Wanted: security solutions for private 5G networks

Wanted: security solutions for private 5G networks - Image by Cliff Hang from Pixabay

Share post

Businesses are looking for security solutions that seamlessly integrate with existing 5G technologies. According to Trend Micro, the market for cybersecurity of private 5G networks will grow to US$2027 billion by 12,9.

Trend Micro publishes the results of its new report "Beyond Secure by Default" in cooperation with the analyst house Omdia. The study shows that the majority of companies invest 5 to 10 percent of their IT budget specifically in the security of private 5G networks, although they assume that the technology is already more secure by default than previous standards such as 3G, 4G and LTE.

More security for 5G networks

The results of the study indicate that 72 percent of companies worldwide consider the "3rd Generation Partnership Project" (3GPP) approach to be sufficient for the security of private 5G networks. Such network architectures are developed taking security aspects into account and are generally more secure than public 5G networks because they are private. However, attackers can penetrate them. Respondents to the study seem to agree, with the majority of organizations estimating that they spend between $5 million and $XNUMX million of their IT budget on securing private XNUMXG networks and plan to increase that spending in the future.

When comparing the security requirements for private 5G networks in companies, the expectations of executives are particularly in the following areas:

  • Security transparency (75 percent)
  • Risk and control management (65 percent)
  • Improved and simplified warning system (49 percent)

The most important security requirements with which companies want to mitigate the cyber risks in 5G networks include:

  • Authentication (75 percent)
  • Access control (65 percent)
  • Protection against fake base stations (58 percent)

These divergent priorities indicate that leaders are focused on integrating and increasing the visibility of security measures across their organization. In contrast, those leading the implementation of 5G focus on raising security standards within the 5G network, in line with the principle of secure by default.

Shared responsibility at 5G

In addition, the report shows the importance of a shared responsibility model: Not all components need to be secured by the service providers, since companies themselves are also responsible for risk mitigation in certain parts of the environment.

The report concludes that educating the market and bridging the perception gap will be crucial going forward, especially given the current lack of awareness of security vendor solutions.

“When it comes to 5G private network technology, there is no such thing as 'secure by default'. So it's reassuring that companies want to add their own protections," said Udo Schneider, IoT Security Evangelist at Trend Micro. "It will be crucial to educate this new user base on where the critical vulnerabilities lie and what a shared responsibility model can look like in these environments."

Background to the report

Omdia surveyed 150 companies with more than 5.000 employees: 58 percent of them have already implemented private 5G networks and 42 percent plan to do so within a year. Sectors represented included energy, healthcare, logistics, manufacturing and semiconductors. Additionally, Omdia surveyed 150 service providers offering private 5G network security services to businesses. The study was commissioned by Trend Micro and its subsidiary CTOne.

More at TrendMicro.com

 


About Trend Micro

As one of the world's leading providers of IT security, Trend Micro helps create a secure world for digital data exchange. With over 30 years of security expertise, global threat research, and constant innovation, Trend Micro offers protection for businesses, government agencies, and consumers. Thanks to our XGen™ security strategy, our solutions benefit from a cross-generational combination of defense techniques optimized for leading-edge environments. Networked threat information enables better and faster protection. Optimized for cloud workloads, endpoints, email, the IIoT and networks, our connected solutions provide centralized visibility across the entire enterprise for faster threat detection and response.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

IT security: NIS-2 makes it a top priority

Only in a quarter of German companies do management take responsibility for IT security. Especially in smaller companies ➡ Read more

Cyber ​​attacks increase by 104 percent in 2023

A cybersecurity company has taken a look at last year's threat landscape. The results provide crucial insights into ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

Mobile spyware poses a threat to businesses

More and more people are using mobile devices both in everyday life and in companies. This also reduces the risk of “mobile ➡ Read more

Crowdsourced security pinpoints many vulnerabilities

Crowdsourced security has increased significantly in the last year. In the public sector, 151 percent more vulnerabilities were reported than in the previous year. ➡ Read more

Digital Security: Consumers trust banks the most

A digital trust survey showed that banks, healthcare and government are the most trusted by consumers. The media- ➡ Read more

Darknet job exchange: Hackers are looking for renegade insiders

The Darknet is not only an exchange for illegal goods, but also a place where hackers look for new accomplices ➡ Read more