This blog is an executive summary of an article by Fortinet’s Jonathan Nguyen-Duy that appeared on the Light Reading SecurityNow website on January 29, 2019, entitled, “5G Security Transformation: Why Businesses Need to Prepare Now.”
5G is set to transform our wireless experience. 5G networks will launch a new era of wireless networking and connected solutions, driving the number of 5G users to grow to more than a billion by 2023. Organizations that want to capitalize on 5G’s faster speeds, lower latency, more reliable connections, and support for new services need to prepare now to address the impact that its potentially explosive rate of growth and innovation will have on their business, along with a related surge in new security challenges.
Wireless networking will evolve into an open platform that will provide virtually unlimited capacity and service convergence. For example, 5G will provision computing services closer to end users, enabling 5G servers to act as application servers. Additionally, enhanced base station capacity will enable the delivery of new applications and services beyond traditional mobile computing services, such as support for industrial environments, physical access controls, office networks, and support for things like autonomous vehicles, augmented/virtual reality, and registerless retail.
Digital transformation efforts underway at many organizations are just the start. Supporting 5G’s new services and business opportunities will require organizations to significantly reshape many of the traditional relationships between networks, local and mobile computing resources, and end users. These changes will have a tremendous impact on cybersecurity. Tomorrow’s security must support elastic, edge-to-edge hybrid strategies to address new challenges, including:
The key to addressing the coming security challenges of 5G networks is to be proactive. Organizations can start today by ensuring that the following four security strategies are in place before 5G disrupts their network.
· Segment your network: Segmenting devices, workflows, applications, and transactions are critical for containing cybersecurity risks and protecting sensitive resources. New segmentation strategies will need to dynamically extend from the edge to the core, and negotiate secure access across network segments that you may or may not own.
5G offers the promise of more innovation, productivity, and quality-of-life outcomes through tremendously faster and more reliable connectivity that can support a new generation of rich services. To prepare for this opportunity, cybersecurity technologies and best practices need to be seen as enabling strategies. This starts by implementing an integrated and adaptable security fabric that ensures that your security framework won't get in the way of your organization's ability to take advantage of this new opportunity.
For a deeper analysis of this topic, please refer to the original byline article, “5G Security Transformation: Why Businesses Need to Prepare Now,” posted on the LightReading SecurityNow website authored by Fortinet’s Jonathan Nguyen-Duy.