We'd love your feedback!
We're happy that you liked the content on this page.
Please, tell us what you liked?
We'd love your feedback!
We're sorry that you didn't like the content on this page.
Please, tell us what you didn't like?
Security and Risk Management

The 5G networks will serve as a foundation for new enterprise use cases and services. As society will depend more and more on these digitalized services, cyber threats against them will increase – making cybersecurity a critical factor for the whole 5G business success.
To manage security in the world of evolving, cloud native dynamic networks and threat landscape our CSP customers must invest in purpose-built security automation, visibility and telco relevant security features. As the 5G networks are built to provide enterprise services, the CSP investments in own network security automation can be extended to a macro network led security service offering to enterprises.
This space has in the past been partly addressed with manual work, CSP homegrown automation, and IT security tooling, but these are not enough. Building a secure 5G network requires a holistic approach through standardization, development, deployment, and operations. For instance, it has been highlighted in the industry best practice guidance for 5G, that it is important to ensure security features provided in 5G are also enforced, deployed, and monitored during the operations.
For more product documentation select “Security Manager”, ”Device Security Enabler” or "Telecom Intrusion Detection System" respectively under the pictures below. For release specific information select the desired release.

Device Security Enabler
Manage security for operators' network infrastructure and non-SIM devices and provides security services.

Telecom Intrusion Detection System
The signaling intrusion threat detection solution for SS7, Diameter, GTP-C, SMS and 5G protocols.