Search Results For: Security

resources

Security Edge Protection Proxy (SEPP)

The Security Edge Protection Proxy (SEPP) is an essential 5G Core Network Function that provides protection for signaling exchange between roaming Mobile Network Operators (MNOs) at the 5G interconnect control plane level.

resources

Evolving 5G Security for the Cloud

Download this 5G Americas white paper, “Evolving 5G Security for the Cloud,” that covers security threats, vulnerabilities, and mitigations for deployments of 5G cloud infrastructures as new services and use cases are developed.

press-releases

Mavenir’s Cloud-Native Open vRAN and Packet Core Achieves GSMA NESAS Security Certification

Mavenir is the 6th global mobile network provider to receive accreditation, joining vendors including Nokia, Ericsson, and Samsung to have undergone an assessment and independent audit of their development and product lifecycle processes to evidence how security is integrated into their design, development, implementation, and maintenance processes.

post

Key Security Differentiators in Open RAN

Open interfaces defined in the O-RAN technical specifications provide increased independent visibility and the opportunity for an overall enhanced and more secure system.

post

Open RAN Security Based on Zero Trust Architecture

A zero trust architecture (ZTA) is a cybersecurity architecture that is based on zero trust principles and designed to prevent data breaches and limit internal lateral movement. Support of a zero-trust architecture requires each O-RAN component to comply with established functionalities and protections. O-RAN Alliance [6] has identified several guiding principles.

resources

Security in Open RAN

Despite misconceptions, open interfaces, defined in the O-RAN technical specifications, provide increased independent visibility and the opportunity for an overall enhanced and more secure system.