* [Blog](https://www.paloaltonetworks.com.au/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com.au/blog/corporate/) * [Service Providers](https://www.paloaltonetworks.com.au/blog/category/service-providers/) * Automate Visibility and H... # Automate Visibility and Harness the Power [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2F2017%2F11%2Fsp-automate-visibility-harness-power%2F) [](https://twitter.com/share?text=Automate+Visibility+and+Harness+the+Power&url=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2F2017%2F11%2Fsp-automate-visibility-harness-power%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2F2017%2F11%2Fsp-automate-visibility-harness-power%2F&title=Automate+Visibility+and+Harness+the+Power&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com.au/blog/2017/11/sp-automate-visibility-harness-power/&ts=markdown) \[\](mailto:?subject=Automate Visibility and Harness the Power) Link copied By [Terry Young](https://www.paloaltonetworks.com/blog/author/terry-young/?ts=markdown "Posts by Terry Young") Nov 09, 2017 3 minutes [Service Providers](https://www.paloaltonetworks.com/blog/category/service-providers/?ts=markdown) [mobile network operators](https://www.paloaltonetworks.com/blog/tag/mobile-network-operators/?ts=markdown) [Mobility](https://www.paloaltonetworks.com/blog/tag/mobility/?ts=markdown) Are mobile network operators concerned about security in their NFV deployments? According to a recent Heavy Reading survey[\[1\]](#_ftn1){#\_ftnref1}, 62 percent of service providers are very concerned about security for their network function virtualization deployments, out-ranking other well-documented NFV flashpoints such as OSS integration and orchestration. This strong response also reflects the broad industry realization that NFV fundamentally challenges the assumptions of traditional security architecture and requires new approaches to stay ahead of the evolving threat landscape. In short, new functionality is required to strengthen protection levels, increase agility and visibility, and to automate detection, analysis and response to increased threats today and the network evolves for NFV, 5G and IoT. We call that capability "automated visibility", and it is the subject of a recent white paper by Heavy Reading. The paper, "[The Evolution of Security: Harnessing the Power of Automated Visibility,](https://get.info.paloaltonetworks.com/webApp/evolution-of-security-en)" encompasses four key concepts: * Real-time visibility across all network peering points and interfaces. * Automation of threat detection and analysis, with updates of signatures propagated in minutes. * Automation of threat intelligence collection, through the cloud, from a large base of enterprises, service providers and other threat feeds. * Automation of dissemination of security policy and signatures to a vastly distributed network. With automated visibility, service providers can jump ahead of cybercriminal capability, gain operational efficiency and provide deeper protection to their networks and subscribers. Other industry organizations have also addressed challenges in security into evolving networks. The Cloud Security Alliance's recent "[Security Position Paper -- Network Function Virtualization](https://cloudsecurityalliance.org/download/security-position-paper-network-function-virtualization/)" stated "... traditional security models are static and unable to evolve as network topology changes in response to demand. Inserting security services into NFV often involves relying on an overlay model that does not easily coexist across vendor boundaries." The perimeter-based security approach in traditional mobile network relies on standards-defined, compartmentalized network elements and interfaces. In contrast, a virtualized network is borderless and based on software. Once malware intrudes into a virtualized network, it can potentially move across VMs and attack other critical functions. The shift to NFV and 5G, the growth of IoT, as well as the dynamic threat landscape has many implications for service providers in defining their security posture: \*\*Over-provisioning of capacity is no longer effective against DDoS.\*\*Botnets can be recruited from multiple service provider networks and millions of lightly protected devices, and attacks drawn from such a large base can quickly exceed provisioned capacity. Software-based functions are even more susceptible to volume overloads. Over-provisioning increases costs. **Scheduled updates of security signatures is not sufficient:** Cybercriminals can quickly change malware and weaponized media news in minutes, leveraging the latest automation tools, off-the-shelf malware and public cloud capacity. Manual response processes of any kind are too slow. Threats need to be immediately identified and then responses uniformly propagated throughout the network. Manual processes will also diminish the operational efficiency desired from NFV investment. **Service providers can no longer focus on just threats from the "outside", (i.e, the internet), as threats can come from inside the subscriber base as well:** Attacks can be generated from subscriber devices authenticated within the network, through roaming partners or Wi-Fi. Now all peering points, network interfaces and insertion points are vulnerable. In virtualized, distributed networks, there are many, many more VMs, each representing a pinhole for possible infection. Automated visibility, with other next-generation security capabilities, is required to address these new challenges, establish an effective security posture and maintain it as the network is virtualized and evolves to support 5G. [Download the white paper now.](https://get.info.paloaltonetworks.com/webApp/evolution-of-security-en) [\[1\]](#_ftnref1){#\_ftn1} Heavy Reading Annual Security and MSSP Market Perception Study *** ** * ** *** ## Related Blogs ### [Service Providers](https://www.paloaltonetworks.com/blog/category/service-providers/?ts=markdown) [#### MNOs Want Better Security: Achieving Threat Prevention in a Hyper-Connected 5G Environment](https://www.paloaltonetworks.com.au/blog/2017/06/sp-mnos-want-better-security-achieving-threat-prevention-hyper-connected-5g-environment/) ### [5G Security](https://www.paloaltonetworks.com/blog/network-security/category/5g-security/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown), [Service Providers](https://www.paloaltonetworks.com/blog/category/service-providers/?ts=markdown) [#### The Right Approach to Securing 5G](https://www.paloaltonetworks.com.au/blog/2020/05/network-securing-5g/) ### [5G Security](https://www.paloaltonetworks.com/blog/network-security/category/5g-security/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown), [Service Providers](https://www.paloaltonetworks.com/blog/category/service-providers/?ts=markdown) [#### What Does It Mean to Be "5G-Ready"?](https://www.paloaltonetworks.com.au/blog/2019/01/what-does-it-mean-to-be-5g-ready/) ### [5G Security](https://www.paloaltonetworks.com/blog/network-security/category/5g-security/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown), [Service Providers](https://www.paloaltonetworks.com/blog/category/service-providers/?ts=markdown) [#### Differentiating With 5G Security: How Mobile Service Providers Can Become Secure Business Enablers](https://www.paloaltonetworks.com.au/blog/2019/01/differentiating-5g-security-mobile-service-providers-can-become-secure-business-enablers/) ### [5G Security](https://www.paloaltonetworks.com/blog/network-security/category/5g-security/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown), [Service Providers](https://www.paloaltonetworks.com/blog/category/service-providers/?ts=markdown) [#### Differentiating with 5G Security: It's Time For Mobile Network Operators to Seize the Opportunity!](https://www.paloaltonetworks.com.au/blog/2018/11/sp-differentiating-5g-security-time-mobile-network-operators-seize-opportunity/) ### [5G Security](https://www.paloaltonetworks.com/blog/network-security/category/5g-security/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown), [Service Providers](https://www.paloaltonetworks.com/blog/category/service-providers/?ts=markdown) [#### Establishing a New Approach for 5G Security](https://www.paloaltonetworks.com.au/blog/2018/11/sp-establishing-new-approach-5g-security/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com.au/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language