Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Infrastructure

Mobile Edge Computing on 5G Networks: Don’t Forget About Security and Testing

5G is here. New cellular networks are being planned and rolled out around the world, exciting consumers and enterprises alike with the promise of huge jumps in performance. However, speed isn’t the only benefit of 5G. The new network protocol is also giving rise to Mobile Edge Computing (MEC)—the ability to push applications and content to the edge of the cellular network.

5G is here. New cellular networks are being planned and rolled out around the world, exciting consumers and enterprises alike with the promise of huge jumps in performance. However, speed isn’t the only benefit of 5G. The new network protocol is also giving rise to Mobile Edge Computing (MEC)—the ability to push applications and content to the edge of the cellular network. This architecture change will reduce latency and power consumption and, perhaps most importantly, enhance security.

Low Latency Apps Driving 5G and MEC

Advances in autonomous vehicles, the Internet of Things (IoT) and augmented reality (AR) are driving the need for MEC applications. These applications require extremely low latency, and it makes sense to move both functionality and content to the edge of cellular networks. It’s much easier to embed virtualized compute and storage elements closer to the cell tower with 5G networks because of the speed improvements.

Developers are looking forward to creating applications that control autonomous or semi-autonomous robots in construction or emergency response as well as highly-immersive AR apps where the “environment” has to react immediately to a user’s every movement. The transportation industry is developing software that allows vehicles to interact with other vehicles, pedestrians and road infrastructure in real time to improve navigation, reduce congestion and avoid collisions. At the same time, content providers are looking at MEC to store video and other rich media on the edge of the network to cut down on latency and that dreaded buffering symbol.

Enterprises aren’t waiting to move forward. According to a survey of global senior technology professionals conducted by Dimensional Research, nearly half of global businesses have already deployed 5G networks or applications or plan to within the next 12 months. 5G is certainly driving the next generation of mobile networks.

Enterprises Shouldn’t Forget About Security and Testing

There are some concerns, of course. Moving applications and content out to the edge of the network in cellular base stations is making some CSOs at large enterprises nervous. Until recently, service providers have been the sole player in cellular base stations. MEC doesn’t necessarily imply that enterprises own the base station, but with the rise of this new network protocol, they need to test these components coming together in the enterprise network, ensuring full distributed functionality, interoperability, scale and security. They also need to have network visibility to “see” what is going on across this network. 

However, the architecture inherent in MEC applications actually improves security. Moving apps and content to the edge of cellular networks shortens the distance proprietary information has to travel between client and server. Traffic will transverse less elements in a large network, reducing its exposure to spoofing, MITM, rerouting and other threats. There’s a shorter chain, and therefore, less of an attack surface.

Advertisement. Scroll to continue reading.

Just like any new network, enterprises need to expose their workloads to rigorous testing—for both performance and security. Cloud providers often offer their own baked in test infrastructure—and it’s likely that telecoms will do the same with MEC. That will not be enough. Enterprises need their own visibility into these networks to ensure they are getting the performance and security that is promised to them.

Keep Telecoms Honest

MEC promises to speed up latency across cellular networks—enabling low-latency applications and content providers. Enterprises have a right to be nervous about trusting a new player with their proprietary data, but just like the cloud, the trust will come. Enterprises just need to make sure they have the testing infrastructure in place and the visibility into their workloads to keep telecoms honest about what they are promising.

Written By

Marie Hattar is chief marketing officer (CMO) at Keysight Technologies. She has more than 20 years of marketing leadership experience spanning the security, routing, switching, telecom and mobility markets. Before becoming Keysight’s CMO, Marie was CMO at Ixia and at Check Point Software Technologies. Prior to that, she was Vice President at Cisco where she led the company’s enterprise networking and security portfolio and helped drive the company’s leadership in networking. Marie also worked at Nortel Networks, Alteon WebSystems, and Shasta Networks in senior marketing and CTO positions. Marie received a master’s degree in Business Administration in Marketing from York University and a Bachelor’s degree in Electrical Engineering from the University of Toronto.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Management & Strategy

Hundreds of companies are showcasing their products and services this week at the 2023 edition of the RSA Conference in San Francisco.

Security Infrastructure

Security vendor consolidation is picking up steam with good reason. Everyone wants to improve security efficiency and effectiveness while paying for less.

Cloud Security

The term ‘zero trust’ is now used so much and so widely that it has almost lost its meaning.

Security Infrastructure

Instead of deploying new point products, CISOs should consider sourcing technologies from vendors that develop products designed to work together as part of a...

Funding/M&A

Responding to Cyber Threats Against Critical Infrastructures: Wired Business Media Acquires Long Running ICS Cybersecurity Conference Series

Security Infrastructure

Comcast jumps into the enterprise cybersecurity business, betting that its internal security tools and inventions can find traction in an expanding marketplace.

Audits

The PCI Security Standards Council (SSC), the organization that oversees the Payment Card Industry Data Security Standard (PCI DSS), this week announced the release...