January 20, 2021 By Jeffrey Palmer < 1 min read

“Security automation is truly fundamental as we look toward the significant transformation that 5G brings forward.” — Sree Koratala, VP of Product Management for Mobility Security, Palo Alto Networks

5G presents an incredible opportunity for Communications Service Providers (CSPs). However, as telco cloud, AI and automation become fundamental elements to digital transformation driven by 5G, addressing cybersecurity risks is a key concern.

5G is optimized for cloud native architecture, including emerging open radio access networks (Open RAN), driving the need to secure the cloud infrastructure and applications. Another aspect accelerating AI and automation is IoT. Think about the exponential growth of IoT devices, with 5G bringing a new level of device connectivity due to the greater density and scale.

Since 5G is expected to serve multiple industry verticals, they will expect enterprise-grade security in terms of bringing full visibility, context-driven security at scale and granular dynamic security controls. This includes the need to secure data and intelligent applications that run at the edge.

    In the above video featuring Palo Alto Networks and IBM, you’ll gain additional insights and find answers to these questions:

    • What are key security concerns for 5G?
    • How does automation play in relation to 5G security?
    • What are security considerations for telco cloud, virtualization and multi-access edge computing (MEC)?

    Ready to learn more?

    IBM and its partner ecosystem provide the industry-specific solutions and functions that are necessary to tailor a 5G solution for CSPs:

    Was this article helpful?
    YesNo

    More from Cloud

    Enhance your data security posture with a no-code approach to application-level encryption

    4 min read - Data is the lifeblood of every organization. As your organization’s data footprint expands across the clouds and between your own business lines to drive value, it is essential to secure data at all stages of the cloud adoption and throughout the data lifecycle. While there are different mechanisms available to encrypt data throughout its lifecycle (in transit, at rest and in use), application-level encryption (ALE) provides an additional layer of protection by encrypting data at its source. ALE can enhance…

    Attention new clients: exciting financial incentives for VMware Cloud Foundation on IBM Cloud

    4 min read - New client specials: Get up to 50% off when you commit to a 1- or 3-year term contract on new VCF-as-a-Service offerings, plus an additional value of up to USD 200K in credits through 30 June 2025 when you migrate your VMware workloads to IBM Cloud®.1 Low starting prices: On-demand VCF-as-a-Service deployments begin under USD 200 per month.2 The IBM Cloud benefit: See the potential for a 201%3 return on investment (ROI) over 3 years with reduced downtime, cost and…

    The history of the central processing unit (CPU)

    10 min read - The central processing unit (CPU) is the computer’s brain. It handles the assignment and processing of tasks, in addition to functions that make a computer run. There’s no way to overstate the importance of the CPU to computing. Virtually all computer systems contain, at the least, some type of basic CPU. Regardless of whether they’re used in personal computers (PCs), laptops, tablets, smartphones or even in supercomputers whose output is so strong it must be measured in floating-point operations per…

    IBM Newsletters

    Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
    Subscribe now More newsletters