Page 76 - Cyber Defense eMagazine December 2022 Edition
P. 76
How 5G Networks Are Secured and Enabled By SASE
By Kelly Ahuja, Versa Networks CEO
As more organizations consider their own 5G MEC (Multi-Access Edge Computing) roll outs and
environments, there are important deployment and security considerations. While still a fairly new
technology, adoption rates of 5G have increased significantly, currently at three times that of 4G. The
buzz has been growing around 5G for some time, as the new networking standard promises faster
speeds, greater bandwidth, and optimized mobility.
The technology has quickly gone from concept to reality as the demand for an enhanced digital
experience, along with the increase in personal and IoT devices, as well as workload transition to cloud,
have driven the need for 5G.
With 5G, it is extremely important for organizations to consider security solutions that can enforce
consistent security posture across public cloud, hybrid cloud, and on-premises environments, or any
combination of these environments. 5G introduces a whole host of security threats and vulnerabilities,
such as kernel bypass, DDOS attacks on 5G service interfaces, and exploitation of software or hardware
vulnerabilities leading to zero-day exploits.
Cyber Defense eMagazine – December 2022 Edition 76
Copyright © 2022, Cyber Defense Magazine. All rights reserved worldwide.