classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Fortinet secures the path to 5G
February 2019, Cyber Security, IT infrastructure

Fortinet recently announced extensive capabilities for securing the path to 5G with its solutions for mobile core networks and cloud infrastructures, including its virtual SPU technology and advanced security and high-performance systems.

With the promise for faster connection speeds, massive connectivity scale, and new revenue opportunities, 5G will have a profound impact on mobility and digital transformation.

“With 5G, mobile infrastructure’s end-to-end innovation will continue to transform into a platform and catalyst for value creation and service innovation. Throughout this transformation, Fortinet’s security architecture and solutions provide advanced security for multiple LTE, LTE-A, and 5G use cases to help secure mobile infrastructures, from radio access network (RAN) to the telco cloud, and offers customers carrier-grade performance and capacity with cloud-grade scalability, visibility, and control,” says John Maddison, executive vice president, products and solutions, Fortinet.

The advent of 5G will extend a digital connection to almost every facet of our lives. In many of the somewhat futuristic-sounding new use cases, such as autonomous vehicles, AR/VR immersive experiences, smart cities, ultralow latency, bandwidth, and speed, delivery has been the missing puzzle piece. For years now, the mobile interconnection of all these things seemed inevitable, yet the massive density of connections, all with adequate speed, latency and related services, had so far remained unachievable in all but limited proof-of-concept testing.

With 5G and the impending orders-of-magnitude advances in bandwidth, connection and use case possibilities, there is opportunity for end-to-end innovation as the mobile infrastructure is transformed into a platform and a catalyst for value creation and service innovation. More than ever, mobile network providers will become secure business enablers.

For example, service providers will have new revenue generating opportunities in IoT, such as manufacturing automation, industrial telemetry, emergency response systems, robotic surgery, 4K UHD video streaming, and more. However, these innovations will also bring a corresponding increase in the potential havoc wrought by denial of service, advanced threats and other forms of cyberattack on the core network infrastructure itself. Security is an imperative to protect and operate evolving 4G and new 5G mobile networks. These new service use cases need capabilities beyond a stateful firewall, with capacity and reliability to meet service level agreement (SLA) goals for uptime and quality of experience.

The Fortinet security platform offers 5G service providers:

Advanced protection for mobile core network and telco cloud: Powered by Fortinet’s Virtual SPU Technology, FortiGate Virtual Network Functions (VNFs) deliver significant increases in application security performance through innovative security processing optimisations and the latest packet processing acceleration technologies. The VNFs also have a small footprint, boot within seconds, and require less storage, enabling service providers to protect their virtual networks and cloud platform cost effectively. Further, the 5G-ready FortiGate 7000 Next-Generation Firewall Series with SPU acceleration provides carrier security features and functions with industry-leading SSL inspection and application security performance for total inline protection.

Agility with security: Fortinet offers broad ecosystem integrations with leading NFV and SDN vendors for virtual infrastructure. To ensure end-to-end security with innovative 5G services such as network slicing and multi-access edge computing (MEC), VNFs must be delivered dynamically, instantiated quickly and available wherever needed on the network. For efficient and agile deployment and utilization of these security resources, Fortinet delivers integrations with NFV platform providers like Lenovo, NFV orchestration (MANO) systems from Amdocs, Ericsson, Ciena, UBiqube, NoviFlow and SDN controllers like VMware NSX, Nokia Nuage, and Cisco ACI, and NoviFlow.

Deep visibility and control for IoT services on edge clouds: Massive scale IoT devices are generally based on lightweight operating systems, which offer minimal security features, therefore they are vulnerable to hijacking and botnet attacks. To remove business risks, the data from these endpoints and the devices themselves require complete protection. Further, service providers offering IoT services via a cloud platform need to ensure multi-tenant isolation, VM and/or container security, and web application protection. Fortinet FortiGate NGFW VNF and FortiWeb WAF VNF protect the edge cloud platform. FortiSIEM provides complete visibility through correlated security analytics and complete visibility to track IoT devices while FortiGate has the ability to learn and profile all connected devices, and apply granular control on different classes of IoT.


  Share via Twitter   Share via LinkedIn      

Further reading:

  • 2019 Internet of Things (IoT) Barometer
    March 2019, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
    A majority of businesses that use IoT technology agree that it has either disrupted their industry or will do so in the next five years.
  • Halt, who goes there?
    March 2019, Technews Publishing, Wolfpack Information Risk, This Week's Editor's Pick, Cyber Security
    As long as organisations treat their physical and cyber domains as separate, there is little hope of securing either one.
  • IoT is convergence in action
    March 2019, Gijima Electronic and Security Systems (GESS), NEC XON, Technews Publishing, Axiz, G4S South Africa, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    The Internet of Things gains more than enough attention these days, but the IoT demonstrates the reality of the convergence between the physical and cyber worlds, and physical security is part of it.
  • Stop hacking of access control ­systems
    March 2019, This Week's Editor's Pick, Access Control & Identity Management, Cyber Security
    Think someone hacking your access control system not a big deal? Scott Lindley suggests that you think again.
  • New cybersecurity pavilion for Securex 2019
    March 2019, Securex South Africa , This Week's Editor's Pick, Cyber Security, News, Conferences & Events, Training & Education
    Securex South Africa 2019 has announced that 4Sight Technologies, a subsidiary of an international holdings company focusing on investing in Industry 4.0 companies, has signed on as the official sponsor ...
  • Security by design
    March 2019, Johnson Controls, Cyber Security, Integrated Solutions
    The security of the platforms on which physical security products are built will increasingly impact purchase decisions and market positions.
  • A logical solution for cyber solutions
    March 2019, Suprema, Cyber Security, Access Control & Identity Management, Products
    BioMini Slim 2 is a thin, FBI PIV and FBI Mobile ID certified FAP20 optical scanner with a large platen for easy capturing of fingerprints.
  • Managed IT security solution
    March 2019, Cyber Security, IT infrastructure, Products
    The LanDynamix fully managed IT security stack ensures that all the main attack vectors typically used by hackers to breach a network are protected and proactively monitored.
  • Top five security trends to look out for in 2019
    March 2019, Genetec, CCTV, Surveillance & Remote Monitoring, Cyber Security
    From the continued focus on cybersecurity to the acquisition of global players, Genetec highlights the top five security trends to look forward to in 2019.
  • Cyber Risk 101
    March 2019, Cyber Security
    What every business needs to know about protecting themselves in case of a cyber-attack.
  • Securing IoT, step by step
    March 2019, IT infrastructure, Cyber Security
    Kaspersky Lab joins forces with industry leaders to deliver actionable technical guidance for multiple IoT stakeholders.
  • ESET launches a new blog aimed at insecure Android apps
    March 2019, Cyber Security
    Insecure apps are much harder to identify and protect, while being no less of a threat.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.