Page 76 - Cyber Defense eMagazine December 2022 Edition
P. 76

How 5G Networks Are Secured and Enabled By SASE

            By Kelly Ahuja, Versa Networks CEO




            As  more  organizations  consider  their  own  5G  MEC  (Multi-Access  Edge  Computing)  roll  outs  and
            environments,  there  are  important  deployment  and  security  considerations.  While  still  a  fairly  new
            technology, adoption rates of 5G have increased significantly, currently at three times that of 4G. The
            buzz  has  been  growing  around  5G  for some  time,  as  the new networking standard  promises  faster
            speeds, greater bandwidth, and optimized mobility.

            The  technology  has  quickly  gone  from  concept  to  reality  as  the  demand  for  an  enhanced  digital
            experience, along with the increase in personal and IoT devices, as well as workload transition to cloud,
            have driven the need for 5G.

            With  5G,  it  is  extremely  important  for  organizations  to  consider  security  solutions  that  can  enforce
            consistent security posture across public cloud, hybrid cloud, and on-premises environments, or any
            combination of these environments. 5G introduces a whole host of security threats and vulnerabilities,
            such as kernel bypass, DDOS attacks on 5G service interfaces, and exploitation of software or hardware
            vulnerabilities leading to zero-day exploits.




            Cyber Defense eMagazine – December 2022 Edition                                                                                                                                                                                                         76
            Copyright © 2022, Cyber Defense Magazine. All rights reserved worldwide.
   71   72   73   74   75   76   77   78   79   80   81