{ Markettagged:True , MatchedLanguageCode:True }

The importance of Network Security

Network security is an investment for new business opportunities and it can become a differentiator. Operators that provide more secured network services will gain trust in the market and be able to monetize the competitive advantage.

In a survey for the industry impact of 5G, done by Ericsson, 79 percent of the respondents from ten industry sectors considered network security essential for adopting 5G in their organization. Tougher requirements have been put on network security when the telecom industry enters the IoT era. Network security has a high priority on an operator’s agenda due to higher liability risks, responsibilities and damage potential, especially when evolving toward 5G. For the same reason, communication networks are increasingly targeted by hackers seeking gains of various types.

Ericsson Radio Access Network Security

city view

Low cost and high volume IoT devices and the continuous network evolution toward open and virtualized environments increases the number of attack vectors in the network.

At the same time, operators also need to address potential security gaps when traffic passes through interconnected networks.

Our RAN Security solution provides protection through authentication and encryption for the Ericsson Radio System and the broader network infrastructure with a Security Gateway platform.

The solution protects customer traffic and network infrastructure in an environment of increasingly open access and revenue-threatening security attacks.

We make sure that all radio and security solutions are fully integrated, before being introduced to customer networks. 

The end-to-end approach for RAN security consists of 

  • Node security
  • Network-level security
  • O&M security
Read more on Ericsson RAN Security

Detecting false base stations in mobile networks

Experts in Ericsson Research introduce the mechanisms that will significantly improve resistance to false base stations in 5G networks

Ericsson Core IP Network Security

Security threats and attacks to core IP networks are constantly evolving. This is placing more pressure on network operators and enterprises to make sure key network assets, services, and data in transit stay protected.

Ericsson Core IP Network Security

The Evolved IP Network solution has been created with this in mind. Perimeter protection has been designed with network security needs at the heart, using internet gateways or firewalls, traffic domain separation (in the form of VLAN and VPN structure), access control and node hardening recommendations.

The movement from mobile core networks to all-IP has introduced more threats. It is no longer enough to secure networks with basic node protection using node hardening, packet filtering, and traditional firewall protection with DPI (Deep Packet Inspection). We are seeing the number of distributed denial-of-service attacks growing, which can shut down entire services and negatively impact revenues. Service providers and enterprises need to be prepared for new attacks that can target services and applications at higher layers. By introducing network security functions like intrusion detection and prevention, antivirus/malware and content filtering, organizations can protect their systems.

The Evolved IP Network solution

Ericsson Signaling Security

The everyday use of roaming services by mobile users is thanks to a number of interconnecting mobile networks. At every interconnection point, signaling traffic is transferred from one network to another. The signaling is based on SS7 for GSM and WCDMA networks and Diameter for LTE and 5G networks. But, the connection points are prime targets for attack. Location tracking, eavesdropping, credential theft, SMS interception and discovery of the network topology are just some of the risks.

Ericsson offer complete signaling security services, alongside consulting and security assessments such as penetration testing for signaling protocols. The Ericsson Diameter Signaling Controller and IP-STP behaves as an effective firewall for SS7 and diameter signaling to protect against the risks described above.

Security with data at the heart

Ericsson has a unique blockchain-based approach to verifying and protecting data.

Read more

Want to find out more?

For more information on Ericsson Network Security, please get in touch.

Contact us