Blog

AdaptiveMobile Security’s 5G Security Solution Shortlisted for GLOMO Awards

AdaptiveMobile Security, an Enea Company, is delighted to announce that we have been shortlisted for a GSMA Global Mobile Award (GLOMO) in the Best Mobile Authentication and Security Solution Category. The company’s 5G Network Security Solution has been selected as a finalist by an illustrious panel of judges and the winner will be named in a virtual ceremony on March 2nd at Mobile World Congress in Barcelona. The GLOMO Awards are widely acknowledged as being the most prestigious recognition scheme in the mobile industry, and are judged by independent experts, analysts, journalists, academics, and mobile operator representatives.

Our company’s shortlisted Unified 5G Network Security Solution allows carriers to defend against security concerns threatening their 5G infrastructure.

First Unified 5G Network Security Solution

As per Brian Collins, our SVP of security, “5G has changed the game in terms of security threats and challenges for mobile operators, bringing many of the attacks and methods from the IT world into telecoms networks for the first time”. The introduction of the 5G network has undoubtedly benefited the telecom industry in terms of efficiency and connectivity. However, as can be expected with the introduction of new technology, it comes with a cost: new security risks.

 

The significant security shortfalls in the 5G industry have been widely recognised by industry experts. The most glaring deficiency lies within the 5G network architecture, which is inherently more accessible than that of previous mobile technologies. In addition to being extremely accessible, fifth generation network architecture is highly complex. Service based architectures, web style protocols and APIs in particular are much more sophisticated than in preceding networks. This level of sophistication gives rise to increased security risk in terms of external network infrastructure, as well as a potential security risk within network slices which we have not been presented with prior to the inception of the 5G network.

The merging of technologies such as service-based architecture, virtualization and slicing – which are required for new use cases enabled by 5G – have given rise to new complications. These technologies need to be integrated with existing infrastructure. In addition to this, interoperability between partners needs to be enabled.

In light of this knowledge, our own experts at AdaptiveMobile Security developed a Unified 5G Network Security Solution – the first of its kind.

Protecting against internal and external security threats to 5G infrastructure

Our 5G security solution allows carriers to protect against internal and external security threats to their 5G infrastructure. It is the first unified 5G network security solution, bringing together a combination of cybersecurity capabilities that operate in unison to secure 5G networks, slices, vertical APIs, and subscribers.

Some examples of the services provided as part of our solution include:

  • An enhanced Security Edge Protection Proxy (eSEPP)

It is not sufficiently secure to encrypt connections from end to end. Threat actors backed by nation states can resort to using other trusted networks to attack the 5G networks of its targets. AdaptiveMobile Security’s eSEPP affords the security of both interconnected networks plus additional network infrastructure in a mixed 4G and 5G network deployment.

  • Enhanced Service Communication Proxy (eSCP)

We have observed 5G network slicing to be incredibly beneficial for mobile network operators in terms of cost and efficiency due to the multiplexing capabilities it offers. Unfortunately, the advent of network slicing technology has also provided threat actors with opportunities to effectively commandeer network slices, leaving networks exposed to threats such as denial of service attacks and information theft. Thus, there is a requirement for the internal protection of 5G networks. A strengthened service communication proxy will enforce security zones within the core network, providing the internal protection needed to fend off threat actors taking advantage of vulnerable network slicing technology.

  • Vertical API Protector

As new APIs evolve to match the migration to 5G, new attack vectors are created. Network operators need to proactively secure these new vectors as they are created. AdaptiveMobile Security’s vertical API Protector establishes the integrity of signaling and control communications. By verifying these communications, the API protector can prevent threat actors from infiltrating 5G network APIs.

Find out more about our Unified 5G Security Solution at Mobile World Congress 2022

AdaptiveMobile Security is thrilled to be attending the Mobile World Congress 2022 in Barcelona as part of the Enea brand. Our team will be occupying booth #2E51MR in Hall 2. Book a meeting with us to discuss challenges in the realm of mobile security, and for an in-depth look into the ways in which we can significantly enhance the security of your 5G network.

Related insights

Globe with multiple screens displaying images and trends

Enea Retrospective: What Did We Get Right in Our 2023 Trends Report?

Read more

Tags: Cybersecurity, IoT, MNO, Mobile Security

2023 Retrospect on Observability

Observability: 2023 Retrospect

Read more

Tags: 5G, AI, Cybersecurity, Network Security, Observability

Think Before You Google: Unmasking Malicious URLs

Read more

Tags: Cybersecurity, SMS, Threat Intelligence

Mobile Survey Identifies Global Security Gaps as Networks Converge

Mobile Survey Identifies Global Security Gaps as Networks Converge

Read more

Tags: Cybersecurity, Mobile Security, Network Security, Security

TLS 1.3 ECH - Encryption - How to Preserve Critical Traffic Visibility for Enterprise and Network Security while Safeguarding Privacy

TLS 1.3 ECH – How to Preserve Critical Traffic Visibility for Enterprise and Network Security while Safeguarding Privacy

Read more

Tags: Cybersecurity, Deep Packet Inspection, Encryption, SASE, SD-WAN, Threat Detection, ZTNA