newsroom.ibm.com
Open in
urlscan Pro
2606:4700::6811:1caa
Public Scan
Submitted URL: http://links.readsitquick.us/els/v2/ZzbaFkg3vxse/anVESlBmNXlsb2NuSHVjVVY3UGpZL0FmanJscVBqdEgyZUhQck9BWGdjT0lhVVlxK2ZCZHF3K0pG...
Effective URL: https://newsroom.ibm.com/IBM-and-Palo-Alto-Networks-collaborate-on-5G-Security?siteid=RIQSITE
Submission: On November 11 via manual from IN — Scanned from US
Effective URL: https://newsroom.ibm.com/IBM-and-Palo-Alto-Networks-collaborate-on-5G-Security?siteid=RIQSITE
Submission: On November 11 via manual from IN — Scanned from US
Form analysis
2 forms found in the DOMName: basic_search — GET https://newsroom.ibm.com/index.php?s=20322
<form name="basic_search" method="get" action="https://newsroom.ibm.com/index.php?s=20322" class="wd_search_form wd_search_form_basic"><input type="hidden" name="s" value="search_results"><input type="text" name="query" value="" size="32"
placeholder="Search the IBM Newsroom" title="Search the IBM Newsroom">
<a href="#" onclick="webDriver.jQuery(this).closest('form').submit(); return false;"><button role="button" value="Submit" type="submit"><svg focusable="false" preserveAspectRatio="xMidYMid meet" xmlns="http://www.w3.org/2000/svg" fill="currentColor" aria-hidden="true" width="20" height="20" viewBox="0 0 32 32"><path d="M29,27.5859l-7.5521-7.5521a11.0177,11.0177,0,1,0-1.4141,1.4141L27.5859,29ZM4,13a9,9,0,1,1,9,9A9.01,9.01,0,0,1,4,13Z"></path></svg></button></a>
</form>
Name: wd_sidebar_search — GET https://newsroom.ibm.com/campaign
<form action="https://newsroom.ibm.com/campaign" method="get" name="wd_sidebar_search" id="wd_sidebar_search">
<ul class="tagsFilter-tags">
<li class="tagsFilter-tags-item" role="button" tabindex="0" aria-label="AI">
<a href="#" data-url="10" class="vsubnav">AI</a>
</li>
<li class="tagsFilter-tags-item" role="button" tabindex="0" aria-label="Business Growth">
<a href="#" data-url="11" class="vsubnav">Business Growth</a>
</li>
<li class="tagsFilter-tags-item" role="button" tabindex="0" aria-label="Good Tech">
<a href="#" data-url="12" class="vsubnav">Good Tech</a>
</li>
<li class="tagsFilter-tags-item" role="button" tabindex="0" aria-label="Hybrid Cloud">
<a href="#" data-url="13" class="vsubnav">Hybrid Cloud</a>
</li>
<li class="tagsFilter-tags-item" role="button" tabindex="0" aria-label="Quantum & Innovation">
<a href="#" data-url="14" class="vsubnav">Quantum & Innovation</a>
</li>
</ul>
<div class="wd_year_wrap">
<h4>Year</h4>
<select name="year">
<option value="2021">2021</option>
<option value="2020">2020</option>
<option value="2019">2019</option>
<option value="2018">2018</option>
<option value="2017">2017</option>
<option value="2016">2016</option>
</select>
</div>
<input type="hidden" name="cat" value="">
<button type="submit" class="bx--btn bx--btn--primary" id="wd_submit_sidebar_search">Submit</button>
</form>
Text Content
IBM Newsroom * Home * Latest News * Hybrid Cloud * AI * Quantum & Innovation * Business Growth * Good Tech * Press Releases * Media Contacts * Media Center * Leadership * Global Newsrooms LATEST NEWS IBM and Palo Alto Networks Collaborate on 5G Security October 27, 2021 * AddThis Sharing Buttons Share to FacebookFacebookShare to TwitterTwitterShare to LinkedInLinkedInShare to PinterestPinterest * * * By Chris McCurdy, General Manager, IBM Global Security Services and Craig Wilson, Vice President, IBM Global Telecom & Media Industry As telecom operators upgrade their networks for 5G and Edge they can create digital platform businesses that are better positioned for innovation and value capture. Operators have an opportunity to be providers of managed security services, helping to secure the end to end service from the device to the application. Cybersecurity is the challenge of this decade In doing so, they also face new security challenges. Internal and external threats to cybersecurity will continue to grow along with the proliferation of IoT devices and the modernization of telecom networks to hybrid cloud based architectures. A recent IBM Security study, “The Annual Cost of a Data Breach,” indicated that 75% of responding operators have experienced incidences of fraud and 61% said network security threats increased or significantly increased since the beginning of the pandemic1. The 5G evolution is designed to deliver higher data speeds, latency improvements and the functional redesign of mobile networks to help enable greater agility, efficiency, and openness. Although these new capabilities can yield revenue opportunities for operators, the hybrid spread of network devices, and the variety of devices that can leverage the network including low-cost, low-power, unsecured IoT/sensors can also pose increased security risks for both operators and end-users. Establishing the right security approach for emerging 5G networks is critical. IBM is working with communication services providers around the globe on a “secure by design” strategy to build cybersecurity capabilities into every part of their business, helping them implement a Zero Trust strategy across their network and IT operations. Implications for deploying 5G and Edge Networks Although 5G can expand the attack surface of Telecom operators and their customers, the distinctly new architecture and capabilities of 5G networks are being designed to give operators opportunities to detect and address cyber threats more efficiently than ever before. As mobile networks increasingly evolve towards a hybrid cloud platform, we believe automated security orchestration and management will be crucial in 5G networks. Additionally, xNF security posture will need to be maintained at every stage of the lifecycle, from onboarding to operations. End-to-end security will require management through a central point of control, and smart security controls will be required in order to cope with unpredictable threats that try to exploit weaknesses in the network. How operators architect security into their 5G networks and adopt a Zero Trust strategy is essential, and the following factors should be considered: * An industry standard framework that can help reduce integration risk and cost * Building security policies into the CI/CD process to aid with innovation speed, improved quality * Threat management assessments help expose potential areas of vulnerability * A Zero Trust strategy can institutionalize the right policies in the journey to cloud native IBM and Palo Alto Networks are collaborating to help operators build secured 5G networks IBM and Palo Alto Networks are working together to deliver cybersecurity solutions to enterprise and telecom customers around the world. Today our two companies are working in partnership to address the unique security requirements for telecom operators deploying 5G Networks and Edge services. Palo Alto Networks and IBM are working together to bring integrated security solutions and services designed for 5G networks and ecosystems. This collaboration includes security and automation spanning multifunction network devices and VNFs, container security and control plane security. At Mobile World Congress (MWC) Los Angeles, IBM and Palo Alto Networks will demonstrate a 5G Network Slice with Validation, Security Orchestration & Response. This demonstration shows how Operators can deploy a Network slice with integrated security controls, test the slice with end to end validation before production deployment, and help protect the slice from network attacks. We invite you to visit IBM at Booth 1520 for a demo of IBM and Palo Alto Networks 5G Security solutions at Mobile World Congress Los Angeles (Oct 26-28). For more information or to schedule a virtual demo, visit: https://www.ibm.com/industries/telecom-media-entertainment/events/mwc 1 IBM Security, “The Annual Cost of a Data Breach,” July 2021. ARTICLE CATEGORIES * AI * Hybrid Cloud Back to Stories more articles IBM Commits to Skill 30 Million People Globally by 2030 IBM Study: CIOs' Influence is Growing As Technology Becomes Core to Surveyed Enterprises IBM Consulting leadership announcements CATEGORIES * AI * Business Growth * Good Tech * Hybrid Cloud * Quantum & Innovation YEAR 202120202019201820172016 Submit ADDITIONAL ASSETS Recommended Stories Jul 15, 2021 IBM to Acquire Bluetab to Expand Data and Hybrid Cloud Consulting Services in Europe and Latin America Jul 8, 2021 Atos and IBM to Collaborate to Build a Secured Infrastructure for the Dutch Ministry of Defense Jul 7, 2021 CodeFlare Drastically Reduces Time to Set Up, Run, Scale Machine-Learning Tests More » Top products & platforms Industries Artificial intelligence Blockchain Business operations Cloud computing Data & Analytics Hybrid cloud IT infrastructure Security Supply chain What is Hybrid Cloud? What is Artificial intelligence? What is Cloud Computing? What is Kubernetes? What are Containers? What is DevOps? What is Machine Learning? IBM Consulting Communities Developer education Support - Download fixes, updates & drivers IBM Research Partner with us - PartnerWorld Training - Courses Upcoming events & webinars Annual report Career opportunities Corporate social responsibility Diversity & inclusion Investor relations News & announcements Thought leadership Security, privacy & trust About IBM LinkedIn Twitter Instagram United States — English Contact IBM Privacy Terms of use Accessibility