Connect with us

Hi, what are you looking for?

HEADLINES

5G changing the game for network performance, security

Security and IT teams must adjust their strategies to manage this new hybrid workforce at scale effectively. Below we highlight the factors that play into the security of these environments, including the cloud, general security infrastructures, and employee cybersecurity awareness.

In 2020, remote work became the norm as organizations worldwide were forced to rapidly shift their operational models. However, even once the COVID-19 pandemic subsides and some employees move back into the office, many others will continue working from home into the future. Indeed, “work” is increasingly viewed as something we do as opposed to a place we commute to and from.

With this in mind, security and IT teams must adjust their strategies to manage this new hybrid workforce at scale effectively. Below we highlight the factors that play into the security of these environments, including the cloud, general security infrastructures, and employee cybersecurity awareness. 

Accelerating Trends and 5G for Network Performance and Security 

Organizations have long been cautioned against the dangers of a piecemeal security approach that can leave gaps in protection. They have also been warned that a lack of a comprehensive, coherent digital transformation strategy with an integrated security solution presents long-term challenges. And this was before the pandemic hit. 

When COVID-19 entered the picture, workforces around the world transitioned to a remote structure with little warning. This meant networks that were already in a precarious position were stretched even further in size and scale to maintain business continuity. The need for such rapid expansion meant that many businesses let security fall by the wayside. 

This rapid network expansion, however, was less of a journey into uncharted territory and more of an acceleration of trends that were already occurring. Now, with 5G entering the picture, additional security challenges are presenting themselves. Moreover, many do not realize how unprepared they may be for the additional changes coming down the pipeline.  

Advertisement. Scroll to continue reading.

The 5G that many companies are familiar with has low bandwidth and is generally under six gigahertz, a stark contrast to what is emerging on the scene – new smartphones can use 5G bandwidth at performance levels of 24 gigahertz and above. This will fundamentally change network performance requirements on the edge for both devices and applications; it will also require the appropriate security infrastructures to monitor and manage this new level of performance. 

The new 5G is expected to power everything from manufacturing and energy grids to autonomous vehicles and consumer brands. Businesses that do not proactively prepare for this shift will start to encounter latency issues and severely diminished user experiences and will ultimately get left behind.  

Tackling 5G Security 

Demands on networks will increase significantly, particularly at the edge, and increased complexity will simultaneously lead to evolving security needs. But simply adding security on top of the network can create bottlenecks. The key is to find a way to increase network capabilities securely in a way that doesn’t impact the user experience.  

Two approaches are on the table for addressing the challenges of 5G. The first approach is to deploy security at the 5G carrier level. The second requires focusing on edge security since the edge is where 5G is used either as a backup connection or, increasingly, as a primary connection. No matter the approach, the edge will require AI-predictive and ASIC-accelerated performance.  

The cloud edge, in general, will require new levels of highly optimized security even if 5G isn’t considered a priority. Complex hybrid networks now span collections of clouds and data centers, requiring more virtual devices and firewalls to handle the load. And while 5G will make transactions and applications faster, it will also enable faster cyberattacks. Proper management requires extreme consistency in security policy and deployment strategy. 

Advertisement. Scroll to continue reading.

The Time to Prepare is Now with 5G  

Today, 5G represents about $5 billion in operator-billed revenue opportunity. This is projected to grow to an astounding $357 billion by 2025, representing a significant shift in how and where 5G is used. Therefore, meeting the performance and security needs of 5G will be crucial to any company wishing to remain viable.  

Many organizations do not currently have this capability. Moreover, previous strategies of chasing best-of-breed devices mean that many organizations have a legacy security setup made of a hypercomplex patchwork of increasingly difficult-to-manage infrastructures. Certainly, last-minute deployments in the wake of the pandemic did not help matters. Adding 5G on top of such architectures is likely to compound the issue and lead to a whole host of problems and vulnerabilities.  

Workarounds are no longer the answer. Now is the time for organizations to deploy coherent and comprehensive 5G network security strategies. But they must act quickly as the needs of a 5G world will only grow from here, and 6G is less than a decade away. 

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

The improvement followed a 2% revenue decline at the end of Q1 2025, as Smart focused on value-led growth supported by targeted customer initiatives and...

HEADLINES

As cyber threats become more sophisticated, cloud and application security can no longer be treated as a compliance exercise. It must be seen as...

HEADLINES

Designed to secure the full AI stack—from data center infrastructure to applications and large language models (LLMs)—the solution delivers advanced AI threat defense with...

HEADLINES

This initiative is particularly critical as organizations in the Philippines face an increasing shortage of skilled cybersecurity professionals.

HEADLINES

The results reveal a threat landscape that is not only evolving in complexity but also shifting toward gaps in visibility, governance, and infrastructure, posing...

HEADLINES

"As digital transformation accelerates, cybersecurity is more critical than ever to safeguarding businesses, the global economy, and society at large,” said Michael Xie, Founder,...

HEADLINES

FortiAI has now expanded to encompass Fortinet’s entire AI-driven approach across security and network operations, protecting environments, and securing AI models and LLMs.

White Papers

According to the report, the rate of mobile network traffic data is expected to grow almost three-fold by the end of 2030 from present...

Advertisement