Documente Academic
Documente Profesional
Documente Cultură
Differentiators to 5G Adoption 3
Conclusion 6
FIXED HEALTHCARE
BROADBAND
5G networks will evolve in multiple stages over the next decade. Applications and services that were traditionally consumed
as over-the-top, or OTT, services required best effort connectivity. With 5G, use cases for life-critical and business-critical
services catering to key enterprise verticals will have more definite requirements on connectivity, security and targeted
SLAs. Securing 5G becomes critical, giving a chance for operators to move up in the value chain from being only connectivity
providers to secure business enablers.
Differentiators to 5G Adoption
It’s also clearly understood that security is a fundamental enabler for 5G. Naturally, a great deal of emphasis in these early
stages of the 5G evolution is being placed around delivering the higher data speeds, the latency improvements, and the overall
functional redesign of mobile networks to enable greater agility, efficiency and openness.
Myth #1: As 5G Networks Evolve, All You Need to Do Is Make Existing Security Elements Perform at Faster Speeds
The rapidly evolving threat landscape has tremendous security implications on the 5G networks impacting consumers, busi-
nesses and the operator’s own mobile network. Service providers have reached an inflection point where they must take an
entirely different approach with security. A Layer 3/Layer 4-based security approach is simply not positioned to handle the
sophisticated challenges of today and tomorrow effectively. Establishing a strong security framework is much more than just
stitching together ad hoc security modules in an attempt to offer 5G security. Disconnected security modules will not scale,
and security cannot be applied consistently throughout the network. A hop-by-hop security mechanism is not enough to
build the differentiated end-to-end security that 5G demands. A holistic and completely new approach to security is needed.
90%
operators can leverage 5G hosting centers to host enterprise applications of mobile
for industry verticals. Industries rely on the operators to serve their service
applications, and security is viewed as a shared responsibility for operators providers
and businesses.
In a survey conducted by Ericsson,1 which included Top 20 global mobile identified security as
service providers, 90 percent of respondents identified security as a key a key differentiator
differentiator in 5G adoption.
5G security vulnerability fuels operators’ business risks to offer reliable
and secure availability of life-critical consumer applications and
business-critical enterprise mobile services. Establishing a high reputation Figure 3: Key Ericsson finding about security
index will be critical for mobile network operators to build profitable 5G
business models.
3000 Tannery Way © 2018 Palo Alto Networks, Inc. Palo Alto Networks is a registered
Santa Clara, CA 95054 trademark of Palo Alto Networks. A list of our trademarks can be found
Main: +1.408.753.4000 at https://www.paloaltonetworks.com/company/trademarks.html. All other
Sales: +1.866.320.4788 marks mentioned herein may be trademarks of their respective companies.
Support: +1.866.898.9087 5G-security-wp-110918
www.paloaltonetworks.com