ericsson.com
Your location is listed as Global
Login

How do we detect anomalies on the network?

To detect anomalies in the network requires the modernisation of every aspect of the security DNA through all levels from Product level security to platform and system level security to analytics and operations to take a truly end-to-end view of security.

Ericsson’s evolved network security is the pioneer of a simpler yet more robust era of telecom security. Our market-leading solutions equip service providers with autonomous, end-to-end telecom security – built in to each layer of the network and securing all connected things everywhere, all the time. Our security management solution, powered by advanced predictive analytics and offering increased actionable visibility, ensures that you can stay a step ahead of an increasingly dynamic threat environment. By making it easier for you to assemble, integrate and automate network security at massive scale, we will enable you to connect the enterprise of tomorrow.

Our approach for end-to-end security is built in to our products by design, making bolt-on security a thing of the past. Based on 3GPP standards, our robust portfolio of end-to-end security solutions is guided by our principles of evolved network security and governed by the unique Ericsson Security Reliability Model. This delivers a portfolio which is inherently secure, easy to integrate and ready to withstand evolving threats against the network.

We know that cyber security management is becoming more complicated as networks evolve to Cloud, 5G and IoT. With such big changes comes greater risk of attack. Systems are becoming more vulnerable, with new threats appearing from every angle - from major organizations to individuals.

For service providers, concerns include the risks associated with decentralization, virtualization and critical infrastructure, as well as increases in fraud.  To minimize the impact of these risks, organizations need to shift how they manage security. Moving from a passive, reactive approach to one that is automated, policy-based and predictive. They need to be equipped with solutions that are able to constantly monitor and track outsider threats to IT systems, removing the need for large and costly security operations.

Automated, predictive security management that brings together the products and services our customers need to thrive in the face of tomorrow's security challenges. Our unique process of planning, transformation and operation helps our customers to precisely identity: What is going on in their systems; How important it is; Where they should focus their resources.  We also address and modernize every aspect of the security DNA. This includes identity and access management, key and certificate management, network security automation, logging monitoring and security analytics, hardware assisted virtualization and platform security and data protection management.

This journey keeps continuing and is one of the five technology trends outlined by our CTO.

Related contents

Security

Tomorrow’s connected enterprises will need security for every connected device on top of the network. Read the report to find out how our 5G networks are achieving this today.

3 ways we can boost IoT security

Billions of new devices are coming online by 2023. Read our blog on the 3 pillars of the new and comprehensive security approach needed to make IoT safe for business.

5G security - enabling a trustworthy 5G system

This white paper provides an overview of the five core properties that contribute to the trustworthiness of the 5G system: resilience, communication security, identity management, privacy and security assurance.

Trust technologies for security assurance

 In this blog we look at the 3 powerful trust technologies that facilitate stronger security assurance arguments relating to: AI, Confidential computing, Secure identities.