{"id":13884,"date":"2021-04-08T07:30:00","date_gmt":"2021-04-08T07:30:00","guid":{"rendered":"https:\/\/eodishasamachar.com\/en\/2021\/04\/08\/fujitsu-and-trend-micro-demonstrate-solution-to-secure-private-5g\/"},"modified":"2021-04-08T07:30:00","modified_gmt":"2021-04-08T07:30:00","slug":"fujitsu-and-trend-micro-demonstrate-solution-to-secure-private-5g","status":"publish","type":"post","link":"https:\/\/eodishasamachar.com\/en\/2021\/04\/08\/fujitsu-and-trend-micro-demonstrate-solution-to-secure-private-5g\/","title":{"rendered":"Fujitsu and Trend Micro Demonstrate Solution to Secure Private 5G"},"content":{"rendered":"<p> \n<\/p>\n<div id=\"\">\n                            <!--<a class=\"format-txt\" href=\"{baseURL}\/View\/{release.id}?_download=1\">View this article in .txt format<\/a>--><\/p>\n<p class=\"subheadline\">\n                               Streamlined security for IoT devices and networks helps accelerate manufacturing digital transformation                            <\/p>\n<p>HONG KONG SAR &#8211;\u00a0<a href=\"https:\/\/www.media-outreach.com\/\">Media OutReach<\/a>\u00a0&#8211; 8 April 2021 -&#13;<br \/>\n<a href=\"https:\/\/www.fujitsu.com\/jp\/\">Fujitsu Limited<\/a> and <a href=\"http:\/\/www.trendmicro.com.hk\/\">Trend Micro Incorporated<\/a> (TYO: 4704; TSE: 4704),&#13;<br \/>\na global cybersecurity leader, have collaborated to focus on the security of private 5G networks. The companies will demonstrate the&#13;<br \/>\neffectiveness of Trend Micro&#8217;s security for private 5G using a simulated smart&#13;<br \/>\nfactory environment and an operational Fujitsu environment prior to the&#13;<br \/>\nproduct&#8217;s public availability.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Private&#13;<br \/>\n5G network technology will be the catalyst for true smart factories globally. Connectivity&#13;<br \/>\nand automation will link factory devices and business applications, improving&#13;<br \/>\nproduction capabilities and overall factory performance. However, the expanded&#13;<br \/>\nIT infrastructure within operational technology (OT) environments can lead to&#13;<br \/>\nexposed risk for cyberattacks. There is an urgent need to implement cybersecurity&#13;<br \/>\nmeasures to secure private 5G networks to protect against potential attacks.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Fujitsu and Trend Micro have incorporated Trend&#13;<br \/>\nMicro&#8217;s 5G security solution into a private 5G system that simulates an actual&#13;<br \/>\nsmart factory environment equipped with high-definition monitoring cameras and&#13;<br \/>\nautomatic guided vehicles (AGV) at the FUJITSU Collaboration Lab in Kawasaki,&#13;<br \/>\nJapan. This environment was used to visualize and centrally manage the status&#13;<br \/>\nand security of systems, as well as correlate threat detection and prevention&#13;<br \/>\ndata from the devices and network.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>The security solution, Trend Micro Mobile Network&#13;<br \/>\nSecurity, leverages embedded endpoint security within the IoT device&#8217;s SIM card&#13;<br \/>\nand network security running on private 5G system. Benefits of the product&#13;<br \/>\ninclude:<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<ul>\n<li>Detect and protect against threats at the private 5G&#13;<br \/>\nnetwork<\/li>\n<li>Authenticate devices trying to connect to the 5G&#13;<br \/>\nnetwork<\/li>\n<li>Block unauthorized communication in real time<\/li>\n<\/ul>\n<p>This demonstration shows how the Trend Micro solution&#13;<br \/>\nprotects smart factories from internal threats, such as unauthorized or&#13;<br \/>\nmalware-infected devices, as well&#13;<br \/>\nas external threats attempting to enter the factory through the 5G network.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>&#8220;Fujitsu aims to realize a society in which people,&#13;<br \/>\ngoods, and services are connected in real time through 5G technology and to&#13;<br \/>\nsolve problems facing the world.&#8221; said&#13;<br \/>\nTomonori Goto, Corporate Executive Officer, Senior Vice President and Head of&#13;<br \/>\n5G Vertical Service Office at Fujitsu. &#8220;To&#13;<br \/>\nthis end, we believe that this security solution, created together with Trend Micro, represents a key&#13;<br \/>\ntechnology for applying private 5G to mission-critical areas. Fujitsu will&#13;<br \/>\ncontinue to cooperate with Trend Micro to create new value through the power of&#13;<br \/>\nco-creation.&#8221;<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Fujitsu and Trend Micro will conduct a field trial until&#13;<br \/>\nSeptember 2021 at Fujitsu&#8217;s Oyama Plant. Based on the results of this trial, the&#13;<br \/>\npartners will consider commercializing a security solution for private 5G.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>&#8220;We&#8217;re delighted to be joining forces with Fujitsu to&#13;<br \/>\ntackle the immense challenge of cybersecurity for private 5G,&#8221; said Akihiko&#13;<br \/>\nOmikawa, executive vice president for Trend Micro. &#8220;Together, we are making&#13;<br \/>\nsmart manufacturing more secure to ensure production isn&#8217;t stopped due to a&#13;<br \/>\ncyberattack.&#8221;<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>For more information on Trend&#13;<br \/>\nMicro Mobile Network Security solutions please visit: <\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/en_hk\/business\/products\/iot\/mobile-network-security.html\">https:\/\/www.trendmicro.com\/tmmns<\/a><\/p>\n<\/p><\/div>\n\n<br \/><a href=\"https:\/\/www.media-outreach.com\/news\/2021-04-08\/72437\/fujitsu-and-trend-micro-demonstrate-solution-to-secure-private-5g\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Streamlined security for IoT devices and networks helps accelerate manufacturing digital transformation HONG KONG SAR &#8211;\u00a0Media OutReach\u00a0&#8211; 8 April 2021 -&#13; Fujitsu Limited and Trend Micro Incorporated (TYO: 4704; TSE: 4704),&#13; a global cybersecurity leader, have collaborated to focus on the security of private 5G networks. The companies will demonstrate the&#13; effectiveness of Trend Micro&#8217;s &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/13884"}],"collection":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/comments?post=13884"}],"version-history":[{"count":0,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/13884\/revisions"}],"wp:attachment":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media?parent=13884"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/categories?post=13884"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/tags?post=13884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}