Home » Technology » 5G Raises Risks for Enterprises Slow to Respond to Threats
Sponsored

Sree Koratala

Vice President of Product Management, Palo Alto Networks

Lakshmi Kandadai

Director of Product & Solutions Marketing, Palo Alto Networks

Enterprises adopting 5G connectivity need to prepare for new security threats accompanying the network.


Every new generation of mobile technology brings with it a new generation of security issues. This includes the modern mobile IoT and 5G environments, as more devices and more data mean more targets for cyber attacks. Security remains a top concern and technical barrier for enterprises to adopt 5G and IoT.

“Enterprises don’t have visibility into the cellular protocols specific to the 5G networks. If they can’t see the protocols that are proprietary to the cellular network, it becomes even more difficult to enforce security policies,” says Lakshmi Kandadai, Director of Product and Solutions Marketing at Palo Alto Networks.

It isn’t sufficient to rely on “legacy and disparate security solutions,” she adds. Large enterprises deploying siloed services from dozens of vendors could end up with a fragmented response when an attack does happen. Not only is the manual threat response time consuming and costly, it also increases attacker dwell time and puts organizations at risk. 

Speedy response

With 5G networks comes a greater reliance on cloud and edge computing, creating a highly-distributed architecture that spans across multi-vendor and multi-cloud infrastructures. It’s crucial that cybersecurity measures act in real time, consistent with the faster speeds that 5G promises. Securing applications and data across the enterprise 5G network, cellular IoT, and edge clouds is the key challenge.

“Enterprises are adopting 5G to accelerate their digital transformation and they demand the same level of enterprise-grade security on their new 5G network,” says Sree Koratala, Vice President of Product Management at Palo Alto Networks. “A holistic platform extended to support 5G protocols and scale of operations gives them the opportunity to bring granular security controls into the enterprise 5G network.”

Next article