Skip navigation
Road overlaid with IoT measurements

API security

Secure networks while exposing them

Future network security

Intelligent society and industry will transform telecom networks into the primary platform for business innovation. As the number of connected devices and applications continue to increase, so too will their economic value. Intelligent networks will carry an abundance of industry and consumer data, changing the nature of business competition. Moving forward, security will be key in realizing new services and use cases for the connected society and industry.

The emergence of a more intelligent network with billions of connected devices and a multitude of use cases will present new attack vectors and threats not seen before. Keeping networks secure requires

  • analysis of new scenarios
  • updated and enhanced security mechanisms, standards and best-practices
  • secure deployments
  • continuous monitoring and updates
Power cables

Mobile networks are becoming part of critical infrastructure. Consequently, additional regulatory requirements come into play, which are addressed through audits and security assurance. New security and safety aspects will follow the introduction of various use cases for connected business and industry, and generate input for future security aspects in research, development, and operations.

As the world is increasingly digitalized, attention to privacy becomes more relevant than ever. We have identified privacy as a core property, contributing to building trustworthiness of telecom networks. This will continue to underpin our standardization and regulatory efforts, product design and implementation considerations, as well as our research activities. By staying ahead of the market, we ensure our cellular wireless infrastructure remains the most trustworthy choice for both mission and business critical use. As we move toward intelligent society and industry, we will integrate our security solutions and processes into connected business.

Trustworthiness

Trustworthiness of the wireless infrastructure is built through use of globally agreed standards, strong security solutions, and well-defined processes. This is complemented by threat intelligence, actively and continuously updating on current security threats.

Security at scale

Security at scale includes safeguarding huge volumes of devices and data, for a large variety of use cases. To accommodate this, we research adaptable, scalable, and automated security solutions for future networks and connected devices.

Policy-driven automation

Policy-driven automation that aligns with industry frameworks, together with rule-based analytics (for known threats) and AI-based analytics (for anomalies and unknown threats) will enable holistic and cost-efficient security for future use cases.

Highlights

6G - bridging cyber and physical domains

Evolving from 5G security the security for 6G will use additional measures to respond to an evolving threat landscape and to support new use cases, shifts in technology and society, and regulatory requirements. 

Addressing the memory-safety hardening challenge

The memory-safety hardening challenge must be addressed comprehensively, including more secure hardware. We have explored aspects of the CHERI research architecture to find out if it is a viable technology for future telecommunication systems.

Unpatched vulnerabilities

Modern mobile networks operate in an evolving and complex threat landscape where attackers are in a constant race to exploit newly discovered or unpatched vulnerabilities. Therefore, it is important to quickly identify unpatched vulnerabilities and efficiently countermeasure them even temporarily before official mitigation is made available.

Research papers

We carry out peer-reviewed research, both in-house and in collaboration with research partners from academia and business, on topics related to network security.

Explore a selection of our published research papers here.

Read papers here

Security research collaborations

Collaboration with world class academia and research institutions is an important part of our ways of working. Explore a selection of our on-going collaborations. 

Evolving 5G security with Concordia University

Discover how Ericsson, together with Concordia University, is revolutionizing security compliance verification across the cloud and virtualized environments, placing a connected future within our grasp.

Europe’s largest cybersecurity consortium

Europe’s largest cybersecurity consortium, CONCORDIA, had the mission to establish an EU-integrated cybersecurity ecosystem for digital sovereignty in Europe. 

Learn about six important insights from the consortium that championed security collaboration across the EU and drove forward essential research and innovations needed to create a common cybersecurity EU ecosystem.

A secure and trustworthy network

When we connect society with logistics, transport, industries, healthcare and many other applications, we really rely on the network to always be there and to work as expected.

If you want people to trust the infrastructure, then you have to have a secure and trustworthy network. Watch the videos below to learn more.

Stay updated

Network security in-built by design

The world is changing. So is telecom security. Ericsson is evolving network security to meet the demands of intelligent society and industry – securing all connected things, all the time.

Explore Ericsson’s end-to-end network security