to be attacked is much greater. The median cost of cyberattacks in the UK rose 29% in 2022 with an average attack costing a business nearly £25,000.
Legacy systems, regulations and compliance practices are no longer sufficient amid increasingly sophisticated threats. Cloud environments are attractive targets for cybercriminals aiming to destroy and steal confidential business data. Amongst these different types of cyberattacks, ransomware tactics have evolved and become the most significant threat.
The Zero Trust Model is another approach to combat the emerging threat landscape which legacy security systems and perimeter approaches can no longer adequately mitigate.
How CACI can help
CACI has cybersecurity experts who can improve the protection levels of your business. Capabilities include Zero Trust Network Architecture, Threat Analytics, Systems Hardening, Network Analytics and Next Generation Firewalls. We perform risk assessment to advise clients on what comprehensive cybersecurity they need.
We also have experts in Cloud Network on-ramp Connectivity such as Microsoft ExpressRoute, AWS DirectConnect, GCP Cloud Dedicated Connect) and SASE/SdP/VPN technologies such as Zscaler and Tailscale.
In my next blog, I will be discussing the benefits and the challenges of implementing Zero Trust Network Architecture. However, if you want the whole story, have a read of our Zero Trust Model whitepaper where we cover everything in these blogs and more. Download your copy now.
Digital transformation has the potential to touch every part of the policing process, changing the way police work, harness data, exploit available technologies, collaborate with partner organisations and organise themselves. Each of these issues has wide reaching consequences, both for the industry as a whole and for individual officers. A responsible technology roadmap must therefore focus on the capabilities, processes and approaches that can maximise efficiency and learning across the whole policing system while meeting the specific needs of individual contexts.
Here we examine the key challenges faced when implementing new technology, as well as the ways forces can minimise risk and maximise ROI.
In the police force, this leads to issues such as:
Legacy technology limitations
Historically siloed procurement processes lead to a range of embedded tools that are no longer fit for purpose. Even systems that may have once been cutting-edge can be rendered unsuitable by a change in context, or rapid advances in technology. This leads to an inefficient patchwork of tools that don’t connect with one another, reducing efficiency and increasing spend, especially if locked-in to existing suppliers for long term contracts.
Clashing organisational structures
Structurally, the pace of change has raced ahead of the protocols that govern its implementation. This can be seen not only in the slow pace of procurement processes that can end up delivering outdated solutions, but also in the way those solutions are conceptualised. For example, there is still much to be decided on the appropriate use of how police forces use automation tools, such as artificial intelligence (AI), machine learning and the internet of things (IoT) in their role. In the absence of a clear path forward, it’s hard to take the next step.
Underinvestment in key areas
In an era of heavy budget scrutiny, public organisations of all kinds are wary of the risk of expenditure on systems that do not deliver value. While the public may be most interested in the number of frontline officers deployed, the less glamorous side of the policing – back-end infrastructure, data and communications – receive less attention, despite their crucial role in preventing crime.
Inconsistent understanding of data
The volume of data now available to businesses, consumers and public institutions is both huge and growing. While there have been promising results in steps towards using big data in policing, the real value can only be realised when aligned with a broader strategy that can source, structure, analyse and leverage data in a consistent way across different forces, platforms and contexts.
Creating a tailored transformation strategy
National policing development guidelines take into account that meeting these issues will not be a one-size-fits-all solution. The precise form and impact varies from force to force, depending on a range of factors. Moving forward requires a targeted approach that takes into account the unique circumstances of each force and deploys relevant strategies. A transformation plan must therefore include:
Awareness of the local challenges in policing and needs of the public
An assessment of the legacy systems in place
Plans to leverage available skills, personnel and budget
Appropriate timelines for change
A definition of success and project ROI
A key element of digital transformation for police forces will be appropriate collaboration with technology and change management providers. Given the huge range of products now available, there is scope to create unique technology stacks for individual forces that nevertheless connect to and enhance the capabilities of the wider police network.
By working with an experienced provider, you can create a transformation strategy that meets your unique challenges with a combination of relevant tools and process management. Outside advisors can also help streamline the planning and execution journey by offering a strategic view as to how operational processes can change, or be adapted, to make the most of emerging technologies.
Accelerating the digital journey
With the pace of technological change showing no signs of slowing, the challenges and opportunities that digital disruption presents to policing have the potential to become defining issues for the service.
To maintain its leading position in world policing and continue to operate as an effective public service, the police force in the UK must find a way to move past the challenges associated with digital transformation and embrace the opportunities available.
CACI has extensive experience working with large scale transformation in major industries, using agile, iterative approaches to test processes, new software and collaboration strategies to deliver tangible value quickly and cost-effectively.
In my last blog, I shared the most common cybersecurity threats faced by businesses in 2023. But how do you combat these threats? Can any threat management tools help prevent hacks and breaches? In this blog, I’ll give you a brief outline of different threat management tools along with some of the more common myths associated with them.
Threat Management Tools
The names of threat management tools are awash with acronyms so you might be confused about their actual functions. Let’s look at their full names and features:
EDR (Endpoint Detection and Response) EDR is an integrated endpoint security solution that detects and responds to suspicious activities on multiple endpoints such as desktops, laptops and mobile devices.
XDR (Extended Detection and Response) XDR is an evolution of EDR that extends the scope of threat detection and monitoring to networks, the cloud, applications and third-party data. It adds functionalities such as third-party integrations, automated enrichment & root-cause analysis, internal & external threat intel feed and one-click automatic response.
SIEM (Security Information and Event Management) SIEM collects, aggregates and analyses event log data across various sources, including networks, host systems, infrastructure, applications, endpoints and users in real-time. Your Security Operation Centre Team (SOC Team) can make use of this tool to detect and block attacks.
SOAR (Security Orchestration, Automation and Response) SOAR is an extension of SIEM, with orchestration, automation and response capabilities. It enables your SOC Team to define incident analysis and response procedures in a digital workflow.
Misunderstandings about threat management
Before you choose any threat management tools to help with your cyber security, let’s debunk some myths here:
#1: Threat management tools prevent all hacks and breaches. Be cautious about using the word ‘all’ – No threat management tool can 100% prevent hacks and breaches. Instead ‘assume breach’ is the safest approach for companies to take in threat management. This is one of the guiding principles of the Zero Trust Model, meaning the system denies all access by default unless every user, device, application workload and data flow is authenticated. Your SOC Team need to be more proactive in setting some rules and policies to block attacks in advance.
#2: The more event log data you collect, the more secure your system is. Overflow of data without relevant tooling to sift through the noise can drown your SOC team. If your team views too much irrelevant threat detection data, they may tune out key entries that might be an Indicator of Compromise (IOC). This makes threat detection like looking for a needle in a haystack. Therefore, you should only collect data that is relevant to analysing suspicious activities in your system.
#3: Threat hunting is a one-off exercise. Threat hunting should be a continuous process and an essential part of your cybersecurity strategy. Even if you deploy the best-fit threat management tool, your SOC team should regularly monitor the changes in data and refine your policies.
#4: Threat management tools are our panacea for cybersecurity. We don’t need to hire cybersecurity experts. Threat hunting is an ongoing battle and we know most companies have a knowledge gap in cybersecurity. To turn your data into intelligence, your SOC team should be fully staffed to collect and analyse the data. If you need help with your SOC team, you may decide to partner with external cybersecurity experts.
#5: Threat hunting can be fully automated by artificial intelligence (AI). AI tooling can help identify cyber threats by doing robotic and time-consuming tasks such as big data sifting and pattern matching in a mass-consistent way. Your team can then focus on data analysis, contextual interpretation, information reasoning and risk assessment. However, AI cannot decipher the ever-changing threat landscape as humans do. Humans can perform much better on new threat discovery and predictions so threat hunting can’t be fully automated.
Conclusion
Each threat management tool has unique features that perform different functions and analyses. There is no single solution that applies to everything and threat hunting is not a one-off investment but requires continuous effort to stay ahead of cyber threats. We advise you work with a cybersecurity expert to develop best practice for threat management and I’ll suggest some ideas on how to do this in my final blog.
How CACI can help
We have cybersecurity experts who can improve the protection levels of your business. Capabilities include Zero Trust Network Architecture, Threat Analytics, Systems Hardening and Network Analytics. We can also perform a risk assessment to advise you on your cybersecurity needs. Find out more about our cybersecurity capabilities.
Policing in the UK sits at a turning point, facing a rapidly evolving world of criminal activity that demands a new approach while also contending with tight budgets and highly scrutinised use of resources. To maintain its position as a world leader in policing, it’s essential for police forces to maximise the utility of available resources, be they financial, technological or human.
The challenge for many is that the infrastructure behind traditional policing methods has failed to keep pace with rapid advances in digital technology, driven by the private sector and enthusiastically embraced by the public, businesses and criminals alike.
In order to stay relevant, forces must be able to leverage these same capabilities, both to stay abreast of criminal activity, but also to improve efficiency and effectiveness in their own internal operations and focus resources where they can make the most difference.
In order to provide the service levels that the public expect and deserve, policing methods must be closely aligned with the challenges they are attempting to solve. In 2021, that means embracing and optimising digital systems.
Digital technology is now deeply embedded within nearly all areas of our lives, and crime is no exception. It’s estimated that more than 90% of reported crime now has a digital element, whether that’s in enabling threats, increasing their complexity or generating digital evidence through devices, applications, social media or the internet.
Alongside this evolution has come an explosion in the volume, complexity and availability of data. In 2020, people created 1.7 MB of data every second. This growth in information creates an opportunity for forces to analyse datasets to discover trends, use artificial intelligence to quickly support decision making and share data instantly. However, when it comes to data, many teams are working with outdated methods.
Risks of connecting the dots manually
Recent research from 2020 indicates that a large number of forces are still relying on manual processes to manage, transfer and analyse data. 66% of respondents acknowledged that data-management was the most time-consuming aspect of the investigation process including:
Driving around to collect CCTV video from homes and businesses
Copying and burning CDs and DVDs
Not only does this increase the manpower required to manage an investigation from end to end, it also slows down the evidence-gathering process. Across the country, this leads to thousands of hours of time wasted on manual processes that could be automated, taking officers away from other, more valuable work.
The digital systems that are in place can also be a limitation in themselves. Procurement processes can be long and laborious, resulting in a patchwork of technology that is out of date by the time it’s delivered, and that doesn’t integrate with other systems. This leads again to manual processes plugging the gaps, whether by physical transfer of information or manual rekeying of data.
By prioritising connectivity and data currency, police forces can enable a more seamless information journey that acknowledges the reality of modern challenges while improving utilisation of existing resources.
An efficient model of digital policing
While forces and national programmes have already been delivering change through a number of individual programmes designed to improve specific processes and outcomes, an efficient solution must take a holistic approach.
As collaboration between police and other government services becomes more important, connection needs to be built into the infrastructure of policing. We suggest three key ways that departments can approach digital transformation to target efficiency gains and improved results.
Maximising cloud connectivity
In order to make relevant data as accurate, available and shareable as possible, it’s essential to prioritise cloud networking. By moving away from a hard-copy based system of discs and hard drives, teams can minimise officer involvement with data transfers and centralise information with tools such as a digital evidence management system (DEMS).
Forces should aim to adopt a “cloud first” principle for applications and data, where economical, interrogating proposed solutions for ease of use, connectivity and security. This must go hand in hand with network upgrades and security. Cloud connectivity increases the data demands on networks, with more information moving digitally.
This may require investing in specific skill sets for network maintenance and management in order to ensure that the move to cloud is not barred by prohibitive costs or poor connectivity.
Implement targeted automation solutions
As well as making data more available for teams and sharing, cloud migration also makes digital data accessible between applications and interfaces. This unlocks the possibility to automate many of the manual processes that reduce efficiency and increase lead time for key activities.
Not only does this save time and resources, but automation also reduces the chance for human error when it comes to lost files, corrupted data or delays. By leveraging tools such as automated data-sharing mechanisms and data analysis tools, forces can access the information they need in a streamlined and efficient manner which avoids duplication of efforts.
Bringing legacy systems into the now
Adding in new digital capabilities need not be a complete ‘rip and replace’ project, removing all existing digital infrastructure. By combining existing legacy systems with new connections, forces can drive value sooner while targeting progressive improvement.
For legacy platforms that are not directly integrated with each other, API-based connectivity layers can enable mediated transfer of information into other front-end applications or data layers. This shortens the time to ROI while also building foundations for future deeper integrations of systems.
Embracing digital efficiency
In a rapidly digitising world, police forces have an opportunity to take control of the way they approach and engage with the new data revolution. By deploying connected technologies and sharing insights and functionality directly through online channels, officers can work more efficiently to target the root causes of criminal activity and offer better support to communities.
CACI is proud to be working with police forces to help develop their vision through a step change in their implementation of key technologies. By working together both tactically and strategically, we can help pinpoint transformation opportunities, identify bottlenecks and improve performance.
The aspirational and now widely accepted term ‘Metaverse’, refers to a set of interconnected virtual worlds; a new universe which has the potential to bring huge behavioural change and completely transform industry verticals in less than a generation.
Whilst the concept is still in its infancy, it provides a distinct opportunity for telco companies to expand beyond the traditional and trailblaze towards innovation, which bifurcates into two key areas of focus: a new ecosystem to participate in and a new ecosystem to enable. Companies around the globe are already recognising this potential such as Deutsche Telekom (DT) and South Korean telecom (SKT), who have teamed up and collaborated on a new metaverse platform of their own. Ifland is a 5G-based platform that launched in 2021 across 49 countries and now has a user base of almost 13 million. Utilising the popularity of K-Pop, they plan to create joint content with various international partners as well as building out novel communication functions.
Similarly, Meta is now in partnership with Verizon and Telefonica to build testbeds to develop the networking and cloud technology that will glue the metaverse together. Verizon’s focus with Meta is in mobile edge computing (MEC) infrastructure design, “to measure the impact of edge computing on key application performance metrics and evaluate where our network capabilities can enable more powerful metaverse-optimized applications”, quoted Rima Qureshi, Verizon VP. Telefonica are working on an “innovation hub” with meta; a 5G laboratory equipped with “a metaverse end-to-end testbed on Meta and Telefonica’s network infrastructure and equipment”, they have also invited tech start-ups in the metaverse space to participate.
The metaverse needs ubiquitous high-bandwidth, low-latency communication and new equipment to work at scale and will require a flexible and performant foundation to do so. With much of this technology still in research and development stages, the game is wide open for organisations to jockey for an early market position to lead this new world.
Telco operators are uniquely positioned to sit alongside technology giants in the metaverse value chain by harnessing emerging technologies they are already familiar with, such as 5G, cybersecurity, edge cloud and artificial intelligence.
In reviewing the following six areas, organisations will be able to play a truly assertive role in the build of this new virtual world and leverage the power of the metaverse.
1- Become The Leading Connectivity Provider
2- Review Edge Computing Capabilities
3- Prioritise Cybersecurity
4- Harness AI Analytics
5- Create Metaverse Platforms
6- Leverage Ecosystem Partnerships
Layers of the Metaverse
Provide connectivity
Depending on quality, the average virtual reality (VR) Metaverse user requires 5 to 40 times more data than it takes to stream an HD video and RajaKoduri, Senior Vice President and General Manager of the accelerated computing systems and graphics group at Intel states that, “truly persistent and immersive computing, at scale and accessible by billions of humans in real time, will require… a 1,000-times increase in computational efficiency from today’s state of the art”, confirming that delivering ‘metaverse grade’ ubiquitous connectivity will be critical in making the metaverse a thriving ecosystem.
Telco’s energy can be well channelled into becoming the leading connectivity provider and lowering the barriers to entry for consumers, of which, one of the most helpful tools will be 5G. 5G is expected to deliver higher multi-gigabits-per-second (multi-Gbps) peak data speeds, greater reliability, ultralow latency and a more uniformed experience. As 5G networks are commercially deployed, this will help consumers and businesses enter the metaverse.
We are also expecting to witness another upgrade in wireless technology with the arrival of 6G, supported by Nokia CEO, Pekka Lundmark, who said that he fully expects 6G networks to be in operation by 2030, which is predicted to bring full network coverage across land, sea and air. The off-loading of wireless traffic through Wi-Fi 6, the latest generation of Wi-Fi, will also help address network capacity and efficiency related challenges, as well as fibre connectivity increasing high-bandwidth speeds.
Offer edge computing
The computing power necessary to deliver a virtual world will be significant; requiring real-time rendering and AI capabilities to track various objects, characters and environmental effects whilst also adapting the display as these move through virtual space.
Delivering this experience reliably in a single-hosted environment with low latency is challenging and the cloud will not be able to centralise and store all of the necessary resources, but edge computing may well be the solution, becoming another essential cog in the metaverse machine. Edge computing is an IT deployment that puts data and applications as close as possible to the users, delivering a seamless experience by providing the necessary local computing power and minimising network-based latency and congestion risk.
In order to succeed, operators should evaluate and strengthen their partnerships with specialist cloud providers as well as consolidating their own edge cloud and legacy cloud strategies. This will then place them in prime position to provide efficient data transfers, enhance perimeter security, relieve network congestion and diversify their revenue streams.
Prioritise cybersecurity
Metaverse platforms can be susceptible to a host of privacy concerns, data leaks and security threats lurking beyond its virtual doors. Microsoft’s EVP of security, compliance, identity and management, Charlie Bell, urges organisations to prioritise the cybersecurity of the metaverse: “There must be clear and standard communication around terms of service, security features like where and how encryption is used, vulnerability reporting and updates,” Bell explains. “Transparency helps accelerate adoption — it speeds the learning process for security… We do not need to predict the ultimate impact of the metaverse to recognise and embrace the security and trust principles that make the journey a safer one for all”.
Data security will become increasingly valuable as both business and consumers grow ever more concerned with their digital footprint and integrity of their personal information. Operators hold a unique advantage here, as according to a study by Openet, “Consumers find mobile operators to be trustworthy with their data”.
Assuring all resources can discern and guard against the most fundamental dangers will help reduce long-term hurdles as the need for improved cybersecurity safeguards remains a top priority as technology continues to grow rapidly.
Poised as trusted custodians, operators can leverage their existing customer relationships and establish themselves as identity management experts whilst the metaverse continues to take shape.
Harness AI analytics
As the functional area of analytics and AI converges with the metaverse, telcos will need to pay attention to identity, billing and transaction management. In addition to a concern for customer data management and ownership, telcos will also likely play an assertive role and push far beyond infrastructure enablement. They will have the opportunity to create an analytics and AI layer to support both data management and payment capabilities which will pave the way for new revenue streams and monetisation.
Chatbots are also a great application that telcos may interpret to streamline business processes. These could be used in multiple functions such as providing instructions and information about various products and services, answering questions, completing transactions etc. Moreover, AI can be utilised to create inclusive interfaces that will make the users’ journey more accessible for everyone. With the aid of technologies such as Natural Language Processing, speech recognition, computer vision, translation and augmented reality, users will be able to interact with the metaverse in their native language and through images and videos to enhance their metaverse experience.
Create metaverse platforms
The term ‘metaverse’, currently refers to a collection of virtual worlds in which we can work, play, explore and collaborate in. The belief is that eventually, these platforms will start to combine and ultimately create one, all-encompassing decentralised virtual world; rich in offering, interoperable and governed by the community. In order to take advantage of this gradual evolution, operators could be well placed to create their own platforms, which would aid them in building a deeper understanding of both the demand and necessary technical competencies which would shape the long-term strategy.
Many organisations have already launched their own platforms such as Korean operator SK telco, who unveiled ‘Ifland’ in 2021. The key for other organisations looking to build successful platforms will be to create interesting experiences and events which compel users to spend time on the platform, as well as also ensuring there is capability to offer customised services for business and consumers.
Leverage ecosystem partnerships
Making the metaverse a reality will require significant advancements in multiple areas and no single company or industry can do this alone. Creating the metaverse will require a global effort and by telcos partnering with other expert participants within the metaverse ecosystem, they will be in prime position to drive the new age of the internet forwards and reap the rewards. A key area to consider will be hardware, such as virtual reality (VR) headsets, gloves and glasses. These devices will become increasingly important in acting as a gateway for humans to interact with the metaverse, therefore, operators can look to seize this opportunity by collaborating with device manufacturers and other technology platform providers to drive adoption.
By refining new partnership frameworks, telcos can explore new growth streams such as selling VR devices and connectivity services together, as well as having the capability of offering additional bundles of data packages. There could also be opportunities in strengthening relationships across different industry verticals, exploring different routes together and identifying collaborations. Telco’s should place focus towards long-term partnership strategies across the board to elevate their standings and unlock growth.
Conclusion
The metaverse is a rapidly evolving environment and whilst some prospects may currently be hyped, the rapid acceleration is tangible. In a study conducted by PWC of 1000 businesses, 66% confirmed that they were already “actively engaged”, coupled with a Cap Gemini report that stated 90% of consumers are curious about the metaverse, this new virtual landscape presents a situation and opportunity telco providers cannot afford to ignore.
Communication, computing, storage and analytics infrastructure are core elements of the configuration of the third web, meaning that without the efforts and involvement of telco operators, the creation of the metaverse remains as a sci-fi concept only.
Operators are excellently positioned to harness this exciting opportunity and by investing, innovating, partnering and strategising – they will succeed in fully leveraging the power of the metaverse.
PT Barnum once said, “Comfort is the Enemy of Progress!”
Keeping up with the rapid technological changes is essential for staying competitive, as is developing new ways to utilise your current technology capabilities.
With this in mind, have you explored how automation can benefit your business with increased productivity, reliability and reduced operating costs.
Let’s discuss a few areas where automation can change how your business works whilst futureproofing the solution.
Over the years, your business has grown, evolved and expanded. This can create highly complex configurations making network management, security update and innovation more tedious, expensive and challenging to implement.
In another instance, fast-growing companies look for further improvements in efficiency and productivity to ensure they get the best out of their teams and attract the best talent.
Network automation tools have been created for over 20 years and ClickOPS is still prominent, with more than 30% of enterprise network actions being automated. Nevertheless, there is renewed interest in concepts like GitOps and NetDevOps, which are quickly gaining popularity.
How does automation benefit you?
As detailed by MicroFocus, a Japanese financial institution stated that “Network automation has proven extremely effective for configuration management. Managing approximately 300,000 interfaces and 45,000 modules with Excel just isn’t feasible. It automatically collects firmware, CPU, power supply, and other detailed information from network devices, making real-time information management possible. As a result, the company can reduce information collection man-hours by 30% and increase the efficiency of various management tasks.”
Automating manual tasks or processes can improve accuracy and efficiency, so your IT team can focus on critical functions and strategic projects. You may tap into their creative and critical skills to discover their hidden talents.
Network automation allows you to complete changes and migrations with fewer resources, altering your teams to be more strategic and efficient, resulting in less human error.
Currently, most network maintenance is manual, logging into routers, switches, device discovery, and more. Consider what your teams can work on if they are not tied up with mundane but essential changes or provisioning.
It is essential to maintain regulatory compliance, but do you know that process automation can help your business to build a compliance program? The selected process is completed the same way every single time, which reduces the errors made. How does 100% accuracy in your audit trail sound?
Banks and financial institutions can easily find themselves over their heads with many rules and regulations to comply with. Fortunately, automation makes it easier. By automating complex banking workflows, such as regulatory reporting, banks can ensure end-to-end compliance coverage across all systems.
To deal with the ever-increasing complexity of networking, infrastructure and hybrid working environments, automation can make your teams more productive, the network more reliable, and the business easier to scale up.
So, as we said at the beginning, will you stay in your comfort zone or will you embrace the opportunity to use our specialists’ expertise to develop a strategy that will maximize your future opportunities.
How CACI can help
We have a great team of Network and Automation specialists who are happy to align with your strategy. We can futureproof your business to stand out from competitors by efficiently leveraging the full advantage of automation tools.
In today’s digital landscape, businesses are transforming to cloud computing to increase efficiency, reduce costs and scale up their operations for the future. While many companies opt for one type of cloud solution, either a full public or private cloud solution, some opt for a hybrid one to meet their business goals.
The benefits of a hybrid cloud solution are obvious:
Flexibility – You can choose where to run a workload based on the specific needs of each application. Therefore, this enables you to respond quickly to your business’s dynamic changes. Scalability – This enables you to scale up your business without the need for a massive investment in cloud infrastructure. Improved security – You can keep sensitive data on a private cloud, but it can be sent to the public cloud used by the application, enhancing security and compliance. Regulated industries find this especially useful.
But what about other complexities and security challenges?
According to CSO Online, “The Cloud Security Alliance (CSA), an organisation that defines standards, certifications and best practices to help ensure a secure cloud computing environment, cited misconfiguration and inadequate change control, as well as limited cloud usage visibility as being among the top three threats to cloud computing in 2020.” How much more so 3 years on!
Here are some concerns about adopting a hybrid cloud solution:
Complex security
When a company uses a hybrid model, the approach to security and management can become complex. Without a proper procedure tracking the use of services, the ability to access data will gradually reduce over time. A complicated system can create many loopholes and security issues which means the probability of a data leakage caused by an error or misconfiguration will increase.
Lack of appropriate skill set
There is also a knowledge gap. Yours will be one of many companies that have seen its cloud initiative proliferate beyond initial expectations. This will cause a drastic shortage of cybersecurity resources. Finding the right personnel to manage the existing environment and develop a new one is challenging.
Network connectivity breaks
What about the foundation of any company’s IT solution – the network? Connectivity between public and private clouds in a hybrid cloud framework is essential. Even one mistake in the overall network architecture could lead to the disruption of cloud services.
Why do banks opt for a hybrid cloud solution?
The hybrid cloud solution has become increasingly popular in the banking industry. A survey from IDC reported that 83% of banks surveyed use public and private cloud platforms. Bank of America has collaborated with IBM Cloud to develop a hybrid cloud solution offering the same level of security and economics as their private cloud with enhanced scalability, and Banco Santander has partnered with Microsoft Azure to extend their cloud capabilities, driving the creation of new cloud applications and developing innovative banking solutions. By adopting a reliable hybrid cloud solution, they can host some applications and workloads on the public cloud while securing sensitive data.
Conclusion
A hybrid cloud solution incorporates the advantages of public and private cloud solutions. Companies can manage costs with more flexibility and quickly scale up their business. Despite concerns about adopting a hybrid cloud solution, an increasing number of banks are trying to overcome these hurdles, developing innovative solutions and enhancing customer experience in the new digital era.
How CACI can help
We have highly skilled specialists with over 25 years of experience delivering a wide range of cloud strategies aligned with our client’s business goals. We are trusted by some of the world’s most successful companies in financial services, telecommunications, utilities and government.
In order to offer the best-fit solution for you, we partner with a group of top-tier technology and service providers rather than being tied to just one. So, if you want impartial, professional advice on hybrid cloud solutions, we’re happy to help.
Looking to work with an IT outsourcing provider? Finding the right partner to deliver your requirements can be a tricky and time-consuming process. But, done right, a successful outsourcing relationship can bring long-term strategic benefits to your business. We asked our experts to share their top tips on how to find the right IT outsourcing partner.
Evaluate capabilities
Having the right expertise is the obvious and most essential criterion, so defining your requirements and expectations is the best way to start your search.
When it comes to narrowing down your vendor choices, it’s important to consider the maturity of an organisation as well as technical capabilities. “The risk of working with a small, specialised provider is that they may struggle to keep a handle on your project,” warns Brian Robertson, Resource Manager at CACI. Inversely, a larger organisation may have the expertise, but not the personal approach you’re looking for in a partner. “Always look for a provider that demonstrates a desire to get to the root of your business’s challenges and can outline potential solutions,” Brian advises.
Find evidence of experience
Typically, working with an outsourcing provider that has accumulated experience over many years is a safe bet; however, Daniel Oosthuizen, Senior Vice President of CACI Network Services, recommends ensuring that your prospective outsourcing provider has experience that is relevant to your business, “When you bring in an outsourcing partner, you want them to hit the ground running, not spending weeks and months onboarding them into your world.” Daniel adds, “This becomes more apparent if you work in a regulated industry, such as banking or financial services, where it’s essential that your provider can guarantee compliance with regulatory obligations as well as your internal policies.”
So, how can you trust a provider has the experience you’re looking for? Of course the provider’s website, case studies, and testimonials are a good place to start, but Daniel recommends interrogating a vendor’s credentials directly, “A successful outsourcing relationship hinges on trust, so it’s important to get a sense of a vendor’s credibility early on. For example, can they demonstrate an in-depth knowledge of your sector? Can they share any details about whom they currently partner with? And can they confidently talk you through projects they’ve completed that are similar to yours?”
Consider cultural compatibility
“When it comes to building a strong, strategic and successful outsourcing partnership, there’s no greater foundation than mutual respect and understanding,” says Brian. Evaluating a potential provider’s approach and attitudes against your business’s culture and core values is another critical step in your vetting process. As Daniel says, “If you share the same values, it will be much easier to implement a seamless relationship between your business and your outsourcing partner, making day-to-day management, communication and even conflict resolution more effective and efficient”.
While checking a company’s website can give you some insight into your prospective provider’s values, it’s also worth finding out how long they’ve held partnerships with other clients, as that can indicate whether they can maintain partnerships for the long-term.
However, Daniel says, “The best way to test if a provider has partnership potential is to go and meet them. Get a feel for the team atmosphere, how they approach conversations about your challenges, and how their values translate in their outsourcing relationships.” Brian adds, “Your vision and values are what drive your business forward, so it’s essential that these components are aligned with your outsourcing provider to gain maximum value from the relationship.”
Assess process and tools
Once you’ve determined a potential outsourcing provider’s level of experience and expertise, it’s important to gain an understanding of how they will design and deliver a solution to meet your business’s needs. “It’s always worth investigating what tech and tools an outsourcing provider has at their disposal and whether they are limited by manufacturer agreements. For example, at CACI, our vendor-agnostic approach means we’re not tied to a particular manufacturer, giving us the flexibility to find the right solution to meet our clients’ needs,” Daniel explains
Speaking of flexibility, determining the agility of your potential outsourcing provider’s approach should play a role in your selection process. “There’s always potential for things to change, particularly when delivering a transformation project over several years,” says Brian, adding “that’s why it’s so important to find a partner that can easily scale their solutions up or down, ensuring that you’ve always got the support you need to succeed.”
Determine quality standards
Determining the quality of a new outsourcing partner’s work before you’ve worked with them can be difficult, but there are some clues that can indicate whether a vendor’s quality standards are in line with your expectations, says Daniel, “A good outsourcing partner will be committed to adding value at every step of your project, so get details on their method and frequency of capturing feedback, whether the goals they set are realistic and achievable, and how they manage resource allocation on projects.”
Brian also recommends quizzing outsourcing providers about their recruitment and hiring process to ensure that you’ll be gaining access to reliable and skilled experts, “It’s easy for an outsourcing provider to say they have the best people, so it’s important to probe a little deeper. How experienced are their experts? How are they ensuring their talent is keeping up to date? What is their process for vetting new candidates? All these questions will help to gain an insight into an outsourcing provider’s quality bar – and whether it’s up to your standard.”
Assess value for money
For most IT leaders, cost is one of the most decisive factors when engaging any service; however,
when looking for an IT outsourcing partner, it’s critical to consider more than just a provider’s pricing model. “Contractual comprehensiveness and flexibility should always be taken into account,” says, Brian. “A contract that is vague can result in ‘scope creep’ and unexpected costs, while a rigid contract can tie businesses into a partnership that’s not adding value.” He adds, “Ultimately, it comes down to attitude, a good outsourcing provider can quickly become a great business partner when they go the extra mile.”
Daniel agrees and advises that IT leaders take a holistic view when weighing up potential outsourcing partners, “Look beyond your initial project, or resource requirements and consider where your business is heading and whether your shortlisted providers can bring in the skills and services you need. After all, a truly successful outsourcing partnership is one that can be relied on for the long haul.”