Discover what’s really driving the shift toward unified security
Discover how geopolitical tensions are fueling advanced cyber campaigns
Is the Quantum Threat Closer Than You Think?
  • Sign In
    • Customer
    • Partner
    • Employee
    • Login to download
    • Join us to become a member
  • EN
  • magnifying glass search icon to open search field
  • Contact Us
  • What's New
  • Get Support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Login to download
    • Join us to become a member
  • EN
    Language
  • Contact Us
  • What's New
  • Get support
  • Under Attack?
  • Demos and Trials

Implementing 5G security: 5 service provider priorities & preferences

Takeaways from the 2019 Heavy Reading 5G security survey

1. 5G security use case priorities during commercial launch

Service providers intend to address immediate security challenges inherent with 5G New Radio (NR) and 5G Next-Gen Core (NGC) by prioritizing these security use cases.

  • 1
    Core network signaling security services
    a1
  • 2
    Cloud RAN fronthaul and backhaul security
    a2
  • 3
    Core network configuration services, including slice management
    a3

2. Top 5 service provider security-as-a-service (SECaaS) priorities

A number of key offerings are central to enhancing the CSP 5G SECaaS portfolio.

  • 1
    Application visibility and control for IoT services
    b1
  • 2
    Subscriber (IMSI) threat correlation
    b2
  • 3
    Secure applications on the mobile edge
    b3
  • 4
    Automated cloud-based proactive security for known and unknown attacks
    b4
  • 5
    Device (IMEI) threat correlation
    b5

3. Signaling security crucial to 5G

Current signaling control planes are stable for the most part, but service providers are less confident that this security performance can be duplicated on the 5G control plane.

bar_chart
 
of CSPs agree signaling storms will be more common in 5G NR RAN and 5G NGC
 
of CSPs agree signaling security between inter-operator networks (roaming) will be crucial in 5G

4. Full content inspection a must-have

Full content inspection enhances visibility into RAN and Core and is fast becoming an extremely important “must-have” network security capability to CSPs.

  • 42p
    agree full content inspection is vital in 5G NR RAN
  • 41p
    agree full content inspection is vital in 5G/NGC
  • 32p
    agree full content inspection is vital in roaming
  • 25p
    agree full content inspection is vital in Gi/SGi interface
  • 24p
    agree full content inspection is vital in MEC cloud

5. Threat correlation: a critical requirement

Full content inspection enhances visibility into RAN and Core and is fast becoming an extremely important “must-have” network security capability to CSPs.

  • IMSI
    of CSPs rated subscriber (IMSI) correlation to threats and vulnerabilities a critical security service
    c1
  • IMEI
    of CSPs rated device (IMEI) correlation to threats and vulnerabilities a critical security service
    c2



Although security challenges await at the inaugural phase of the 5G rollout, CSPs have clear insight into strategic security use case priorities that will guarantee success.

WANT TO LEARN MORE?


Source

"Heavy Reading's 2019 5G Security Survey," Heavy Reading, February 2019.

 

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Products and Services

  • AI-Powered Network Security Platform
  • Secure AI by Design
  • Prisma AIRS
  • AI Access Security
  • Cloud Delivered Security Services
  • Advanced Threat Prevention
  • Advanced URL Filtering
  • Advanced WildFire
  • Advanced DNS Security
  • Enterprise Data Loss Prevention
  • Enterprise IoT Security
  • Medical IoT Security
  • Industrial OT Security
  • SaaS Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Software Firewalls
  • Strata Cloud Manager
  • SD-WAN for NGFW
  • PAN-OS
  • Panorama
  • Secure Access Service Edge
  • Prisma SASE
  • Application Acceleration
  • Autonomous Digital Experience Management
  • Enterprise DLP
  • Prisma Access
  • Prisma Access Browser
  • Prisma SD-WAN
  • Remote Browser Isolation
  • SaaS Security
  • AI-Driven Security Operations Platform
  • Cloud Security
  • Cortex Cloud
  • Application Security
  • Cloud Posture Security
  • Cloud Runtime Security
  • Prisma Cloud
  • AI-Driven SOC
  • Cortex XSIAM
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Unit 42 Managed Detection & Response
  • Managed XSIAM
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence

Company

  • About Us
  • Careers
  • Contact Us
  • Corporate Responsibility
  • Customers
  • Investor Relations
  • Location
  • Newsroom

Popular Links

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
PAN logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2025 Palo Alto Networks. All Rights Reserved

  • Youtube
  • Podcast
  • Facebook
  • LinkedIn
  • Twitter
  • Select your language