The Latest Check Point News
Product and Solution Information, Press Releases, Announcements
|5G: Better, Always-on Connectivity Demands Better, Always-on Security|
|Posted: Fri Oct 23, 2020 02:52:48 PM|
Protecting the new generation of 5G-based applications against advanced cyber-attacks
How fast is your Internet connection right now? No matter what speeds you’re currently getting, they’re just a fraction of the up to 10 gigabits per second promised by 5G. That’s over 100 times faster than 4G on today’s mobile phones, and 10x more than even the fastest fibre home broadband service offered currently – it’s actually quick enough to download a 4K HD movie in a matter of seconds. 5G will also be characterized by ultra-low latency, which opens the door to a new era of instantaneous, always-on connectivity between systems. All these qualities enable a huge range of applications, services and devices that are intended to make our lives easier, more efficient, healthier and safer.
These applications span autonomous vehicles, telemedicine, smart agriculture, smart manufacturing and more. Tens of billions of devices will be connected via 5G, enabling real-time monitoring of everything from the location of your pet cat, to control of wearable medical devices. Cars and trucks will be able to communicate with each other for real-time navigation and accident avoidance. Telemedicine and remote surgery will become more widespread. Automation and wider use of robots will become commonplace across industries. It’s predicted that the industrial revolution enabled by 5G will support an additional $12 trillion in global economic output over the next 15 years.
The stakes are high, so it’s no surprise that businesses and governments globally are racing to deploy 5G networks and solutions that will deliver new capabilities and unlock innovation. However, there is a catch. The totally connected world promised by 5G also gives criminals and nation-state hackers endless opportunities to launch cyber-attacks and cause disruption, damage or even deaths, by targeting that pervasive connectivity.
5G – a risky business?
Concerns over 5G security are not exaggerated, especially if we consider the types of damaging attacks and exploits we’ve seen over the past three years, even before the introduction of 5G networks:
Malware, online identity theft, data breaches and other cyber-attacks against enterprises, critical infrastructure, healthcare organizations and consumers are now so commonplace that we’re no longer surprised by them. And adding billions more devices with super-fast, always-on connectivity to our online world will create further, unprecedented risks of disruption of the network and cloud infrastructures, the applications running on them, and the devices themselves on a scale that we have never seen before – which is a scenario that we must avoid.
Meeting 5G’s security challenges
So what are the specific security challenges that 5G networks and devices introduce? While 5G’s stronger encryption of data and better verification of network users are improvements over 4G technology, it also introduces new risks. The security challenges are in two main areas:
The result is that, while 5G will revolutionize connectivity and communications, it is also more vulnerable to attacks compared to the existing networks. So the question is, how do organizations go about securing their 5G deployments to protect themselves against these new vulnerabilities, breaches and attacks, at both network and device level?
What’s needed is a different approach to security. As 5G will connect users and applications across mobiles, endpoints, networks, cloud and IoT, it’s essential to have advanced threat prevention to protect all of these types of asset, wherever they are located. This demands a consolidated security architecture that works across all platforms, and uses unified threat intelligence at every enforcement point to prevent both known and unknown threats from penetrating the network fabric. This ensures consistent security, while being fully scalable to cope with the massive bandwidth enabled by 5G.
And what about the billions of IoT devices on 5G networks? These devices will span industries including medical, industrial, smart buildings, automotive and more. Given this huge volume and variety of products – many of which will have extremely limited or zero security capabilities – organizations need an easy way to deploy and manage security on any type of device.
One of the best, innovative approaches is to use micro-scale plugins that can work on any device or operating system in any environment. These micro software agents control every attribute that goes to and from the device on the 5G network, and connect to the consolidated security architecture to enforce protection.
In summary, 5G will make the world more connected, with the promise of huge benefits across industry, agriculture, health and social care, and more. But that connectivity is also an open invitation to hackers and criminals to try and cause disruption for their own benefit. Therefore, organizations need to deploy agile protections that can keep pace with the capabilities of 5G networks, to help them safely realize the full potential of a 5G-enabled future.