A New Trust Model For The 5G Era

June 21, 2018

5G promises to be rich in new business models for users and the ecosystem key players (telecom operators, network & cloud vendors, system integrators…). Some of the requirements that exciting new 5G use cases impose on the storage, compute and network domains introduce sizable new risks to the confidentiality, integrity and availability of enterprise data. This White Paper provides Gemalto’s recommendations to the 5G ecosystem on how these new challenges can be navigated to build a new trust model for the 5G era.

Spotlight

ATIM Radiocommunications

ATIM conçoit les systèmes de communication sans fil ARM "Advanced Radio Modem" et ACW, la technologie révolutionnaire "Atim Cloud Wireless" utilisant le nouveau réseau révolutionnaire Sigfox.

OTHER WHITEPAPERS
news image

Private 5G Mobile Networks for Industrial IoT

whitePaper | March 1, 2020

Private mobile networks designed and deployed specifically for enterprise users provide opportunities to optimize and redefine business processes in ways that are either impractical or not possible within the limitations of wired and Wi-Fi networks. For industrial users, the ability to design mobile networks to meet the coverage, performance, and security requirements of production-critical applications is fundamental to the new wave of cyberphysical systems known as Industry 4.0.

Read More
news image

How is the IoT world shaping up in 2021 and what trends will influence the future of IoT?

whitePaper | June 8, 2021

Despite the close of a tumultuous 2020 and the start of 2021, connected devices will continue to shape the future of numerous industries and businesses are confident that the Internet of Things (IoT) will play a key role in the future success of their trade. Several trends continue to gather momentum, stimulating IoT’s prominence in 2021, from Industrial IoT devices to health-and-safety applications as COVID-19 continues to take center stage. Here are a few facts, figures and trends, gathered across the web, that can help us understand where the IoT world is at, how it’s been impacted by the pandemics, and what to expect over the next few years.

Read More
news image

WI-FI 6E AND FUTURE-PROOFING WIRELESS INFRASTRUCTURE

whitePaper | May 23, 2023

The future of wireless networking needs will continue to grow. Location based services, sensors, and IoT devices will continue to be added to wireless networks. Expanding and new uses of Wi-Fi that require high performing connections like AR/VR, AI/ML, and new technologies we don’t even know about yet will compete for wireless network resources. Finally, all the standard uses we currently associate with Wi-Fi like video and voice calls, streaming services and cloud hosted applications will continue to bring more devices to wireless networks with increasing traffic demands.

Read More
news image

WI-FI 6/6E INDUSTRIAL IOT (IIOT)

whitePaper | July 4, 2022

Explore uses of WiFi (6/6E/7) capabilities for Industrial IOT (IIOT) applications. Define and validate critical KPIs (latency, reliability, mobility, etc). Field trials of WiFi6E IIOT use-cases in progress (stand-alone & 5G/Wi-Fi convergence) Formalization of relationships with complimentary industry groups.

Read More
news image

CYBER SECURITY IN THE ERA OF INDUSTRIAL IOT

whitePaper | February 6, 2020

Industrial cyber security has been a topic of much debate over the last decade. Despite the industry’s widespread acknowledgement of its significance, cyber security in the industry continues to be an elusive subject for many. A huge gap exists in understanding the implications of cyber security; however, the subject has been greatly discussed. Interestingly, the industrial environment is currently passing through a key phase, where the idea of Internet of Things (IoT) is beginning to pervade all areas of industrial operation. This ongoing change is poised to expand the complex security needs in the factories of the future.

Read More
news image

The Right Approach to Zero Trust for IoT Devices

whitePaper | May 18, 2022

Networking and security teams have historically relied on protections at the network perimeter to secure the entire enterprise. The internal network was deemed trusted and secure. While everything outside was considered “dirty,” everything on the internal network was considered “clean,” and application traffic would flow unrestricted. However, recent and developing shifts in enterprise working models are having a far-reaching effect on the traditionally managed network perimeter for security.

Read More

Spotlight

ATIM Radiocommunications

ATIM conçoit les systèmes de communication sans fil ARM "Advanced Radio Modem" et ACW, la technologie révolutionnaire "Atim Cloud Wireless" utilisant le nouveau réseau révolutionnaire Sigfox.

Events