Five Inconvenient Facts about the Migration to 5G Wireless

ROB FRIEDEN | March 10, 2019

article image
An unprecedented disinformation campaign purposefully distorts what consumers and governments understand about the upcoming fifth generation of wireless broadband technology. A variety of company executives and their sponsored advocates want us to believe that the United States already has lost the race to 5G global market supremacy and that it can regain it only with the assistance of a compliant government and a gullible public. Stakeholders have identified many new calamities, such as greater vulnerability to foreign government-sponsored espionage carried out by equipment manufacturers, as grounds for supporting the merger of two of only four national wireless carriers and preventing U.S. telecommunications companies from buying equipment manufactured by specific, blacklisted Chinese companies

Spotlight

Awake Security

Awake Security uniquely combines machine intelligence and institutional knowledge to identify and protect an organization’s highest-risk entities. Awake’s EntityIQ™ technology extracts hundreds of security-relevant signals from full packet capture data to automatically correlate, profile and track internal and external entities such as devices, users and domains. QueryIQ™, Awake’s behavioral query language, then enables introspection of these entities to discover evolving attacker tactics, techniques and procedures—without training periods or model updates like other ML-solutions. Finally, DetectIQ™, a large library of detection queries constantly updated and expanded by Awake, exposes previously invisible threats including non-malware activity.

OTHER ARTICLES

RAN Management and Orchestration Is Central to Operators Gaining Control Over Their Own Networks

Article | July 6, 2021

The promise of Open vRAN is to give back to mobile operators some form of control over their networks. The “open” refers to the opening of RAN interfaces. It is critical because it gives operators the possibility to buy the radio unit and the baseband unit from different vendors, rather than having to buy an integrated system, and therefore helps them diversify their suppliers and reduce their dependence on traditional vendors. The “v” refers to virtual. Virtualization is about disaggregating hardware and software and enabling the use of commercial off-the-shelf servers, instead of the usual purpose-built hardware, to run network functions in order to increase flexibility and reduce costs. Across Asia-Pacific, the announcements and activities from operators including Airtel, Axiata, NTT Docomo, Rakuten Mobile, Smartfren and Telkomsel indicate a growing appetite for open and virtualized radio access networks. In countries like India, Indonesia, Malaysia and Thailand, open RAN can for example help to address the challenges of remote connectivity and to deploy a network in places where it has been traditionally difficult to achieve a satisfactory return on investment.

Read More

Enea Launches Software Kit for Migration of SD-WAN Solutions to uCPE

Article | February 20, 2020

Enea recently launched a software kit for quicker and easier evaluation of secure second-generation SD-WAN solutions on universal customer premise equipment (uCPE). The kit includes flexiWAN, an open source and modular SD-WAN Virtual Network Functions (VNF), and pfSense, an open source firewall VNF, together with automation features for easy onboarding and testing. It is configured for deployment on Enea NFV Access, a virtualization platform with small footprint and high performance for any white box uCPE.

Read More

Can 5G make you more vulnerable to cyberattacks?

Article | March 15, 2020

Many enterprises and sectors are unaware of the 5G security vulnerabilities that exist today. Choice IoT says it’s critical for businesses to have a plan for discovering and overcoming them at the outset of a 5G/IoT platform rollout to avoid future cybersecurity disasters. There is a big difference between the promise of 5G low latency, higher bandwidth, and speed for businesses versus the security of 5G. While many are excited about Gartner’s prediction of $4.2 billion being invested in global 5G wireless network infrastructure in 2020, few discuss the business costs of its unheralded security holes.

Read More

Operator personal cloud: Engage subscribers with a content hub

Article | June 21, 2021

While many 5G use cases have centered on enterprise opportunities that leverage the speed, responsiveness and capacity of this advanced wireless technology, telecom operators must be careful to not brush off the desires of individual subscribers. They, too, are looking to make the most of their 5G data plans and investments in 5G-enabled mobile devices. Unfortunately for many subscribers, the technology has not yet lived up to its promise. A recent consumer study from Ericsson shows that 70% of smartphone users are disappointed in the availability of new 5G-powered services and apps. The same study also found that subscribers are willing to pay 20-30% more for a premium 5G plan bundled with digital service use cases. Taken together, these two data points indicate that the time has come for operators to develop a 5G strategy focused on increasing value-added services for the subscriber. Operators who want to remain competitive as well as recoup their infrastructure investments must think beyond simply providing enhanced connectivity. Today's consumers are savvy, use multiple connected devices and are short on time. And they expect a lot more from their digital service providers.

Read More

Spotlight

Awake Security

Awake Security uniquely combines machine intelligence and institutional knowledge to identify and protect an organization’s highest-risk entities. Awake’s EntityIQ™ technology extracts hundreds of security-relevant signals from full packet capture data to automatically correlate, profile and track internal and external entities such as devices, users and domains. QueryIQ™, Awake’s behavioral query language, then enables introspection of these entities to discover evolving attacker tactics, techniques and procedures—without training periods or model updates like other ML-solutions. Finally, DetectIQ™, a large library of detection queries constantly updated and expanded by Awake, exposes previously invisible threats including non-malware activity.

Events