Edge Computing, 5G & IoT: Risks and Opportunities for Service Providers

16
99230

Service providers are undergoing a technological revolution in the name of agility. They’re transforming computing infrastructures to gain service dexterity, provide new and improved applications to digitally native consumers in an app-driven world and deliver interactive content delivery services to new generations of customers who demand them.

The overarching goal? Leverage automation and a new generation of software- and service-defined architectures to improve the digital experience for consumers and businesses alike, all the while providing a secure experience.

To accomplish this, service providers are undergoing several business and architectural transformations, including moving to the “edge.” Service providers are transitioning away from core network designs by deploying new network infrastructure at the edge that will host key application resources, thereby reducing latency.

5G Networks, Edge Computing, IoT and Cybersecurity

The move to edge computing environments, the deployment of 5G networks, the mass adoption of IoT devices and the need to keep all of this secure have had far-ranging impacts for service providers.

[You may also like: 5G, Security, IoT, and ROI: Some Assembly and Automation Required]

For edge computing to thrive, the underlying architecture will be distributed in the cloud and will no longer be dependent on dedicated appliances. The corresponding implementation and deployment of carriers’ networks will evolve to expand capacity, reduce latency and lower costs/power requirements.

To reinforce this open environment, organizations driving network agility will have to virtualize their network functions, resulting in less control over the physical elements of the networks in exchange for the cost benefits of flexible resource allocation. Services are also no longer restricted to service providers’ networks or content and will exist in external network domains, increasing the geographical coverage for subscribers. This means that services can rely on physically closer, virtualized network resources for more efficient delivery of content to the connected device.

As part of the transition to edge computing, service providers will implement network slicing in which network providers “slice” portions of network resources to offer specialized services for specific application types, all the while remaining in the same physical infrastructure.

[You may also like: The Necessary Burden of 5G Security]

5G networks piggyback with network slicing because that will bring higher bandwidth and lower latency for today’s digitally native consumers. In addition to serving as the foundation for the aforementioned digital transformation, 5G networks will also deliver the integral infrastructure required for increased flexibility. Driven by global demand for high-speed internet access, the business landscape will only increase in competitiveness as service providers jockey to deliver improved network capabilities.

New Cybersecurity Risks

But these transformations come with new cybersecurity risks. As network architectures evolve to support third party applications, increased consumption of multimedia content and the interaction of data and services via IoT devices, they will create security vulnerabilities if cybersecurity isn’t prioritized and integrated into the network from the get-go.

Current carrier networks are not capable of handling the security requirements of multi-cloud, widely distributed networks. The same capabilities that allow edge computing platforms to deliver lightning-fast connectivity also allow hackers to execute larger, more sophisticated cyberattacks. SOC engineers at service providers already face difficulty in predicting and preparing for today’s attacks, becoming easy prey in the multi-cloud universe.

When combined with IoT devices, unprepared service providers can be overwhelmed by the next generation of security threats. For example, 5G networks shift the current network paradigm by redefining what “fast-paced” will be. The digital and virtual transformation utilizes more cloud applications dependent on various APIs, multiplying the complexity of interconnected devices that rely on more responsiveness, such as virtual healthcare solutions. This becomes a key issue for 5G network managers because of the increased number of potential vulnerabilities if they are not properly protected.

Take network slicing as another example. Network slicing offers traffic segmentation that is designed to isolate disruptions, but it also complicates network security because it requires more multitenancy and policy management to remain contextual.

And New Opportunities

But these risks come with new opportunities. Securing both 5G networks and edge computing architectures should not be viewed as an operational cost but rather as a new business opportunity/competitive differentiator that is integrated throughout the overall architecture.

[You may also like: Securing the Customer Experience for 5G and IoT]

Just as personal data has become a commodity, service providers will require a security architecture that keeps data secure while improving the customer experience via a mix of availability and security functions. New outbound protection requirements have emerged to identify anomalous behavior to help identify misuse of resources and provide a meaningful remediation model to large scale IoT deployments.

Read “Sharpening the Edge: 5G Networks, Edge Computing, IoT and Their Implications on Cybersecurity for Service Providers” to learn more.

Download Now

16 COMMENTS

  1. I am very sure that the people who came up with this idea knows exactly the dengers from this 5G people are going to die because of the luck of oxygen and that’s why they locked us inside the houses to plant them in our areas but God him self will punish you for destroying innocent human lives

    • Hi Blyn. I couldn’t agree with you more! They have been planning this plandemic for years! The Elite 1% are evil, sadistic money grabbing control freaks (Bill Gates, Dr Fauci, Rothschilds etc!) and are going to weaken everyone’s immune system by locking us inside & 100’s of 1,000’s of people will die & they don’t care! Then they will kill or maim a lot more with the forced deadly untested vaccine! All for money & control! If you haven’t already I urge you to watch Robert F Kennedy’s (nephew of JFK) interview with Brian Rose on London real digital freedom platform & Dr Buttar, Dr Mikovits & David Icke (I agree with a lot he says but not everything) I have had my eyes opened by watching these interviews!
      The evil ones will have to meet their maker one day!
      Love & prayers to you Blyn🙏
      Linda.x

  2. I do not understand. The 5G people want as much as customers they can get to earn more money and power
    On the other hand , according to the pessimists among us , they install devices to kill the population. So who will remain alive to buy their products??

  3. Are you people listening to your selves. You sound like a bunch paranoid conspiracy advocates. Please sound sane.

  4. What sort of a world do we live in today. How can these people believe that there are a handful of human beings trying to control the world and ultimately corral the people left and kill them off with vaccines and 5g.
    I am now in my eighties and in the pursuit of my job as an electrical engineer I have lived and worked in various parts of the world.
    In my lifetime I must say I have never met a busy flat earther.

  5. So mobile phones/cell phones will use this 5G technology as well, why?…my understanding is 5G is Military grade. Been in use by the military, especially the US for decades so why do we,the populace need it?. .2G, 3G n 4G is enough don’t you think?…
    The way I see it, they eased it in without telling the World its new technology because it’s already in use.2,3,n 4Gs are more than adequate enough for our daily needs of sorts. I still use a Samsung Galaxy S2 on 2G n sometimes it switches up to 3G, does all the functions a 4G does…me thinks there’s a hidden agenda somewhere.
    Am thinking the Beervirus Plandemic was a red herring and its timing.Look at how the focus has shifted from a Worldwide Plandemic to Worldwide protest, just like that…now what, they still gona go ahead with this vaccine plan?…notice the 1.5metres at all the protest march, why didn’t all these people fall over n die?…just saying

  6. These people are determined to achieve their goals, we are just noise makers to them. But believe me this herald global protest against 1% avaricious bunch.

  7. The Internet is an International Communication System that evolved from the earliest ways to communicate, from speech, to writing, to radio, to television, transmitted in person, by Morse code, by mail, by telephone wires, by wireless transmissions/by email, over short distances leading up to worldwide coverage. Anyone can use it providing they buy a transmitter and a receiver. How can the system be policed and controlled by Governments? It can’t, unless it confiscates the user’s equipment. What has happened instead is Governments have bought up the wave lengths on which messages are transmitted, in order to eavesdrop on anyone they wish to Investigate. Names and addresses do not identify the person online, so they had to build a database with all Public Records of births deaths and marriages linked to all email addresses, linked to all National Insurance numbers. Once the data was matched, everyone could be identified by their National Insurance Number and email address. If you are not online, then you cannot access any Department to check Public Records, you can order a copy and pay for it, you can buy a TV but you cannot use it without paying the Government, there is little anyone can do without having to pay the Government. When the Government has to pay out, all Claims have to be submitted online because that is where your account is held. Claims are assessed by computer programmers with complete disregard for the Laws of Entitlement, because none were put on the database. The Nation is governed by computer programmers working for the Government to maximise profits and minimise losses. The Government has not got a clue as to what the programmers have done to tear down the National Insurance schemes because the Premiums are still paid, pending fear of Prosecution. I am 86 and I have just had my Age Pension suspended due to incorrect data matching dating back 25yrs.

  8. Soon enuff we will all be controlled by government and the service suppliers like F.Book/ Google etc and within 50 years there will be no room for individuality. Everything we have !& do will be controlled, allow it to happen OR be sent to Siberia.

  9. Please do some actual research on 5G before you comment on it. Proper research not London Reel. There is no 5G in Iran too, just so you know. But no, people are to lazy to do their own research and fact check. So much more Fun to talk about Unicorns as if they actually exist

LEAVE A REPLY

Please enter your comment!
Please enter your name here