Protection for emerging 5G networks

5G radio mast

Share post

Trend Micro protects newly emerging private 5G networks and edge computing in companies and reaches the proof-of-concept phase (POC) in the process.

Trend Micro announces Mobile Network Security (MNS), a security solution for mobile networks. MNS accelerates digital innovation at the network edge by providing comprehensive network and endpoint protection for a new era of private IoT and 5G networks.

Service providers and system integrators are increasingly using shared and unlicensed products to build private cellular networks for their corporate customers. This leads to new business opportunities in 5G and IoT.

For business-critical applications at the network edge

“From shopping malls to airports and smart factories to corporate premises, private networks are becoming an increasingly popular way of delivering business-critical applications at the edge of the network. However, the associated complexity can lead to dangerous security gaps, ”says Udo Schneider, IoT Security Evangelist Europe at Trend Micro. “Trend Micro's decades of cross-functional cybersecurity experience has been instrumental in developing a comprehensive platform to protect cellular networks and untrustworthy IoT devices. We are excited to be working with key industry players like Japan Communications Inc. to make this vision a reality ”.

Private networks are an obvious solution for many companies, as they promise low latencies, minimal interference and a high level of security. However, CISOs face the challenge of having to compensate for a lack of in-house skills in order to combine specialist knowledge in the field of IT, OT and CT security.

Private 5G networks are a challenge for many companies

The answer is Trend Micro Mobile Network Security, which is made up of two key elements:

Network Protection (Trend Micro Virtual Network Function Suite)

Based on the ETSI NFV framework, the Trend Micro Virtual Network Function Suite (TMVNFS) offers powerful virtualized network security with low latency over 4G, 5G, NB-IoT and CAT-M. The solution enables north-south protection to secure all mobile and IoT devices in the private network and east-west protection to secure network traffic between edge computing applications and network segments. TMVNFS also includes access control, virtual patching, intrusion prevention, URL filtering, malicious website blocking, botnet C&C servers and malicious devices, application control and more.

Endpoint Protection

The solution enables comprehensive endpoint security for IoT devices in two form factors - physical SIM card and software Java applet. Endpoint Protection offers device whitelisting, geofencing, firmware integrity, IMSI / IMEI blocking, zero-touch provisioning, mutual authentication, TLS key generation on demand, device isolation, data encryption, blockchain crypto and much more.

Trend Micro is already working with several service providers on proof-of-concept projects for mobile network security.

Greg Deickman, USA President and COO of telecommunications company Japan Communications Inc. (JCI) said, “The JCI Group understands the importance of the SIM card in enhancing IoT security and innovation at the edge of the network. We are excited to partner with Trend Micro to develop SIM card solutions that will expand Trend Micro's multi-tier portfolio of products and services to secure corporate endpoints and networks. Thanks to the close cooperation between JCI US and Trend Micro, we have already successfully implemented a proof-of-concept in Southlands, a very popular shopping center in Denver, Colorado, to secure visitors' mobile devices. "

Trend Micro Mobile Network Security is expected to be generally available in March 2021.

More on this at Trendmicro.com

 

[starboxid=16]

 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more