Cybersecurity platform with protection for 5G environments

Cybersecurity platform with protection for 5G environments AI- Bing
Advertising

Share post

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting enterprises' ever-expanding attack surface, including securing 5G deployments.

In the coming years, private 5G networks will cover a wide range of facilities, from corporate campuses to smart factories to shopping malls. However, they also pose new risks arising from complex network function virtualization (NFV), challenges in information technology and operational technology (IT/OT) convergence, unprotected IoT devices, and new implementations of 5G communications technology (CT).

Advertising

Cover expanded attack surfaces

Such a large attack surface requires holistic security across IT, OT and CT environments to both unify and simplify cyber risk management and support the implementation of zero trust strategies. This is the shared focus of Trend Micro and its subsidiary CTOne's platform approach, enabling continuous detection, comprehensive protection and rapid response across the enterprise, including private 5G environments.

The platform leverages CTOne's extensive expertise in the next generation of mobile networks. The Trend Micro subsidiary was founded last year with the aim of improving the security of 5G networks. At MWC, CTOne will also introduce its new CTOne SecureRAN solution, specifically designed to mitigate the cyber risks associated with Open Radio Access Network (O-RAN) architectures. The Trend Vision One platform, together with CTOne, offers end-to-end protection and AI-powered XDR for endpoint, email, cloud, RAN (Radio Access Network), MEC (Multi-Access Edge Computing) and 5G core environments .

Advertising

Vision One platform together with CTOne

CTOne's solutions fit into Trend Micro's strategy for securing digital transformation and enterprise attack surfaces, and underscore the importance of securing private 5G networks in managing risk for modern business operations.

“Private 5G networks are already transforming industries as diverse as healthcare, retail, energy and manufacturing. At the same time, such projects also increase complexity and increase the digital attack surface, which threatens to undermine the added value of the new technology,” explains Udo Schneider, Governance, Risk & Compliance Lead, Europe at Trend Micro. “As visitors to our MWC booth will experience live, Trend offers a blend of deep expertise and powerful, centralized protection with a comprehensive enterprise security platform, including 5G security.”

More at Sophos.com

 


About Trend Micro

As one of the world's leading providers of IT security, Trend Micro helps create a secure world for digital data exchange. With over 30 years of security expertise, global threat research, and constant innovation, Trend Micro offers protection for businesses, government agencies, and consumers. Thanks to our XGen™ security strategy, our solutions benefit from a cross-generational combination of defense techniques optimized for leading-edge environments. Networked threat information enables better and faster protection. Optimized for cloud workloads, endpoints, email, the IIoT and networks, our connected solutions provide centralized visibility across the entire enterprise for faster threat detection and response.


 

Matching articles on the topic

AI-supported assessment of network vulnerabilities

Innovations continue to drive cybersecurity consolidation by eliminating outdated vulnerability management tools and extending AI-based risk prioritization to network assets ➡ Read more

Ransomware groups rely on more affiliate models

The APT groups DragonForce and Anubis introduce innovative approaches to expanding their activities and consider themselves a cartel. ➡ Read more

Majority of security experts consider cyber immunity to be effective

A recent survey of cybersecurity experts in companies in Germany shows a clear need for cybersecurity strategies that go beyond traditional solutions. ➡ Read more

Attacks on the water supply

Water is one of the most valuable resources as the basis of all life. It is therefore no wonder that water supply is increasingly becoming a goal ➡ Read more

PHASR proactively strengthens endpoint security

An industry-first endpoint security solution that hardens endpoints dynamically and tailored to each user: Bitdefender's PHASR. This ensures that security configurations ➡ Read more

Using exposure management against ransomware

A leading IT security company has published its latest cybersecurity report. Only a quarter of German security experts are optimally prepared for ransomware attacks. ➡ Read more

Sophisticated Phishing-as-a-Service (PhaaS) platform

Security researchers have uncovered a sophisticated Phishing-as-a-Service (PhaaS) platform that poses a serious threat to organizations around the world. The threat actor ➡ Read more

PDFs: The Trojan Horses of Hackers

Cybercriminals are increasingly using the popular PDF file format to hide malicious code. Recent IT forensics findings underscore this: 68 ➡ Read more