Monday, 21 December 2020 11:45

How to secure enterprises through the 5G revolution

0
Shares
By Yaniv Hoffman, Radware senior security solutions architect for APAC
Yaniv Hoffman - Radware

GUEST OPINION: New technologies in wireless connectivity are spearheading a disruptive wave of digital transformation, which is changing the fundamental ways of business operations.

This paradigm shift isn’t just altering the way we think about our traditional IT infrastructure, but it is also creating innovative ways of doing business.

This is creating new business ecosystems and distributed supply chains where the interactions are not one-to-one but many-to-many relationships between suppliers, vendors, operators, and end-users.

2020 has been year one of a five-year deployment cycle in which 5G is moving from applications to major deployments in major cities worldwide. Increasing demand for 24×7 high-speed Internet access and low latency applications is spawning new business use cases across the industry spectrum.

Billions of IoT devices are multiplying every year and clear leaders are emerging in this global revolution. Significant investments in security controls will support this wave of deployments and will focus primarily on the protection of business applications and workloads and mitigation to protect the edge networks.

5G and industry 4.0

The cross-industry transformation between IoT and Industry 4.0 highlights the need to evolve wireless network connectivity for the fifth generation of mobile technology to enable new levels of speed, low latency and unmatched performance at-scale as compared to the previous generations of wireless communications technology.

The trifecta of high speeds, connectivity and Industry 4.0 provides specific capabilities for consumers as well as industries and society at large, thereby unleashing unlimited possibilities within the realm of IoT.

Service providers have a challenge and an opportunity in the 5G adoption cycle. As they provide new services for customers, there is a risk that services with insufficient security controls may not reach their customers.

Yet with requisite security infrastructure in place to detect malicious traffic on their roaming infrastructure, they sit on a remarkable revenue expansion opportunity to get more roaming traffic securely navigate through their network.

The 5G super-wave will be extraordinary for every industry, every business and every experience, as the businesses move further ahead into incorporating 5G for their next-gen digital infrastructure initiatives. And the role of security is unmistakably significant.

Who secures the 5G infrastructure?

Though there is a widespread notion that the large investments in 5G is coming from only service providers and telcos, the reality is that globally, several businesses are leveraging the 5G wireless networks to pivot their businesses in ways previously unknown.

Along with it, significant security infrastructure controls are being put in place from the core to the edge infrastructure by all the stakeholders: device manufacturers, software developers, enterprises and service providers. It’s a shared responsibility amongst all the stakeholders.

5G and end-to-end encryption

The trustworthiness of 5G does is not only about a bunch of technical security specifications, but also from their design principles, deployment considerations, and the measures related to management and monitoring of networks.

End-to-end encryption plays an integral role to ensure the security of a system.

Applications and endpoints, which do not need to connect to the internet in cases where the communication will be within the native telecommunication network, are generally very secure.

However, wireless networks do not provide end-to-end connectivity for all services, specifically, as in the case of the IoT devices will rely only on mobile networks to obtain access to the internet. These endpoints still require to get authenticated over the top identity management scheme, end-to-end security solutions (between the device and the server on the internet) and must ensure their specific application security.

5G does much better than the previous generations in roaming encryption. The new tech’s 256-bit encryption is a significant improvement on the 128-bit standard used by 4G. Moreover, 5G enables the encryption of the user’s identity and location, making it almost impossible to geo-locate the user from the time they hop on the network.

So 5G continues to push the horizon for security and privacy, based on increasing demands from industry and federal regulators alike. At the same time, information security continues to take the centre stage among enterprises that are embarking on the 5G digital transformation journey.

Needless to say, IoT is about secure connection and data flow from the end to the core, protecting personal data, business-sensitive information, and critical infrastructure.

It’s interesting to note the amount of data collection and interpretation related to the 5G deployment flags key security concerns related to detection, which need to be reviewed about the policies related to the detection of malicious network traffic. The exponential growth of more edge devices presents significant challenges to detect anomalies at-scale which so far was a manual activity by security operations personnel.

Current security operations (SoC) teams certainly need to expand their tools including algorithmic driven AI and ML at-scale which detects contextual behaviours and threat intelligence patterns based on indicators of compromise to reduce the manual workloads.

Hyper-scale security

Building a secure 5G infrastructure requires a comprehensive view and not just focus on the individual tenets of security in isolation. Several attributes, including data interaction and workflows, rules and policies of identity and access management, role-based access controls, data encryption, peak workload situations, failover, and network resilience aspects, demand the ability to scale security proportionately with application scale out, based on the user activity and traffic.

Service providers play a pivotal role in maintaining and help in keeping the 5G digital economy moving securely at an accelerated speed. With a high number of volumetric DDoS attacks targeting customers and their network, service providers can help distinguish the legitimate traffic from the malicious traffic across the spectrum from core to edge. This is particularly important when we are having data being delivered in milliseconds.

In the new digital super-wave of 5G, it is time for the providers building these networks to deliver on the aspects of security and resilient network infrastructure. 5G networks are built on software platforms and hence security can be deployed in creative ways, as compared to the bottlenecks faced in the previous generation networks.

This enables service providers to have the necessary technology and tools to scan their networks to block ransomware attacks traffic where and when it is necessary to do so.


Subscribe to ITWIRE UPDATE Newsletter here

Now’s the Time for 400G Migration

The optical fibre community is anxiously awaiting the benefits that 400G capacity per wavelength will bring to existing and future fibre optic networks.

Nearly every business wants to leverage the latest in digital offerings to remain competitive in their respective markets and to provide support for fast and ever-increasing demands for data capacity. 400G is the answer.

Initial challenges are associated with supporting such project and upgrades to fulfil the promise of higher-capacity transport.

The foundation of optical networking infrastructure includes coherent optical transceivers and digital signal processing (DSP), mux/demux, ROADM, and optical amplifiers, all of which must be able to support 400G capacity.

With today’s proprietary power-hungry and high cost transceivers and DSP, how is migration to 400G networks going to be a viable option?

PacketLight's next-generation standardised solutions may be the answer. Click below to read the full article.

CLICK HERE!

WEBINAR PROMOTION ON ITWIRE: It's all about webinars

These days our customers Advertising & Marketing campaigns are mainly focussed on webinars.

If you wish to promote a Webinar we recommend at least a 2 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://www.itwire.com/itwire-update.html and Promotional News & Editorial.

This coupled with the new capabilities 5G brings opens up huge opportunities for both network operators and enterprise organisations.

We have a Webinar Business Booster Pack and other supportive programs.

We look forward to discussing your campaign goals with you.

MORE INFO HERE!

BACK TO HOME PAGE

Related items

Share News tips for the iTWire Journalists? Your tip will be anonymous