Private 5G Network Security Expectations Part 3

Q: Are you or do you expect to use cloud-based capabilities in your private network? Network cloudification?
Base: n = 408 Source: 451 Research custom study

Coexistence of technology evolution and cybersecurity

Openness expands business opportunities, but there are always major security challenges. Many of us will remember the Apache Log4j vulnerability that occurred at the end of 2021.

The use of open source is also promoted in O-RAN ALLIANCE mentioned above, but the biggest security issue of open source is the issue of vulnerabilities.
This isn’t limited to open source, but it’s an industry-wide challenge to inspect code and maintain secure management that is created through many stakeholders in a community.

For companies to utilize open source more safely, it is necessary to perform its security check at the top level, continuously monitor and manage the system, and update Threat Intelligence regarding open source.

When using a cloud environment to realize a more flexible and intelligent network, we usually entrust the operation of some or all of the equipment to a partner. In that case, it is desirable to adopt a shared responsibility model for security as well.

Many enterprises are promoting the use of private wireless networks.

Introducing these new technologies should not be limited to confirming functional requirements such as 5G performance and system operation at the PoC stage.

We strongly recommend that you perform PoCs for security operations that are integrated with enterprise-wide security.

To read the executive summary of this survey, visit: https://resources.trendmicro.com/IoT-5G-Networks-Report.html

Methodology
his report was commissioned by Trend Micro and leverages data from a survey conducted in the U.S., Germany, the U.K, and Spain. The survey consisted of about 400 respondents from the mentioned countries with job titles of director and above, across the manufacturing, power supply, oil and gas, and healthcare industries.
Sample titles of respondents include:
– VP/director of IT operations/CIO
– Director of IT, network operations/network architect/datacenter infrastructure and planning, network planning, 5G strategy planning, network virtualization, edge computing/MEC strategy and other equivalent roles.
We queried decision-makers who are aware of their company’s private 5G wireless networking strategy and implementation plans, deployment plans and security concerns.

Trend Micro provides industry-specific security solutions that include IT, OT, and CT (Communication Technology) represented by Private 5G.
https://www.trendmicro.com/en_us/business/solutions/iot/ics-ot.html

Trend Micro 5G Security for Enterprises
https://www.trendmicro.com/en_us/business/solutions/iot/enterprise-5g-iot.html



Source link