5G has arrived, but 4G remains king for business

| November 18, 2019

article image
THIS year, the triumphant arrival of 5G to Belfast certainly had everyone talking. We're one of the first cities in the UK and Ireland to have it – and we're well on track for region-wide roll out throughout 2020. The new ‘fifth generation' networks promise huge download speeds, greater stability and more capacity than ever before, bringing new and exciting benefits for everyone, and particularly business. What's important to remember though is that 5G's arrival isn't being defined by a single new technology or an overnight revolution. It will start to unlock the opportunities for the development of more advanced technologies and applications such as AI and automation. That takes time. So, as you look forward to what 5G will bring, have you ever really explored, utilised and felt all the business benefits of the 4G handset in your hand?

Spotlight

Preempt

Preempt protects organizations by eliminating security threats. Threats are not black or white and the Preempt Platform is the only solution that preempts threats with continuous threat prevention that automatically adapts based on identity, behavior and risk. This ensures that both security threats and risky employee activities are responded to with the right level of security at the right time. The platform easily scales to provide comprehensive identity based protection across organizations of any size.

OTHER ARTICLES

4G vs. 5G: We Explain the Difference and Why You Need to Care

Article | April 20, 2020

Latency – the time it takes for devices to communicate with each other or with the server that’s imparting information – was already pretty low with 4G, but 5G will basically make it disappear. This development is great news for new tech forays into remote real-time gaming and self-driving cars, as the communication needs to be instantaneous for hiccup-free gameplay and to guarantee the safety of passengers. lthough there has been much media coverage regarding 5G’s health-related dangers and conspiracy-driven connection to the coronavirus, many people are still in the dark about what the 5G network can bring to the everyday internet user.

Read More

How to keep 5G data secure with software probes

Article | March 17, 2020

Enhanced security and privacy are cornerstones of 5G Core, but service providers still need to be able to capture quality, actionable data to secure the end-customer experience. Specifically, I’m referring to the data needed to perform troubleshooting, monitoring, customer care and analytics for marketing campaigns. But can this be done in 5G Core using traditional probing methods, without breaching security? The 3GPP standardization for 5G considers enhanced security to be an essential network component. Imagine, for a moment, that we live in a world where it’s common for open heart surgery to be conducted remotely, and I’m sure you’ll agree. The need for a secure, reliable network has resulted in the introduction of a new Service Based Architecture (SBA) that utilizes encrypted interfaces between network functions (NFs). Traffic between network functions is deployed in a cloud native 5G Core Kubernetes node and will not be visible outside the cluster, meaning traditional probing solutions are unsustainable.

Read More

How 4G and 5G networks are vulnerable to Denial-of-Service attacks

Article | March 26, 2020

Mobile operators are racing to upgrade their networks with 5G connectivity while at the same time expanding 4G LTE coverage throughout the world. Though the latest generations of cellular technology offer faster performance and other benefits over their predecessors, they're vulnerable to some of the same security flaws. A report released Thursday by Positive Technologies explains how and why existing 4G and new 5G networks can be hurt by Denial-of-Service (DOS) attacks in particular. For its report "Security Assessment of Diameter Networks 2020," Positive Technologies simulated external attacks against 28 telecom operators in Europe, Asia, Africa, and South America during 2018 and 2019. Specifically, the company looked at 4G and 5G networks using Diameter signaling protocol, a method for coordinating data among different Internet Protocol (IP) network elements.

Read More

Five ways to win at antenna integration

Article | May 7, 2021

Antennas are fundamental to the performance of connected devices, but are often implemented as an afterthought, resulting not only in sub-optimal performance, but also in less-than-ideal form factor. It can also have a negative impact on cost for the device as a whole. It is therefore essential that organisations prioritise antenna design as part of a holistic device design philosophy – bear in mind that it is practically impossible to fix bad antenna design. Early decisions need to be made regarding the relative merits of embedded or external devices and then attention can turn to optimising antenna integration.

Read More

Spotlight

Preempt

Preempt protects organizations by eliminating security threats. Threats are not black or white and the Preempt Platform is the only solution that preempts threats with continuous threat prevention that automatically adapts based on identity, behavior and risk. This ensures that both security threats and risky employee activities are responded to with the right level of security at the right time. The platform easily scales to provide comprehensive identity based protection across organizations of any size.

Events