{"id":22852,"date":"2022-06-20T07:45:00","date_gmt":"2022-06-20T07:45:00","guid":{"rendered":"https:\/\/eodishasamachar.com\/en\/2022\/06\/20\/enhanced-security-is-driving-private-5g-network-adoption\/"},"modified":"2022-06-20T07:45:00","modified_gmt":"2022-06-20T07:45:00","slug":"enhanced-security-is-driving-private-5g-network-adoption","status":"publish","type":"post","link":"https:\/\/eodishasamachar.com\/en\/2022\/06\/20\/enhanced-security-is-driving-private-5g-network-adoption\/","title":{"rendered":"Enhanced Security is Driving Private 5G Network Adoption"},"content":{"rendered":"<p> \n<\/p>\n<div lang=\"en\">\n<p>        HONG KONG SAR &#8211;<br \/>\n<a href=\"https:\/\/www.media-outreach.com\/\" rel=\"sponsored\">Media OutReach<\/a> &#8211; 20 June 2022 &#8211;<br \/>\n<a href=\"https:\/\/www.trendmicro.com.hk\" rel=\"sponsored\">Trend Micro Incorporated<\/a> (<a href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=3473937-1&amp;h=2623919908&amp;u=https%3A%2F%2Fwww.google.com%2Ffinance%2Fquote%2F4704%3ATYO&amp;a=TYO%3A+4704\" rel=\"sponsored\">TYO: 4704<\/a>;<br \/>\n<a href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=3473937-1&amp;h=1227182771&amp;u=https%3A%2F%2Fwww.trendmicro.com%2Fen_us%2Fabout%2Finvestor-relations.html&amp;a=TSE%3A+4704\" rel=\"sponsored\">TSE: 4704<\/a>), a global cybersecurity leader, today announced a new study* revealing the prospect of improved security and privacy capabilities are the main motivations behind private 5G wireless network projects.<\/p>\n<p><b>To read a full copy of the report,<br \/>\n  <i>Security Expectations in Private 5G Networks: A journey with partners, <\/i>please visit <\/b><a href=\"https:\/\/resources.trendmicro.com\/IoT-5G-Networks-Report.html\" rel=\"sponsored\">here<\/a><b> or <\/b><b>join the webinar with Trend Micro and 451 Research on June 23<\/b><b> <\/b><a href=\"https:\/\/event.on24.com\/wcc\/r\/3795901\/8A68012037841F4B1093F892ABB3D040?partnerref=TrendMicro.\" rel=\"sponsored\">here<\/a><b>.<\/b>\n<\/p>\n<p>&#8220;Private 5G networks are cloudy: two-thirds of respondents told us their deployments will use the technology in some way,&#8221; said Eric Hanselman, chief analyst at 451 Research, a part of S&amp;P Global market intelligence. &#8220;Yet the cloud&#8217;s shared responsibility model means these enterprise customers will need to build their own security capabilities. They said they&#8217;ll need expert security partners to help them on this journey. Organizations have great expectations for 5G security, but the quality of their partnerships will be the real differentiator.&#8221;\n<\/p>\n<p>Across smart factories, smart hospitals, and other locations, a growing range of organizations is looking to private 5G networks for coverage, control, low latency, and enhanced security as one of the enterprise networks.\n<\/p>\n<p>&#8220;We see security risk management as one of the key drivers of the business. There is also a strong desire to focus on ensuring organizations achieve situational awareness across IT, OT, and CT communication technology, such as private 5G,&#8221; said Yohei Ishihara, security evangelist at Trend Micro.\n<\/p>\n<p>However, such environments raise a different set of security issues than those in traditional IT and OT environments. While the biggest concern (31%) for respondents is the exposure of data carried on the private wireless network, they also highlighted top key attack vectors, including:<br \/>\n<\/p>\n<ul>\n<li>\n    OS software vulnerabilities (37%)\n  <\/li>\n<li>\n    Configuration errors (34%)\n  <\/li>\n<li>\n    Networking equipment vulnerability (33%)\n  <\/li>\n<li>\n    Device vulnerabilities on RAN (31%) and CORE (27%) networks\n  <\/li>\n<li>\n    Compromise of connected network (27%)\n  <\/li>\n<\/ul>\n<p>\nAdding further challenges to security projects is the fact that nearly a quarter (23%) of respondents expect full integration of private wireless network security with existing operational security. More than half (55%) also want to make this work via automated connections.<\/p>\n<p>Given the complexity of such projects, it is not surprising that over half (58%) of respondents said they would carry out risk assessments either jointly with partners or outsourcing the task completely, while 33% said they&#8217;d work with a third party.\n<\/p>\n<p>Industry-specific security experience (24%) is the top criteria for organizations looking for IT partners, and 19% of them say they want to work with existing partners.\n<\/p>\n<p><i>*Trend Micro commissioned 451 Research to poll 400 information security decision-makers from 400 US, Germany, UK, and Spain organizations.<\/i>\n<\/p>\n<\/div>\n\n<br \/><a href=\"https:\/\/www.media-outreach.com\/news\/hong-kong\/2022\/06\/20\/144006\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>HONG KONG SAR &#8211; Media OutReach &#8211; 20 June 2022 &#8211; Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced a new study* revealing the prospect of improved security and privacy capabilities are the main motivations behind private 5G wireless network projects. To read a full copy of the report, Security &hellip;<\/p>\n","protected":false},"author":1,"featured_media":22557,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/22852"}],"collection":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/comments?post=22852"}],"version-history":[{"count":0,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/22852\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media\/22557"}],"wp:attachment":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media?parent=22852"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/categories?post=22852"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/tags?post=22852"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}