4 ways 5G will change your enterprise threat model

With 5G poised to become widely available across the globe, enterprise organizations need to seriously consider the security implications of deploying the technology. Over the next few years, 5G networks are expected to play a central role in enabling new digital transformation initiatives and in supporting new business use cases that are beyond the reach of current 4G-network technology. Driving much of that change will be 5G’s speeds of up to 1Gbps, its 1-millisecond latencies, and its support for up to about 100 times more connected devices per unit area compared to 4G.

Spotlight

Ziften

Ziften delivers all-the-time visibility and control for any asset, anywhere – client devices, servers, and cloud VMs – whether on-network or remote; connected or not. Our unified systems management and security platform empowers IT operations and security teams to quickly repair user impacting endpoint issues, reduce their overall risk posture, speed security threat response, and increase operations productivity.

OTHER ARTICLES
Unified Communications, Network Security

Why Security Vulnerability Assessments Are Necessary?

Article | July 10, 2023

Cybercrimes have increasingly become a matter of concern for companies worldwide. Over the past few years, the rise of big-ticket ransomware attacks and exposure of perilous software supply chain infections has awakened organizations to various digital dangers. So, the big question is, how to combat the security threats that are on meteoric growth? The best solution is to adopt a security vulnerability assessment. What is Security Vulnerability Assessment? A vulnerability assessment involves a systematic review of security hazards, which helps identify IT infrastructure’s weaknesses, risks, and vulnerabilities. When it comes to mitigating vulnerabilities and resolving issues, the collective imperative is to analyze the problem areas before getting them fixed. A security assessment is critically important to combat the complexities and with an effective vulnerability assessment program, organizations use the tools required to comprehend the probable security weaknesses and enable the protection of systems and data from intruders and unauthorized breaches. For most organizations, ensuring the safety of devices, networks, applications, and digital assets are part of a broader vulnerability management strategy. It includes an extensive assessment, in-depth processes, and mitigation methods to explore the entire threat spectrum. Typically, it is conducted regularly. Vulnerability assessment offers a firm assurance in the security of data, especially when some alterations have been implemented or a new service has been added, or, for that matter, and installation of new equipment has taken place. Each assessment provides a perspective about the risk in its periphery and suggests solutions to control the risk factors and the evolving threats. Why Security Vulnerability Assessment Is Necessary? The perpetual threat of cybercrime has necessitated the demand for vulnerability assessments significantly. They make organizations realize their security defects and contribute towards mitigating them. Hackers are forever ready to make phishing attacks. As per reports, hackers are at work every 39 seconds. Thus, it is extremely important to be vigilant or complacent to activate hackers’ and cybercriminals’ machinations. Over the period, cybercrimes are fluctuating and thus need ongoing attention. The ideal solution is to undertake consistent vulnerability assessments to safeguard confidential data, systems, and networks. Furthermore, it helps organizations understand the risk and enables smart decision-making. To ensure security, companies ought to conduct both external and internal scans of their networks. According to Gartner (paywall), “Large organizations with thousands of employees, tens of thousands of servers and many operating systems receive hundreds of requests per year to patch thousands of vulnerabilities that cannot be remediated in less than 15 days.” One of the best reasons security vulnerability assessments are important is because it confirms an enterprise’s management processes and whether it has covered every critical patch through outlined existing remediation. Why Do Companies Need Vulnerability Assessment? A vulnerability assessment provides companies insightful details on all types of security discrepancies in their environment. It paves ways to evaluate the risks associated with the flaws. This helps organizations have a better knowledge of their security scare, overall weaknesses, and assets. Moreover, the first thing that strikes us on hearing about a cyber-attack is the security of data. With the right and adequate implementation of security assessments, the safety and security of important data could be easily protected. A security assessment would be helpful to reduce irrelevant expenses and make space and increase the IT budget to invest in other key aspects. Undoubtedly, data breach causes substantial loss to an organization, which leads to legal hassles and financial hazards. In fact, most of the time companies fail to recover the loss. Thus, it doesn’t harm to place solid policies and methods to strengthen the entire security position of the organization and this can only be possible with a strategic security vulnerability assessment. In a nutshell, this would keep the companies aware and, in all likelihood, keep the cyber-criminals at bay. A CASE STUDY ANALYSIS To cite an example, let’s take how Zensar conducted a three-pronged vulnerability assessment with port scan and penetration scanning. It determined the security of its offerings to meet customer requests for Brainshark, a leading provider of on-demand presentation solutions, helping customers deliver business interaction across 600+ ranking companies in the market. While Brainshark knew their systems were secure and could also establish it through their documentation, they still undertook a third-party security vulnerability assessment. Zensar’s vulnerability assessment procedures were based on the industry’s best practices that included tests for SQL injection, cookie manipulation, access control weakness, session state, and cross-site scripting. The focus of the test was to identify the host and application security concerns. Upon completing the tests and assessments, Brainshark expressed satisfaction and was confident enough in their ability and solution. They knew their security posture was highly protected and secure. Types of Vulnerability Assessments: Vulnerability assessments unearth a variety of system and network vulnerabilities. This indicates the reliability of the assessment process, which is implemented with different tools, scanners, and methods that helps discover the vulnerabilities, risks, and threats. Network-based assessment scanning: It is used to determine the presumptive network security attacks. This kind of scanning can also detect the vulnerable systems on wired as well as wireless networks. Host-based scans: It is easy to locate the vulnerabilities in servers or other network hosts with host-based scanning. This type of scanning provides visibility into the configuration settings and legacy systems. Database scans: Database scans ascertain the weak points in a database to preclude malefic attacks. Application Scans: It examines websites to identify and recognize software vulnerabilities and inaccurate configurations in network or web applications. Summing Up Organizations need to be watchful every minute and ensure the security posture is rigorous, which is only possible with security vulnerability assessments. Based on this criterion, understanding company risks gets simplified in turn preventing intrusions and threats. FREQUENTLY ASKED QUESTIONS What Are the Advantages of Security Vulnerability Assessment? There are several advantages attached to security vulnerability assessments. To put it precisely, it can help identify the vulnerabilities before cybercriminals do and determine the level of risk. Undoubtedly, opting for vulnerability assessment would save a lot of time and money and mitigate the risk and prevent the irrelevant expenditure that follows after the cyber-attacks. What Are the Disadvantages of Security Vulnerability Assessment? While vulnerability assessments are highly advisable, it has its share of drawbacks which cannot be ignored. One of the primary limitations of vulnerability assessment is that it does not hint at every vulnerability that exists. Moreover, it sometimes signals false positives too. { "@context": "https://schema.org", "@type": "FAQPage", "mainEntity": [{ "@type": "Question", "name": "What Are the Advantages of Security Vulnerability Assessment?", "acceptedAnswer": { "@type": "Answer", "text": "There are several advantages attached to security vulnerability assessments. To put it precisely, it can help identify the vulnerabilities before cybercriminals do and determine the level of risk. Undoubtedly, opting for vulnerability assessment would save a lot of time and money and mitigate the risk and prevent the irrelevant expenditure that follows after the cyber-attacks." } },{ "@type": "Question", "name": "What Are the Disadvantages of Security Vulnerability Assessment?", "acceptedAnswer": { "@type": "Answer", "text": "While vulnerability assessments are highly advisable, it has its share of drawbacks which cannot be ignored. One of the primary limitations of vulnerability assessment is that it does not hint at every vulnerability that exists. Moreover, it sometimes signals false positives too." } }] }

Read More
Enterprise Mobility, Mobile Infrastructure

Britain's got open RAN talent, hopes clueless govt.

Article | June 16, 2023

Opportunity knocks for open RAN hopefuls in the UK. They have been invited by the government to enter a competition offering cash prizes from a pot of £30 million ($41.3 million) for the best-performing contestants. Think of it as a Britain's Got Talent for open RAN, probably untelevized and without Simon Cowell as a judge. It is the UK's latest attempt to help cultivate 5G alternatives to big kit vendors Ericsson and Nokia, which are set to be the country's dominant 5G infrastructure providers once operators have expunged all traces of China's Huawei – something the government has ordered them to do by 2028.

Read More
Network Management, Network Security

Protection Vs. Privacy: Challenges of Mobile Device Management

Article | July 17, 2023

Digital liberation has opened up several avenues for businesses. The current scenario is a bright example of how a remote or hybrid work model seamlessly became a norm, establishing digital workspaces, including laptops and PCs. But this has also led companies to deal with a lot of challenges in managing their enterprise mobility. Whether it is the security or Bring Your Own Device (BYOD) to the user experience or migration, Mobile Device Management (MDM) plays a significant role in digital transformation. PROTECTION VS. PRIVACY: THE PROBLEM WITH (MDM) – INTRODUCTION Mobile device management pertains to software solutions and reliable practices that enable companies to easily manage and obtain wide-ranging mobile devices in compliance with corporate guidelines. In addition, the MDM functionality addresses the security of devices and data, management of devices, and configurations. Essentially, MDM as security is an element of an enterprise mobility management solution that integrates a clustered set of tools to secure and manage mobile apps, BYOD devices, content data and access, configurations, risk management, software updates, and application management. MDM allows a single-interface control over all connecting devices, enabling each device registered for corporate use through the MDM software to be easily monitored, managed, and controlled as per organizational policies. “It’s clear that our network is better protected. We have solved our BYOD issues and can rely on great support via e-mail, phone, or Skype.” - Raymond Bernaert, IT Administrator at ROC Kop van Noord, the Netherlands However, when it comes to an understanding, this technology is of utmost importance to consider the key challenges that companies face regarding protection vs. privacy of mobile device management. Key Challenges MDM solutions are built to improve visibility and secure better control into an end user’s mobile device activity. However, unrestrained tracking of the device’s activities poses a huge threat to the end user’s privacy. For instance, the mobile device management solution may track real-time location and browsing detail. The information exposes employees’ data and usage habits beyond the employer’s device management and security needs. Moreover, as the mobile device market expands, employees choose devices from various brands and platforms, which companies extend support and manage; nevertheless, unanticipated security issues with a specific platform and software version could emerge at any point. Thus, executing the entire process without compromising the end-user convenience. Now, let’s check out some of the most common mobile device management challenges. Security Using numerous devices and endpoints could potentially increase the risk of hacking. This is because, for hackers, it would be a lot easier to exploit the endpoints. And, no wonder mobile device security is one of the fastest-growing concepts in the cybersecurity landscape today. Incorporating mobile devices under the umbrella of mobile device management would be helpful to bridge the vulnerable gaps and prove to firmly manage the entire digital fleet, including mobile phones and PCs. In addition, this will increase up-time significantly and containerize the personal data from corporate data. The Privacy Issue Though MDM solution helps organizations obviate data breaches, they also open up doubt and questions regarding employee privacy. This is because various MDM tools allow employers to monitor the entire device’s activities, including personal phone calls and web activity, at any point. Subsequently, this empowers the IT team to command control in corporate security, whereby they perform many such remote actions, which harm the employees’ privacy. Organizations over the years have used mobile device management solutions with the intent to put BYOD in place. When an enterprise enables BYOD, employees use their devices to access data to help achieve the tasks. With the intent to secure the endpoints, companies choose MDM as their key solution and take control over the entire mobile device, but with that comes the potential for abuse. So, naturally, there is an unwillingness among employees to get MDM installed on their devices. Network Access Control (NAC) The sudden surge in digital workspace culture has also brought in additional complications with varied mobile devices. It is crucial to ensure the team has access to all the apps and corporate data they need. However, it is also important to note that there should be a check on direct access to the data center. One of the core elements for enterprise mobility is network access control (NAC). NAC scrutinizes devices wanting to access your network and it carefully enables and disables native device capabilities distinctly. With designated devices getting connected to the network as per resource, role, and location, it is relatively easy for NAC to ascertain their access level based upon the pre-configured concepts. User Experience It is essential to consider the end-user experience while managing mobility as it often becomes a big challenge. Therefore, a successful mobile device management structure lies mainly in creating a satisfying user experience. A company that uses various devices and has extensive BYOD users may find VMware Workspace ONE or MobileIron effective. However, if the enterprise is all Apple iPhones, the ideal enterprise mobility management would be Jamf Pro, an Apple-only EMM. A single sign would be a perfect method to get into the virtual desktop to ensure efficiency for the remote workers. Moreover, it won’t ask you to sign into different applications separately. Sturdy enterprise mobile device management is an absolute necessity to have a hassle-free experience. Let’s cite the example of this case study, where ‘The Department of Homeland Security (DHS) Science and Technology Directorate’ (S&T) initiated the Next Generation First Responder (NGFR) Apex program to assist tomorrow’s first responder in becoming protected, connected and aware. DHS S&T held a series of NGFR Integration Demonstrations to incrementally test and assess interoperable technologies presently at the development stage. These demonstrations have changed from tabletop integration to field exercises with partner public safety agencies incorporating increasingly complex technology. The NGFR- Harris County OpEx included 23 varied DHS and industry-provided technologies involving six Internet of Things (IoT) sensors, five situational awareness applications and platforms and live-stream video feeds. Additionally, Opex technologies also integrated body-worn cameras and real-time data aggregation and access across numerous agencies. In a nutshell, this case study identifies and explains the mobile device management (MDM) solutions that provided an application-level cybersecurity evaluation and remote device management. The Opex addresses how nationwide public safety agencies could utilize MDM to enhance the operational deployment of new devices and applications. Final Words There are surely both pros and cons involved in mobile device management. Over the years, the BYOD program has turned out to become a norm in corporate culture. In addition, the use of personal devices has significantly surged due to the gradual increase in remote and hybrid work models. Thus, many believe that the MDM solution is naturally aligned with BYOD. However, the fact is, a perfectly planned BYOD policy is the only way to ensure clarity. Having no policy in place will expose a firm to the so-called ‘Shadow IT’ as users will circumvent the IT infrastructure working from their mobile devices. Though the breach of privacy is likely, the policy can be tailored based on the company’s needs. The IT security is adequately maintained and protected and strikes a balance between protections vs. privacy in mobile device management. Frequently Asked Questions What can mobile device management do? Mobile device management keeps business data safe and protected and secures control over confidential information. MDM also exercises its power to lock and remove all data. This is the capability that sustains the device’s security. What are different mobile management tools? With the introduction of Bring Your Own Device (BYOD), several enterprise mobility management tools have also been inducted into MDM. To name a few, some of the prominent MDM tools are Miradore, Citrix Endpoint Management, and SOTI Mobicontrol. { "@context": "https://schema.org", "@type": "FAQPage", "mainEntity": [{ "@type": "Question", "name": "What can mobile device management do?", "acceptedAnswer": { "@type": "Answer", "text": "Mobile device management keeps business data safe and protected and secures control over confidential information. MDM also exercises its power to lock and remove all data. This is the capability that sustains the device’s security." } },{ "@type": "Question", "name": "What are different mobile management tools?", "acceptedAnswer": { "@type": "Answer", "text": "With the introduction of Bring Your Own Device (BYOD), several enterprise mobility management tools have also been inducted into MDM. To name a few, some of the prominent MDM tools are Miradore, Citrix Endpoint Management, and SOTI Mobicontrol." } }] }

Read More

5 Technology Trends That Will Advance Networking

Article | February 12, 2021

With the emergence of new technologies, the networking field is transforming rapidly. The epicenter of networking has shifted to clouds from datacenters. Similarly, the focus of networking has also moved towards mobile devices. In the upcoming years, tech trends will hugely impact the way a business operates and bring the rise of Industry 4.0. Top Networking Tech Trends 1. 5G and WI-FI 6 Undoubtedly, the deployment of next-generation wireless networking will be around the corner. In the arena of mobile devices, 5G is set to rewrite the new technological possibilities. It will uncover the true power of augmented reality and IoT. On the other hand, the next journey of the WI-FI Standard - WI-FI 6 or 802.11ax will become the step for a non-stop innovative world. It will add density, flexibility, scalability, and efficiency for increasing the internet speed of multiple connected devices. That will in return improve the working capabilities of businesses. 2. SD-WAN As the name suggested, SD-WAN is the software-defined approach for managing WANs. It can lower operating costs while amplifying the usage of resources in multiple deployments. It increases the security level for applications and enables admin to use bandwidth efficiently. It will become the standard format for wide area networks and will help in connecting public cloud resources and branch offices. 3. Secure Access Service Edge (SASE) SASE is a new networking technology that converges functions of different security and network solutions into one global cloud service. It is an architectural alteration of networking and security that supports IT to offer prompt, holistic, and versatile service to the digital business. It amplifies the security postures, improves access performance, and diminishes operational complexity. It helps organizations to develop new products faster and respond to business needs or changes. 4. IoT/Edge Networking In comparison to traditional cloud computing, edge computing is the idea to bring data and computers much closer to the end-users. It reduces the need for long-distance communication among client and server, and lessen the cost of bandwidth. It will remain to achieve drift in companies while they decentralize their networks. 5. Automation in Networking Network automation is the process that automates security and network to maximize the functionality and efficiency of the network. It will help IT companies to deploy applications faster. It is set to take the digital transformation to the next step by automation of network and security operations. It reduces the risk of downtime and failure of the network while making the management faster, simpler, and easier. Connecting to Future Networking Based on the trends that will reshape the networking world, we are going to see a significant change in the tech landscape. 2021 will be transformative for every person around the world. Several long-held concepts and infrastructure will be replaced by new ones making the network a vital asset to the business. Besides, the organizations are ready to take advantage of them in a way that was never imagined before. For any question or concern, have an IT consultation from the experienced.

Read More

Spotlight

Ziften

Ziften delivers all-the-time visibility and control for any asset, anywhere – client devices, servers, and cloud VMs – whether on-network or remote; connected or not. Our unified systems management and security platform empowers IT operations and security teams to quickly repair user impacting endpoint issues, reduce their overall risk posture, speed security threat response, and increase operations productivity.

Related News

Enterprise Mobility,Mobile OS

MATRIXX Software’s Digital Commerce Platform Available in Microsoft’s Azure Marketplace

MATRIXX | January 27, 2023

5G monetization solutions leader, MATRIXX software, yesterday announced that the MATRIXX Digital Commerce Platform (DCP) is now available on the Microsoft Azure Marketplace, an online store providing software and services to be used with the Azure cloud computing platform. MATRIXX DCP, a cloud native monetization platform gives Communications Services Providers (CSPs) a wide range of monetization options, making it simpler to take advantage of 5G revenue prospects. By installing MATRIXX DCP on Azure Kubernetes Service (AKS), CSPs may take full advantage of the reliable Azure cloud platform's benefits for the vital goal of monetizing new and cutting-edge services. With a no-code, cloud-native, real-time platform, MATRIXX DCP, a 3GPP-compliant converged charging solution, enables telcos to monetize at web scale. With MATRIXX DCP, operators can scale swiftly in the 5G era and beyond, create differentiated digital consumer experiences, and drive innovation. Marc Price, CTO at MATRIXX Software, said, “Multi-cloud deployments are increasingly important for operators around the world, and are defining the next era of telecommunications.” He further added, “MATRIXX empowers our customers to have access to advanced monetization capabilities, wherever they choose to deploy. Microsoft is a trusted cloud ecosystem partner for CSPs, and with MATRIXX DCP in the Microsoft Azure Marketplace, telcos can easily procure and deploy monetization capabilities for emerging services.” About MATRIXX Software Matrix Software provides converged charging and commerce solutions. It’s cloud-native Digital Commerce Platform offers mission-critical, network-grade software that opens new prospects for network monetization. MATRIXX gives service providers the agility they need to quickly build, deploy, and monetize new products and services because to its no-code configuration features. Many of the world’s top IoT players, network infrastructure providers, and communications firms run on the MATRIXX platform. Utilizing business innovation and on-demand customer experience through MATRIXX enables businesses to compete better, produce new revenue, and pursue growth possibilities across markets and verticals.

Read More

Wan Technologies,Wireless,5G

AMD and Viettel Collaborate on 5G Mobile Network Expansion

AMD | December 05, 2022

AMD and Viettel High Tech (Member of Viettel Group) today announced the successful completion of a 5G mobile network field trial deployment conducted by Viettel and powered by AMD Xilinx Zynq™ UltraScale+™ MPSoC devices. As the largest telecom operator in Vietnam serving more than 130 million mobile customers, Viettel High Tech has a rich history of using AMD radio technology with prior 4G deployments and is now accelerating new networks via new 5G remote radio heads. Designed to meet the growing capacity and performance requirements of mobile users globally, the Viettel 5G mobile network is expected to be completed by the end of 2022. AMD is the exclusive radio unit silicon supplier for Viettel’s indigenous 5G radio development. After the successful completion of the first field trial, Zynq MPSoCs are now set to be extended to an additional 300 Macro 8T8R base stations and 900 5G 8T8R Macro radios. The Zynq UltraScale+ MPSoC was also chosen by Viettel for its first-generation 64T64R Massive MIMO radio which is currently being optimized for field trials. Viettel is developing the next generation of radios to also include Zynq UltraScale+ RFSoC devices, to provide industry-leading integration and higher performance. “Viettel is committed to advancing mobile technology leadership by working closely with AMD to incorporate its adaptable SoC technology into our new generation of 5G networks. Going from VHT's history of making 4G BTS, this decision to scale for the growing demands of 5G was based on evaluating various factors including flexibility, simplification, design stability and the experience of engineers.” Nguyen Vu Ha, general director of Viettel High Tech “5G provides new opportunities to offer higher levels of performance, power efficiency and new services along with increased reliability required to meet the growing data demands of cellular networks,” said Yousef Khalilollahi, corporate vice president of APAC sales, Adaptive and Embedded Computing Group, AMD. “We are proud of our close collaboration with Viettel and remain focused on enabling its mobile network to deliver the optimal end-user experience as well as the flexibility to evolve and grow as Viettel’s user base and required bandwidth continue to increase globally.” About Viettel High Tech As the R&D arm of Viettel Group, Viettel High Tech develops full 5G network architecture including 5 layers: Service/App layers, Core layers, Transportation layers, Access layers, Devices; makes Vietnam one of the few countries that can produce 5G equipment. Collaboration with the leading partners is VHT’s strategy. With the desire to experiment, exchange knowledge, further develop diverse fields, VHT is moving to accompany the international high-tech community. About AMD For more than 50 years AMD has driven innovation in high-performance computing, graphics and visualization technologies. Billions of people, leading Fortune 500 businesses and cutting-edge scientific research institutions around the world rely on AMD technology daily to improve how they live, work and play. AMD employees are focused on building leadership high-performance and adaptive products that push the boundaries of what is possible.

Read More

Network Infrastructure,Network Management,Wan Technologies

Verizon continues to deploy 5G Ultra Wideband faster than expected

Verizon | December 06, 2022

Verizon now covers more than 175 million people with their ultra fast, ultra reliable 5G Ultra Wideband service, and will offer nationwide 5G Ultra Wideband in Q1 2023. The ongoing C-Band rollout is a full 13 months ahead of the original schedule, and continues to accelerate. Less than 21 months after announcing the results of the FCC’s C-band auction and after securing early access to an additional 30 markets this year, Verizon accelerated its build plan and surpassed its goal of reaching 175 million people covered by the end of 2022, a month ahead of schedule. “Our customers don’t stand still and neither does our network. Today, more than one out of every two Americans now have access to 5G Ultra Wideband. We know our customers rely on our service every day and we work for them – continuously enhancing, expanding and improving our wireless network. And as proud as I am to have crossed this milestone, I am equally proud of the way we are building our network – with the most advanced technologies, industry leading security, a robust fiber underpinning and a robust and varied spectrum portfolio. We are building this right. We are building this as a platform for innovation for years to come.” Hans Vestberg, Chairman and CEO of Verizon. Verizon’s 5G Ultra Wideband brings power and performance comparable to a wired broadband internet connection to customers’ pockets. With download speeds up to one gigabit per second and the capacity to support data-heavy actions, 5G Ultra Wideband frees people up to do things on the go that many could only do before when connected to their home internet service. This includes everything from downloading huge documents and seamlessly streaming movies in HD audio and video, to playing console quality games and conducting video chats, video conferencing and FaceTime calls with clear sound and video. Verizon customers have much more to look forward to Verizon will continue to build out its 5G Ultra Wideband network using C-band spectrum providing service for millions more customers in the coming months, but Verizon’s engineers are not losing sight of the other critical components that will give customers the most reliable, secure, and robust experience possible on the Verizon network. In addition to providing greater coverage, especially in rural and suburban areas, Verizon will also enhance capacity by activating 100 MHz of C-Band spectrum in many markets, a significant step up from the 60 MHz of spectrum available when deployment first began. Once all of its licensed spectrum is made available, Verizon will have up to 200 MHz of C-Band spectrum deployed in many markets, which will provide exceptional speed and capacity. Complementing the wide coverage of Verizon’s premier C-Band spectrum, Verizon will continue deploying 5G on mmWave spectrum which provides for exponential capacity in areas with significantly dense populations such as venues, stadiums, arenas, airports, major metro areas, office complexes and more. mmWave will also continue to be used for private network deployments when enterprise customers need the fastest, most robust 5G service available for their enterprise applications from wireless manufacturing solutions to connected vehicles to remote healthcare and more. In addition to making 5G more accessible to more people, Verizon will continue focusing on building out the advanced technologies that provide increased security, reliability and customized experiences for customers. Those advancements include fully deploying the 5G core with Verizon’s proprietary cloud platform built specifically for telco workloads, advancing the fiber network to handle exponential increases in data traffic, continuing massive virtualization of the network to add programmability and flexibility into the network, using artificial intelligence to drive reliability and performance, continuing to develop edge computing capabilities to drive down latency, and continuing to advance antenna configurations to drive speed and efficiency.

Read More

Enterprise Mobility,Mobile OS

MATRIXX Software’s Digital Commerce Platform Available in Microsoft’s Azure Marketplace

MATRIXX | January 27, 2023

5G monetization solutions leader, MATRIXX software, yesterday announced that the MATRIXX Digital Commerce Platform (DCP) is now available on the Microsoft Azure Marketplace, an online store providing software and services to be used with the Azure cloud computing platform. MATRIXX DCP, a cloud native monetization platform gives Communications Services Providers (CSPs) a wide range of monetization options, making it simpler to take advantage of 5G revenue prospects. By installing MATRIXX DCP on Azure Kubernetes Service (AKS), CSPs may take full advantage of the reliable Azure cloud platform's benefits for the vital goal of monetizing new and cutting-edge services. With a no-code, cloud-native, real-time platform, MATRIXX DCP, a 3GPP-compliant converged charging solution, enables telcos to monetize at web scale. With MATRIXX DCP, operators can scale swiftly in the 5G era and beyond, create differentiated digital consumer experiences, and drive innovation. Marc Price, CTO at MATRIXX Software, said, “Multi-cloud deployments are increasingly important for operators around the world, and are defining the next era of telecommunications.” He further added, “MATRIXX empowers our customers to have access to advanced monetization capabilities, wherever they choose to deploy. Microsoft is a trusted cloud ecosystem partner for CSPs, and with MATRIXX DCP in the Microsoft Azure Marketplace, telcos can easily procure and deploy monetization capabilities for emerging services.” About MATRIXX Software Matrix Software provides converged charging and commerce solutions. It’s cloud-native Digital Commerce Platform offers mission-critical, network-grade software that opens new prospects for network monetization. MATRIXX gives service providers the agility they need to quickly build, deploy, and monetize new products and services because to its no-code configuration features. Many of the world’s top IoT players, network infrastructure providers, and communications firms run on the MATRIXX platform. Utilizing business innovation and on-demand customer experience through MATRIXX enables businesses to compete better, produce new revenue, and pursue growth possibilities across markets and verticals.

Read More

Wan Technologies,Wireless,5G

AMD and Viettel Collaborate on 5G Mobile Network Expansion

AMD | December 05, 2022

AMD and Viettel High Tech (Member of Viettel Group) today announced the successful completion of a 5G mobile network field trial deployment conducted by Viettel and powered by AMD Xilinx Zynq™ UltraScale+™ MPSoC devices. As the largest telecom operator in Vietnam serving more than 130 million mobile customers, Viettel High Tech has a rich history of using AMD radio technology with prior 4G deployments and is now accelerating new networks via new 5G remote radio heads. Designed to meet the growing capacity and performance requirements of mobile users globally, the Viettel 5G mobile network is expected to be completed by the end of 2022. AMD is the exclusive radio unit silicon supplier for Viettel’s indigenous 5G radio development. After the successful completion of the first field trial, Zynq MPSoCs are now set to be extended to an additional 300 Macro 8T8R base stations and 900 5G 8T8R Macro radios. The Zynq UltraScale+ MPSoC was also chosen by Viettel for its first-generation 64T64R Massive MIMO radio which is currently being optimized for field trials. Viettel is developing the next generation of radios to also include Zynq UltraScale+ RFSoC devices, to provide industry-leading integration and higher performance. “Viettel is committed to advancing mobile technology leadership by working closely with AMD to incorporate its adaptable SoC technology into our new generation of 5G networks. Going from VHT's history of making 4G BTS, this decision to scale for the growing demands of 5G was based on evaluating various factors including flexibility, simplification, design stability and the experience of engineers.” Nguyen Vu Ha, general director of Viettel High Tech “5G provides new opportunities to offer higher levels of performance, power efficiency and new services along with increased reliability required to meet the growing data demands of cellular networks,” said Yousef Khalilollahi, corporate vice president of APAC sales, Adaptive and Embedded Computing Group, AMD. “We are proud of our close collaboration with Viettel and remain focused on enabling its mobile network to deliver the optimal end-user experience as well as the flexibility to evolve and grow as Viettel’s user base and required bandwidth continue to increase globally.” About Viettel High Tech As the R&D arm of Viettel Group, Viettel High Tech develops full 5G network architecture including 5 layers: Service/App layers, Core layers, Transportation layers, Access layers, Devices; makes Vietnam one of the few countries that can produce 5G equipment. Collaboration with the leading partners is VHT’s strategy. With the desire to experiment, exchange knowledge, further develop diverse fields, VHT is moving to accompany the international high-tech community. About AMD For more than 50 years AMD has driven innovation in high-performance computing, graphics and visualization technologies. Billions of people, leading Fortune 500 businesses and cutting-edge scientific research institutions around the world rely on AMD technology daily to improve how they live, work and play. AMD employees are focused on building leadership high-performance and adaptive products that push the boundaries of what is possible.

Read More

Network Infrastructure,Network Management,Wan Technologies

Verizon continues to deploy 5G Ultra Wideband faster than expected

Verizon | December 06, 2022

Verizon now covers more than 175 million people with their ultra fast, ultra reliable 5G Ultra Wideband service, and will offer nationwide 5G Ultra Wideband in Q1 2023. The ongoing C-Band rollout is a full 13 months ahead of the original schedule, and continues to accelerate. Less than 21 months after announcing the results of the FCC’s C-band auction and after securing early access to an additional 30 markets this year, Verizon accelerated its build plan and surpassed its goal of reaching 175 million people covered by the end of 2022, a month ahead of schedule. “Our customers don’t stand still and neither does our network. Today, more than one out of every two Americans now have access to 5G Ultra Wideband. We know our customers rely on our service every day and we work for them – continuously enhancing, expanding and improving our wireless network. And as proud as I am to have crossed this milestone, I am equally proud of the way we are building our network – with the most advanced technologies, industry leading security, a robust fiber underpinning and a robust and varied spectrum portfolio. We are building this right. We are building this as a platform for innovation for years to come.” Hans Vestberg, Chairman and CEO of Verizon. Verizon’s 5G Ultra Wideband brings power and performance comparable to a wired broadband internet connection to customers’ pockets. With download speeds up to one gigabit per second and the capacity to support data-heavy actions, 5G Ultra Wideband frees people up to do things on the go that many could only do before when connected to their home internet service. This includes everything from downloading huge documents and seamlessly streaming movies in HD audio and video, to playing console quality games and conducting video chats, video conferencing and FaceTime calls with clear sound and video. Verizon customers have much more to look forward to Verizon will continue to build out its 5G Ultra Wideband network using C-band spectrum providing service for millions more customers in the coming months, but Verizon’s engineers are not losing sight of the other critical components that will give customers the most reliable, secure, and robust experience possible on the Verizon network. In addition to providing greater coverage, especially in rural and suburban areas, Verizon will also enhance capacity by activating 100 MHz of C-Band spectrum in many markets, a significant step up from the 60 MHz of spectrum available when deployment first began. Once all of its licensed spectrum is made available, Verizon will have up to 200 MHz of C-Band spectrum deployed in many markets, which will provide exceptional speed and capacity. Complementing the wide coverage of Verizon’s premier C-Band spectrum, Verizon will continue deploying 5G on mmWave spectrum which provides for exponential capacity in areas with significantly dense populations such as venues, stadiums, arenas, airports, major metro areas, office complexes and more. mmWave will also continue to be used for private network deployments when enterprise customers need the fastest, most robust 5G service available for their enterprise applications from wireless manufacturing solutions to connected vehicles to remote healthcare and more. In addition to making 5G more accessible to more people, Verizon will continue focusing on building out the advanced technologies that provide increased security, reliability and customized experiences for customers. Those advancements include fully deploying the 5G core with Verizon’s proprietary cloud platform built specifically for telco workloads, advancing the fiber network to handle exponential increases in data traffic, continuing massive virtualization of the network to add programmability and flexibility into the network, using artificial intelligence to drive reliability and performance, continuing to develop edge computing capabilities to drive down latency, and continuing to advance antenna configurations to drive speed and efficiency.

Read More

Events