Verizon has orchestration in place across its network to support various delivery models and services, but closed-loop automation is lagging a bit. In an interview with FierceTelecom, Verizon's Shawn Hakl, senior vice president, business products, and Vicki Lonker, vice president, network and security product management, spoke about the importance of automation across the telco's network and service chains.
Home » Service Provider / MSSP » Verizon: Service chains are essential, but automation needs more work
NFV Is Down but Not Out
NFV has failed to live up to the original expectations five years after it was first conceived. How can the...
Other content in this Stream
How Fortinet Connects with Communications Service Providers (CSPs)
Fortinet’s charter with CSPs is to interpret market trends, address key issues, and help drive carrier businesses forward. By improving your competitive positioning, we help everyone make money....
Fortinet Acquires Bradford Networks
Learn more about how the combination of Fortinet and Bradford Networks extends segmentation and security to the enterprise network edge.
AI Doesn’t Eliminate Jobs, It Creates Them
Automation and AI are not eliminating jobs, they are creating them — high-paying, high-level and secure ones at that — at an unprecedented rate. As the levels of data continue to grow, that will...
Empowering Security in the CSP’s IoT Infrastructure and Services
CSPs are well-positioned to benefit from the continuing growth of Internet of Things (IoT) devices and related systems—but only as long as the infrastructure can support some IoT-specific...
Resolving the Challenges of IT-OT Convergence
Success in the new digital economy requires developing integrated networks that are able to seamlessly leverage all available resources, even those ICS/SCADA systems deep inside OT networks.
Carriers pledge to limit aggregators’ access to customer location data
Following press investigations and congressional concern about leaks and improper use of consumer location data provided by mobile network operators, the national carriers have said that they are...
Transforming the market: How technology is creating opportunities for MVNOs
Freelance Technology Journalist Kate O’Flaherty explores how technologies are creating opportunities for Mobile Virtual Network Operators. AI customer service, 5G and virtualisation are among the...
Going Beyond Compliance
Organizations that go beyond compliance to offer robust data-security controls provide greater value to consumers and build their level of trust, resulting in a distinct competitive edge.
Together, Fortinet and AWS Secure the Government
Fortinet’s Security Fabric cloud solutions are available to AWS enterprise, service provider, and public sector customers, providing comprehensive security, threat intelligence, and visibility to...
Defending Against an Automated Attack Chain: Are You Ready?
Threats like AutoSploit bring malware-as-a-service to a whole new level. Here are four ways to be prepared.
Cybersecurity in the Digital Business Transformation Era
Even as digital technology is transforming business, government, and society, it also transforms how we think of and practice cybersecurity. There are five key implications for cybersecurity in...
ETSI's Zero-Touch Group Launches First PoC, Focused on 5G Slicing
Ambitious effort tackles what's needed to automate service delivery across domains, including multivendor gear.
What happens if IoT security doesn’t get solved?
Sometimes, confirmation of the obvious can be really important. At least, that’s how I felt when I saw a new Bain & Company report, Cybersecurity Is the Key to Unlocking Demand in IoT. According...
SDNs and NFV are complementary and core components of modernized networks
The terms software defined networking (SDN) and network functions virtualization (NFV) are often used interchangeably, which is incorrect. In a sense, the two are tied together as companies start...
Digital Transformation and Security Transformation Need to Walk Hand-in-Hand
At this phase of the global digital transformation, four areas stand out as particularly acute cybersecurity pain points.
Web Application Firewalls Adjust to Secure the Cloud
Cloud-based WAFs protect applications without the costs and complexity of on-prem hardware. Here's what to keep in mind as you browse the growing market.
Fortinet Expands Global Managed Security Service Provider Program with New Services Enablement and Technical Support Offerings
MEF Announces Progress on Multi-Vendor SD-WAN
Implementation project involving four vendors uses central gateway and common northbound API to enable service orchestration over 3 platforms.
Verizon's Hakl on the importance of proactive management of network topology
In the traditional telco world, a customer was often the alarm when something failed, but with today's complex networks telcos need to be proactive. Verizon's Shawn Hakl said that by managing...
AT&T Wraps Google Cloud Into Its NetBond for Cloud Platform