Monday, 21 December 2020 11:45

How to secure enterprises through the 5G revolution

By Yaniv Hoffman, Radware senior security solutions architect for APAC
Yaniv Hoffman - Radware Yaniv Hoffman - Radware

GUEST OPINION: New technologies in wireless connectivity are spearheading a disruptive wave of digital transformation, which is changing the fundamental ways of business operations.

This paradigm shift isn’t just altering the way we think about our traditional IT infrastructure, but it is also creating innovative ways of doing business.

This is creating new business ecosystems and distributed supply chains where the interactions are not one-to-one but many-to-many relationships between suppliers, vendors, operators, and end-users.

2020 has been year one of a five-year deployment cycle in which 5G is moving from applications to major deployments in major cities worldwide. Increasing demand for 24×7 high-speed Internet access and low latency applications is spawning new business use cases across the industry spectrum.

Billions of IoT devices are multiplying every year and clear leaders are emerging in this global revolution. Significant investments in security controls will support this wave of deployments and will focus primarily on the protection of business applications and workloads and mitigation to protect the edge networks.

5G and industry 4.0

The cross-industry transformation between IoT and Industry 4.0 highlights the need to evolve wireless network connectivity for the fifth generation of mobile technology to enable new levels of speed, low latency and unmatched performance at-scale as compared to the previous generations of wireless communications technology.

The trifecta of high speeds, connectivity and Industry 4.0 provides specific capabilities for consumers as well as industries and society at large, thereby unleashing unlimited possibilities within the realm of IoT.

Service providers have a challenge and an opportunity in the 5G adoption cycle. As they provide new services for customers, there is a risk that services with insufficient security controls may not reach their customers.

Yet with requisite security infrastructure in place to detect malicious traffic on their roaming infrastructure, they sit on a remarkable revenue expansion opportunity to get more roaming traffic securely navigate through their network.

The 5G super-wave will be extraordinary for every industry, every business and every experience, as the businesses move further ahead into incorporating 5G for their next-gen digital infrastructure initiatives. And the role of security is unmistakably significant.

Who secures the 5G infrastructure?

Though there is a widespread notion that the large investments in 5G is coming from only service providers and telcos, the reality is that globally, several businesses are leveraging the 5G wireless networks to pivot their businesses in ways previously unknown.

Along with it, significant security infrastructure controls are being put in place from the core to the edge infrastructure by all the stakeholders: device manufacturers, software developers, enterprises and service providers. It’s a shared responsibility amongst all the stakeholders.

5G and end-to-end encryption

The trustworthiness of 5G does is not only about a bunch of technical security specifications, but also from their design principles, deployment considerations, and the measures related to management and monitoring of networks.

End-to-end encryption plays an integral role to ensure the security of a system.

Applications and endpoints, which do not need to connect to the internet in cases where the communication will be within the native telecommunication network, are generally very secure.

However, wireless networks do not provide end-to-end connectivity for all services, specifically, as in the case of the IoT devices will rely only on mobile networks to obtain access to the internet. These endpoints still require to get authenticated over the top identity management scheme, end-to-end security solutions (between the device and the server on the internet) and must ensure their specific application security.

5G does much better than the previous generations in roaming encryption. The new tech’s 256-bit encryption is a significant improvement on the 128-bit standard used by 4G. Moreover, 5G enables the encryption of the user’s identity and location, making it almost impossible to geo-locate the user from the time they hop on the network.

So 5G continues to push the horizon for security and privacy, based on increasing demands from industry and federal regulators alike. At the same time, information security continues to take the centre stage among enterprises that are embarking on the 5G digital transformation journey.

Needless to say, IoT is about secure connection and data flow from the end to the core, protecting personal data, business-sensitive information, and critical infrastructure.

It’s interesting to note the amount of data collection and interpretation related to the 5G deployment flags key security concerns related to detection, which need to be reviewed about the policies related to the detection of malicious network traffic. The exponential growth of more edge devices presents significant challenges to detect anomalies at-scale which so far was a manual activity by security operations personnel.

Current security operations (SoC) teams certainly need to expand their tools including algorithmic driven AI and ML at-scale which detects contextual behaviours and threat intelligence patterns based on indicators of compromise to reduce the manual workloads.

Hyper-scale security

Building a secure 5G infrastructure requires a comprehensive view and not just focus on the individual tenets of security in isolation. Several attributes, including data interaction and workflows, rules and policies of identity and access management, role-based access controls, data encryption, peak workload situations, failover, and network resilience aspects, demand the ability to scale security proportionately with application scale out, based on the user activity and traffic.

Service providers play a pivotal role in maintaining and help in keeping the 5G digital economy moving securely at an accelerated speed. With a high number of volumetric DDoS attacks targeting customers and their network, service providers can help distinguish the legitimate traffic from the malicious traffic across the spectrum from core to edge. This is particularly important when we are having data being delivered in milliseconds.

In the new digital super-wave of 5G, it is time for the providers building these networks to deliver on the aspects of security and resilient network infrastructure. 5G networks are built on software platforms and hence security can be deployed in creative ways, as compared to the bottlenecks faced in the previous generation networks.

This enables service providers to have the necessary technology and tools to scan their networks to block ransomware attacks traffic where and when it is necessary to do so.


Subscribe to ITWIRE UPDATE Newsletter here

GRAND OPENING OF THE ITWIRE SHOP

The much awaited iTWire Shop is now open to our readers.

Visit the iTWire Shop, a leading destination for stylish accessories, gear & gadgets, lifestyle products and everyday portable office essentials, drones, zoom lenses for smartphones, software and online training.

PLUS Big Brands include: Apple, Lenovo, LG, Samsung, Sennheiser and many more.

Products available for any country.

We hope you enjoy and find value in the much anticipated iTWire Shop.

ENTER THE SHOP NOW!

INTRODUCING ITWIRE TV

iTWire TV offers a unique value to the Tech Sector by providing a range of video interviews, news, views and reviews, and also provides the opportunity for vendors to promote your company and your marketing messages.

We work with you to develop the message and conduct the interview or product review in a safe and collaborative way. Unlike other Tech YouTube channels, we create a story around your message and post that on the homepage of ITWire, linking to your message.

In addition, your interview post message can be displayed in up to 7 different post displays on our the iTWire.com site to drive traffic and readers to your video content and downloads. This can be a significant Lead Generation opportunity for your business.

We also provide 3 videos in one recording/sitting if you require so that you have a series of videos to promote to your customers. Your sales team can add your emails to sales collateral and to the footer of their sales and marketing emails.

See the latest in Tech News, Views, Interviews, Reviews, Product Promos and Events. Plus funny videos from our readers and customers.

SEE WHAT'S ON ITWIRE TV NOW!

BACK TO HOME PAGE
Share News tips for the iTWire Journalists? Your tip will be anonymous

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments