Skip to content Skip to navigation Skip to footer

5G is the 5th generation mobile network. It is a new global wireless standard after 4G networks. 5G enables a new kind of network that is designed to connect virtually everyone and everything together including machines, objects, and devices.

5G wireless technology is meant to deliver higher multi-Gbps peak data speeds, ultra-low latency, more reliability, massive network capacity, increased availability, and agility. These have the potential to deliver new user experiences and connects new industries.

How Does 5G Work?

5G is composed from the following main components:

  1. 5G New Radio (NR) which defines the air interface upon which user, machines and devices connect and send and receive data. 5G NR includes several low and mid-frequency bands in the sub-7 GHz range, defined as FR1, as well as higher frequency bands above 24 GHz, defined as FR2/mmWave. 5G frequency includes all previous cellular spectrum and additional spectrum in the sub-7 GHz frequency range and beyond. A key reason that additional spectrum is being made available is to overcome the physical limitations associated with throughput and bandwidth.
  2. 5G Next Generation Core (5G NGC) is the “brain” of the 5G network, providing control and management for the network, its services, and the connected devices. The new 5G core, as defined by 3GPP, utilizes cloud-aligned, service-based architecture (SBA) that spans across all 5G functions and interactions including authentication, security, session management and aggregation of traffic from end devices. The 5G core further emphasizes Network Function Virtualization (VNF) as an integral design concept with virtualized software functions capable of being deployed in an agile and distributed manner.
  3. Multiaccess Edge Computing (MEC) is one of the key pillars for meeting the demanding KPIs of 5G, especially as far as low latency and bandwidth efficiency are concerned. MEC sites can host applications and services close to geographically close by machines, devices, and users to enable ultra-low latency applications and use cases. MEC is also expected to play an essential role in the transformation of mobile networks into versatile service platforms for industry and other specific customer segments.
  4. IP Multimedia Subsystem (IMS) delivers IP based multimedia services, enabling mobile operators to offer a new generation of rich multimedia services. IMS offers access to IP based services independent of the access network. 
How Does 5G Work?

What Are the Better Possibilities Brought About by 5G?

5G delivers the following main enhanced and new capabilities:

  1. Enhanced Mobile Broadband Communications (eMBB) that delivers up to Gbps speeds.
  2. Massive Machine to Machine Communications (mMMC) that supports high density (up to 1M devices per square kilometer) and unique IoT requirements.
  3. Ultra-high Reliability and Low Latency Communications (uRLLC) enables the high reliability and very low latency that are critical for many industrial use cases.
  4. Network Slicing allows the delivery of isolated and customized “network slices” to meet specific traffic requirements and use cases. These may include KPIs such as QoS, capacity, latency, and security.

5G is the most secure commercial mobile generation and wireless technology, with enhanced authentication, encryption, and overall integrity. 5G is a critical enabler for enterprises' real objectives, which is the deployment and enablement of a great number of use cases that bring value and innovation in products, services, operations, safety, and agility. These may include such things as closed-loop process automation, real-time logistic management, augmented reality, predictive maintenance, and more. Delivery of such use cases requires the creation, deployment, and management of an interconnected 5G industrial ecosystem, including all related OT/IIoT devices and vendors, industrial applications and tools—both on-site and on public/partner clouds, and the 5G network itself.

Therefore, the 5G native security capabilities are only part of the story. The 5G ecosystem that interlocks enterprises, providers, and the partners serving their unique business interests creates a distributed attack surface that 5G on its own is unable to defend. The rise of the sophisticated attacks—ranging from Advanced Swarm-Attacks that will leverage 5G-enabled devices to overwhelm defenses, to increasingly sophisticated IoT/IIoT and API-based attacks that can leverage AI to speed delivery and outwit traditional and isolated security systems—warrants a defense-in-depth approach to security. One that builds on the foundation of native 5G security with additional security layers to protect the entire 5G ecosystem end-to-end to deliver business-critical enterprise use cases.

Why Security is key with 5G adoption

Top Security Considerations While Adopting 5G For Your Organization

Read the Point-of-View Paper

The Future of Cybersecurity and 5G

Security is a condition for true and meaningful 5G adoption as a platform for innovation and transformation. Fortinet’s diverse portfolio and in-depth security experience across enterprises (IT), mobile network operators, operational technologies (OT), and IIoT/IoT has resulted in a uniform, practical, and flexible platform framework that is ideal for implementing security for 5G ecosystem

The Fortinet Security Fabric is a flexible, adaptable, broad, intelligent and automated security platform. Its solutions are integrated into a unified, cohesive, and end to end security platform offering actionable threat intelligence and AI-based security automation tools. And because it can be deployed anywhere, in any form factor, it provides the security visibility, automation, and control required to seamlessly span the public and private 5G networks and services employed throughout the 5G industrial ecosystem.

Unlike any other solution, the Fortinet Security Fabric enables the building and deploying of a comprehensive shared security responsibility model that supports both 5G providers and their enterprise customers over the entire ecosystem and across all use cases. It provides the security foundations upon which a trusted 5G ecosystem can be implemented and put to work so 5G-enabled innovation can be securely delivered to enterprises across all verticals.