& cplSiteName &

Securing 5G Networks: The Commercial & Technical Realities

Jim Hodges

One of the themes that permeated Mobile World Congress 2019 a few weeks ago was that 5G is maturing quickly not only from a technical perspective, but also from a business standpoint. Since technical and business features must be commercially hardened to ensure successful implementations, this is good news.

The focus on business readiness that I took away from the halls of the Fira Gran Via exhibition center served to reinforce the importance of fully addressing the business of security requirements. Heavy Reading investigated this topic in a recently completed "5G Security Market Leadership Study (MLS)," a study-based survey developed with F5 Networks, Fortinet, NetNumber and Palo Alto Networks. This survey attracted 103 global respondents and included several questions related to use case-specific business models, technical challenges and preferred commercial architectures.

5G is service disruptive
One of the reasons a business focus is so important is that 5G is disruptive from a both a business and technical perspective. This was strongly reinforced in the MLS survey on several levels. For example, as illustrated in the figure below, 63% of the service provider respondents agreed that 5G would disrupt existing services models, including the delivery of managed security services. Moreover, this disruption would happen on multiple levels and drive a greater focus on both business-to-business (B2B) and business-to-consumer (B2B) models.

The need to focus on both is crucial, with 95% of the respondents agreeing in a B2B context and 76% agreeing in a B2C context. These inputs are also consistent with another trend I saw at MWC19: 5G will be a foundation enabler for both B2B- and B2C-based Internet of Things (IoT) services that are also rapidly maturing. In turn, IoT will introduce new managed security service opportunities, given IoT devices introduce new security concerns associated with identity management and policy enforcement -- especially when supported in a slice.

The Impact of 5G on Service Delivery Models
Question: Do you agree or disagree with the following statements? (N=101-102) 
Source: Heavy Reading
Question: Do you agree or disagree with the following statements? (N=101-102)
Source: Heavy Reading

NSA has an edge
I specifically referenced slicing because 5G slicing is key to service delivery but also drives the need to introduce new security capabilities that typically run on the next-generation core (NGC) network. Therefore, as captured in the figure below, we investigated which 5G-specific use cases would be supported at commercial launch via 5G standalone mode (SA). The latter mode utilizes both the NGC network paired with 5G New Radio (NR) instead of utilizing the non-standalone (NSA) mode architecture, which pairs 5G NR with the existing 4G core. The information captured in the figure confirms a generally greater interest in launching 5G security services utilizing NSA. This translates into 55% to 65% of service providers planning to launch a common set of security use cases using the NSA option. While this does simplify security, it also limits the security service reach and business model richness of a number of these services.

This is one factor why I believe there is such a strong initial focus on cloud radio access network (RAN) security (65%) and core network signaling security capabilities (63%), which must be supported in any configuration. A secondary consideration is that it simplifies and pushes out the requirement to support 5G roaming on IP exchange (IPX) networks if the original core is used for launch. Additionally, the adoption of NSA translates into less initial complexity for evolving enterprise managed security services.

However, it's also important to document that a significant number of the service provider survey respondents (in the 35% to 45% range) plan to support a broad range of security use cases via SA mode. Thus, there is substantial interest in SA architecture to facilitate the support of advanced security services beyond the core and RAN.

5G Commercial Launch Architecture – Security Use Cases
Question: Which architecture configuration will you utilize to support the commercial launch of the following 5G security use cases? (N=97-101)  
Source: Heavy Reading
Question: Which architecture configuration will you utilize to support the commercial launch of the following 5G security use cases? (N=97-101)
Source: Heavy Reading

Looking for more information? Plan to attend the Securing 5G Networks: Service Provider Perspectives webinar on March 19 or view the archived version, where we will present more of the research data from this survey.

— Jim Hodges, Principal Analyst, Cloud and Security, Heavy Reading This blog is sponsored by Fortinet.

(0)  | 
Comment  | 
Print  | 
Related Stories
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
More Blogs from Heavy Lifting Analyst Notes
Sunrise Communications, the second-largest telecom operator in Switzerland, reported third-quarter service revenue growth of 2.0%.
With service providers installing so much fiber in their plant right now and seemingly no end in sight, the need for automated test solutions will only keep growing.
For the Australian incumbent, reskilling an entire workforce is the route to a successful network and IT transformation.
Four key themes emerged from a recent HPE and Intel reception, 'From NFV to Cloud Native: Future Proofing Your 5G investment.'
A new set of NFV challenges is emerging as operators plan the shift towards cloud-native applications and a container-based strategy.
Featured Video
Upcoming Live Events
December 3-5, 2019, Vienna, Austria
December 3, 2019, New York, New York
March 16-18, 2020, Embassy Suites, Denver, Colorado
May 18-20, 2020, Irving Convention Center, Dallas, TX
All Upcoming Live Events