newsroom.ibm.com Open in urlscan Pro
2606:4700::6811:1caa  Public Scan

Submitted URL: http://links.readsitquick.us/els/v2/ZzbaFkg3vxse/anVESlBmNXlsb2NuSHVjVVY3UGpZL0FmanJscVBqdEgyZUhQck9BWGdjT0lhVVlxK2ZCZHF3K0pG...
Effective URL: https://newsroom.ibm.com/IBM-and-Palo-Alto-Networks-collaborate-on-5G-Security?siteid=RIQSITE
Submission: On November 11 via manual from IN — Scanned from US

Form analysis 2 forms found in the DOM

Name: basic_searchGET https://newsroom.ibm.com/index.php?s=20322

<form name="basic_search" method="get" action="https://newsroom.ibm.com/index.php?s=20322" class="wd_search_form wd_search_form_basic"><input type="hidden" name="s" value="search_results"><input type="text" name="query" value="" size="32"
    placeholder="Search the IBM Newsroom" title="Search the IBM Newsroom">
  <a href="#" onclick="webDriver.jQuery(this).closest('form').submit(); return false;"><button role="button" value="Submit" type="submit"><svg focusable="false" preserveAspectRatio="xMidYMid meet" xmlns="http://www.w3.org/2000/svg" fill="currentColor" aria-hidden="true" width="20" height="20" viewBox="0 0 32 32"><path d="M29,27.5859l-7.5521-7.5521a11.0177,11.0177,0,1,0-1.4141,1.4141L27.5859,29ZM4,13a9,9,0,1,1,9,9A9.01,9.01,0,0,1,4,13Z"></path></svg></button></a>
</form>

Name: wd_sidebar_searchGET https://newsroom.ibm.com/campaign

<form action="https://newsroom.ibm.com/campaign" method="get" name="wd_sidebar_search" id="wd_sidebar_search">
  <ul class="tagsFilter-tags">
    <li class="tagsFilter-tags-item" role="button" tabindex="0" aria-label="AI">
      <a href="#" data-url="10" class="vsubnav">AI</a>
    </li>
    <li class="tagsFilter-tags-item" role="button" tabindex="0" aria-label="Business Growth">
      <a href="#" data-url="11" class="vsubnav">Business Growth</a>
    </li>
    <li class="tagsFilter-tags-item" role="button" tabindex="0" aria-label="Good Tech">
      <a href="#" data-url="12" class="vsubnav">Good Tech</a>
    </li>
    <li class="tagsFilter-tags-item" role="button" tabindex="0" aria-label="Hybrid Cloud">
      <a href="#" data-url="13" class="vsubnav">Hybrid Cloud</a>
    </li>
    <li class="tagsFilter-tags-item" role="button" tabindex="0" aria-label="Quantum &amp; Innovation">
      <a href="#" data-url="14" class="vsubnav">Quantum &amp; Innovation</a>
    </li>
  </ul>
  <div class="wd_year_wrap">
    <h4>Year</h4>
    <select name="year">
      <option value="2021">2021</option>
      <option value="2020">2020</option>
      <option value="2019">2019</option>
      <option value="2018">2018</option>
      <option value="2017">2017</option>
      <option value="2016">2016</option>
    </select>
  </div>
  <input type="hidden" name="cat" value="">
  <button type="submit" class="bx--btn bx--btn--primary" id="wd_submit_sidebar_search">Submit</button>
</form>

Text Content

IBM Newsroom

 * Home
 * Latest News
   * Hybrid Cloud
   * AI
   * Quantum & Innovation
   * Business Growth
   * Good Tech
 * Press Releases
 * Media Contacts
 * Media Center
 * Leadership
 * Global Newsrooms


LATEST NEWS

IBM and Palo Alto Networks Collaborate on 5G Security
October 27, 2021

 * AddThis Sharing Buttons
   Share to FacebookFacebookShare to TwitterTwitterShare to
   LinkedInLinkedInShare to PinterestPinterest
 * 
 * 
 * 

By Chris McCurdy, General Manager, IBM Global Security Services and Craig
Wilson, Vice President, IBM Global Telecom & Media Industry


As telecom operators upgrade their networks for 5G and Edge they can create
digital platform businesses that are better positioned for innovation and value
capture. Operators have an opportunity to be providers of managed security
services, helping to secure the end to end service from the device to the
application.

Cybersecurity is the challenge of this decade

In doing so, they also face new security challenges. Internal and external
threats to cybersecurity will continue to grow along with the proliferation of
IoT devices and the modernization of telecom networks to hybrid cloud based
architectures. A recent IBM Security study, “The Annual Cost of a Data Breach,”
indicated that 75% of responding operators have experienced incidences of fraud
and 61% said network security threats increased or significantly increased since
the beginning of the pandemic1.

The 5G evolution is designed to deliver higher data speeds, latency improvements
and the functional redesign of mobile networks to help enable greater agility,
efficiency, and openness. Although these new capabilities can yield revenue
opportunities for operators, the hybrid spread of network devices, and the
variety of devices that can leverage the network including low-cost, low-power,
unsecured IoT/sensors can also pose increased security risks for both operators
and end-users. Establishing the right security approach for emerging 5G networks
is critical.

IBM is working with communication services providers around the globe on a
“secure by design” strategy to build cybersecurity capabilities into every part
of their business, helping them implement a Zero Trust strategy across their
network and IT operations.

Implications for deploying 5G and Edge Networks

Although 5G can expand the attack surface of Telecom operators and their
customers, the distinctly new architecture and capabilities of 5G networks are
being designed to give operators opportunities to detect and address cyber
threats more efficiently than ever before. As mobile networks increasingly
evolve towards a hybrid cloud platform, we believe automated security
orchestration and management will be crucial in 5G networks. Additionally, xNF
security posture will need to be maintained at every stage of the lifecycle,
from onboarding to operations. End-to-end security will require management
through a central point of control, and smart security controls will be required
in order to cope with unpredictable threats that try to exploit weaknesses in
the network.

How operators architect security into their 5G networks and adopt a Zero Trust
strategy is essential, and the following factors should be considered:

 * An industry standard framework that can help reduce integration risk and cost
 * Building security policies into the CI/CD process to aid with innovation
   speed, improved quality
 * Threat management assessments help expose potential areas of vulnerability
 * A Zero Trust strategy can institutionalize the right policies in the journey
   to cloud native

IBM and Palo Alto Networks are collaborating to help operators build secured 5G
networks

IBM and Palo Alto Networks are working together to deliver cybersecurity
solutions to enterprise and telecom customers around the world.

Today our two companies are working in partnership to address the unique
security requirements for telecom operators deploying 5G Networks and Edge
services. Palo Alto Networks and IBM are working together to bring integrated
security solutions and services designed for 5G networks and ecosystems. This
collaboration includes security and automation spanning multifunction network
devices and VNFs, container security and control plane security.

At Mobile World Congress (MWC) Los Angeles, IBM and Palo Alto Networks will
demonstrate a 5G Network Slice with Validation, Security Orchestration &
Response. This demonstration shows how Operators can deploy a Network slice with
integrated security controls, test the slice with end to end validation before
production deployment, and help protect the slice from network attacks.

We invite you to visit IBM at Booth 1520 for a demo of IBM and Palo Alto
Networks 5G Security solutions at Mobile World Congress Los Angeles (Oct 26-28).
For more information or to schedule a virtual demo, visit:
https://www.ibm.com/industries/telecom-media-entertainment/events/mwc

 

1 IBM Security, “The Annual Cost of a Data Breach,” July 2021.

ARTICLE CATEGORIES

 * AI
 * Hybrid Cloud

Back to Stories
more articles
IBM Commits to Skill 30 Million People Globally by 2030
IBM Study: CIOs' Influence is Growing As Technology Becomes Core to Surveyed
Enterprises
IBM Consulting leadership announcements

CATEGORIES

 * AI
 * Business Growth
 * Good Tech
 * Hybrid Cloud
 * Quantum & Innovation

YEAR

202120202019201820172016
Submit

ADDITIONAL ASSETS

Recommended Stories
Jul 15, 2021
IBM to Acquire Bluetab to Expand Data and Hybrid Cloud Consulting Services in
Europe and Latin America

Jul 8, 2021
Atos and IBM to Collaborate to Build a Secured Infrastructure for the Dutch
Ministry of Defense

Jul 7, 2021
CodeFlare Drastically Reduces Time to Set Up, Run, Scale Machine-Learning Tests


More »

Top products & platforms Industries Artificial intelligence Blockchain Business
operations Cloud computing Data & Analytics Hybrid cloud IT infrastructure
Security Supply chain What is Hybrid Cloud? What is Artificial intelligence?
What is Cloud Computing? What is Kubernetes? What are Containers? What is
DevOps? What is Machine Learning? IBM Consulting Communities Developer education
Support - Download fixes, updates & drivers IBM Research Partner with us -
PartnerWorld Training - Courses Upcoming events & webinars Annual report Career
opportunities Corporate social responsibility Diversity & inclusion Investor
relations News & announcements Thought leadership Security, privacy & trust
About IBM LinkedIn Twitter Instagram United States — English Contact IBM Privacy
Terms of use Accessibility