Use Case

5G

Get ready for the transformative M2M (machine to machine) revolution provided by 5G.

5G is a massive technology leap for mobile and wireless technologies.

5G deployment will translate in high broadband speed up to 5 Gbps and lower latency compared to current 4G networks. The most important benefits will not only reside in better performance as some new management features will strongly impact and broaden current use cases. For instance, network slicing result in new M2M capabilities with always-on and hyper connectivity for people and Internet of Things: class of traffic for group of connected objects will be managed by slice with specific bandwidth control, latency and traffic prioritization and other network management policies.

In our daily life, the perspectives of transformation are huge: we start to contemplate exciting changes when we think about smart home, smart cities, e-health, transportation or agricultureā€¦ End point devices, connected objects orchestrated by cloud and edge systems thanks to better connectivity will definitely transform our day-to-day experience.

Built-in cybersecurity?

However, faster, always-on and pervasive connectivity mean new cyber risks. New IoT usage and new applications enabled by 5G may be exposed to malicious attacks: new threats and attack surfaces grow at an exponential rate. It is highly difficult to maintain walled gardens in an open world where connectivity is the new mantra, and perimetric security becomes notably insufficient. Enterprise, institutions and organizations must rely on software with real built-in security: it is now an imperative pre-requisite before deployment. Ā Moabi measures and improves the security posture of this new wave of software and hardware supporting 5G.

Prepare for OSS/BSS security readiness

Simultaneously, telecom operators or digital service providers should integrate, deploy and operate new OSS and BSS platforms to deliver on the 5G promise. Looking at current plans of the major telecom operators, these new network management solutions and business systems have been started to be evaluated and pilots have been deployed. As these systems are the new engines of 5G, they should be evaluated thoroughly as well to guarantee the relevant level of cybersecurity. Moabi helps these telecom operators to qualify their solution with tangible and consistent security criteria.

Select network equipment providers with cybersecurity criteria

Software Defined Networking (SDN) and Network Function Virtualization (NFV) have enriched and extended network capabilities in terms of agility, performance and network features. But the use of new software building blocks and the end of proprietary hardware-based systems have raised new cybersecurity challenges to deliver truly secured networks for end users and telecom providers themselves. As telecom networks are vital for countries and their sovereignty, it is of the utmost importance to deeply review the built-in security of these new software-based networks.

Standard network scans fall short to determine the level of security of any components, and they come too late in the deployment project phases. Most of the time software source code analysis is not available. And alarming rates of false positives renders such solutions of little actionable value.

Moabi empowers telecom operators to get a full visibility on the security level of their equipment providers and helps them to qualify their solutions with tangible and consistent security criteria.