Heavy Reading: 5G edge cloud infrastructure and security

July 20, 2021

See what Heavy Reading analysts discovered when they conducted research on digital service provider best practices and key considerations for building secure, fast 5G and edge computing networks.

Spotlight

Corelight, Inc

Corelight is the most powerful network visibility solution for information security professionals. We provide real-time data that organizations use to understand, detect, and prevent cyber attacks.

OTHER WHITEPAPERS
news image

WEAVING THE 5G EDGE – THE ENABLING POWER OF PROGRAMMABLE FABRICS

whitePaper | June 22, 2021

5G brings edge computing to the forefront, and the edge has become much more complex and critical. For those contemplating new 5G rollouts or making non-standalone (NSA) to standalone (SA) transitions, understanding how to take advantage of this unique solution architecture could reduce costs and improve customer outcomes. This research brief will examine the novel use of programmable fabrics in edge architectures and how this hybrid approach can minimize the deployment footprint, reduce power consumption and cooling needs, and improve network performance.

Read More
news image

Leading the 5G Advanced technology evolution on the path to 6G

whitePaper | March 22, 2022

Demonstrates efficient and robust industry 4.0 connectivity with intelligent CoMP using the O-RAN ALLIANCE framework for disaggregated network components and RAN Intelligent Controller (RIC), and 5G sidelin. Creating an innovation platform for end-to-end research on new verticals starting with XR and expanding to private networks, Industrial IoT, drones, and mission critical applications.

Read More
news image

Zero Trust Maturity Model

whitePaper | June 14, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More
news image

Open RAN MoUprogress updateon maturity,security andenergy efficiency

whitePaper | January 25, 2023

As the momentum behind Open RAN continues to grow, it is natural that relevant experts and decision makers want to understand its progress and how the Open RAN industry has risen to the challenges, in particular relating to maturity, security and energy efficiency. Over the course of 2022, Open RAN MoU Operators encouraged an open dialogue about Open RAN and have taken steps to understand concerns and address valid questions.

Read More
news image

SK Telecom 6G White Paper

whitePaper | August 9, 2023

6G requires setting achievable goals and continuous communication with the market and consumers.  Efforts of all participants in the new 6G ecosystem are required, such as expanding of 6G usage scenarios, selecting candidate spectrums, vitalizing open interfaces, e.g., Open RAN, and simple architecture options, etc.

Read More
news image

New networks and new services demand new telecoms software

whitePaper | June 21, 2022

The telecoms industry is going through its most substantial shift since the introduction of IP networks in the 1990s. Function­specific network infrastructure is being replaced by software­based networks and the high bandwidth, low latency capabilities of 5G wireless and fixed fibre are enabling a vastly increased portfolio of services for communications service providers (CSPs).

Read More

Spotlight

Corelight, Inc

Corelight is the most powerful network visibility solution for information security professionals. We provide real-time data that organizations use to understand, detect, and prevent cyber attacks.

Events