Future network security
Intelligent society and industry will transform telecom networks into the primary platform for business innovation. As the number of connected devices and applications continue to increase, so too will their economic value. Intelligent networks will carry an abundance of industry and consumer data, changing the nature of business competition. Moving forward, security will be key in realizing new services and use cases for the connected society and industry.
The emergence of a more intelligent network with billions of connected devices and a multitude of use cases will present new attack vectors and threats not seen before. Keeping networks secure requires
- analysis of new scenarios
- updated and enhanced security mechanisms, standards and best-practices
- secure deployments
- continuous monitoring and updates

Mobile networks are becoming part of critical infrastructure. Consequently, additional regulatory requirements come into play, which are addressed through audits and security assurance. New security and safety aspects will follow the introduction of various use cases for connected business and industry, and generate input for future security aspects in research, development, and operations.
As the world is increasingly digitalized, attention to privacy becomes more relevant than ever. We have identified privacy as a core property, contributing to building trustworthiness of telecom networks. This will continue to underpin our standardization and regulatory efforts, product design and implementation considerations, as well as our research activities. By staying ahead of the market, we ensure our cellular wireless infrastructure remains the most trustworthy choice for both mission and business critical use. As we move toward intelligent society and industry, we will integrate our security solutions and processes into connected business.
Trustworthiness
Trustworthiness of the wireless infrastructure is built through use of globally agreed standards, strong security solutions, and well-defined processes. This is complemented by threat intelligence, actively and continuously updating on current security threats.
Security at scale
Security at scale includes safeguarding huge volumes of devices and data, for a large variety of use cases. To accommodate this, we research adaptable, scalable, and automated security solutions for future networks and connected devices.
Policy-driven automation
Policy-driven automation that aligns with industry frameworks, together with rule-based analytics (for known threats) and AI-based analytics (for anomalies and unknown threats) will enable holistic and cost-efficient security for future use cases.
Highlights
Research papers
Security research collaborations
Collaboration with world class academia and research institutions is an important part of our ways of working. Explore a selection of our on-going collaborations.
A secure and trustworthy network
When we connect society with logistics, transport, industries, healthcare and many other applications, we really rely on the network to always be there and to work as expected.
If you want people to trust the infrastructure, then you have to have a secure and trustworthy network. Watch the videos below to learn more.