SDxCentral
Join Log In
SD-WAN 5G Edge 1 IoT SDN NFV Containers Cloud Security AI Data Center Storage APM/NPM Open Source

Log In to SDxCentral

Log in with your email? Forgot your password?
  • Newsletters
  • eBriefs
  • Podcasts
  • Webinars
  • Videos
  • Directory
  • White Papers
  • Resources
  • Use Cases
  • Support

Join SDxCentral and get information tailored to your particular interests everyday.

Join
Sponsored:
Dell EMC Citrix Riverbed

Webinar: Network Security in the 5G and IoT Environment

Sponsored By: Radware

An Opportunistic Challenge

There has been an increasing demand for 24×7 high-speed internet access globally. Currently, 42.1 billion IoT devices exist. By 2020, this number is expected to be 50.1 billion. 2020 is the beginning of a mass rollout of 5G networks. By 2025, leaders of the 5G market will be Asia (primarily China & Japan), Europe, and the United States. Can mobile service providers create a secure environment that protects customers’ data and devices in time for the launch of 5G?

An Atmosphere of Mobile Network Attacks

One hacker is now an army of attackers through botnet deployments. As the number of IoT devices grow, the number of attacks will also grow. Statistically, 56% of internet traffic is comprised of good (27%) and bad (29%) bots. IoT is growing more prevalent in everyday life, it’s creating:

  • Smart Cities: Traffic control, Power plants, Community services, Water supply
  • Smart Businesses: Office equipment, Manufacturing equipment, Telemetry
  • Smart Buildings: Heating, Air conditioning, Security, Utilities
  • Smart Homes: Kitchen appliances, Heating, Air conditioning, Security, Entertainment devices
  • Smart Cars: Self-driving, System diagnostics, Monitoring
  • Off-the-shelf products typically have low security standards because of a lack of password encryption and the use of obvious & document credentials for CLI access.

The Role of Security Automation and AI

5G adds significant complexities to mobile networks, requiring significant security measures as network elements are distributed at the edge and virtualized. The network becomes one big sensor where endpoints are used as detection spots to send messages back to a centralized control plane, which in turn compiles all inputs to best apply mitigation policies. The use of AI will be heavily dependent on good data and is best sourced through crowd-sourcing and large, global communities of enterprises and networks.

The Time is Now

The deployment of 5G technologies is expected to transform how mobile service providers deliver services to consumers and businesses.

Faster speeds. More capacity. New threats. Learn how Radware can help Service Providers:

  • Secure their network infrastructures.
  • Create new revenue-generating services by securing IoT devices.
  • Support the transformation of their security tactics as they transform to cloud-based mobiles.

Who should watch this webinar?
Primary Roles: CISO, CSO, CTO, CIO, Head of IT Infrastructure, Head of Security Architecture and Design, Security Domain Architect and Security Engineer

About SDxCentral

  • Newsletters
  • About Us
  • Contact Us
  • Work With Us
  • Editorial Team
  • Careers
  • Legal
  • Support

Engage With us

This material may not be copied, reproduced, or modified in whole or in part for any purpose except with express written permission from an authorized representative of SDxCentral, LLC. In addition to such written permission to copy, reproduce, or modify this document in whole or part, an acknowledgement of the authors of the document and all applicable portions of the copyright notice must be clearly referenced. All Rights Reserved.

© 2012-2019 SDxCentral, LLC, All Rights Reserved. SDNCentral™, the SDNCentral logo, SDxCentral™, SDxCentral logo, SDxNews™, SDxTech™, SDx™, the SDx logo, and DemoFriday™ are trademarks of SDxCentral, LLC in the U.S. and other countries.

  • Terms of Service
  • Privacy