NEWSBYTE Reading-based cybersecurity firm A10 Networks has unveiled a new firewall product to help service providers secure their 5G and IoT deployments.
The company has released a new version of its Thunder Convergent Firewall (CFW) Gi/SGi, claiming the product addresses the rising security concerns of service providers – specifically network and DDoS attacks that may arise from a variety of intrusion points.
Securing IoT networks
With the new offering, companies can fend off cyber attacks launched by ‘weaponised’ IoT devices and smartphones, according to A10 Networks, as well as those that come from GiLAN and roaming partner networks.
Users can combine the Thunder CFW with the GPRS Tunnelling Protocol (GTP) and granular Stream Control Transport Protocol (SCTP) to enable improved inspection and filtering abilities.
The Thunder CFW comes with a range of regulatory compliance, Web access control, and service monetisation options too, which draw on products such as A10’s Threat Intelligence Service and URL Classification Service.
The product uses advanced Layer 4-7 systems – including CGNAT, stateful firewall and application visibility – to enable streamlined management, smaller operational overheads, and reduced latency.
Real security dangers
Chris Gilmour, technical practice lead of secure carrier specialist Axians, believes that while 5G will accelerate IoT deployments, security risks will undoubtedly grow.
“The arrival of 5G will enable a ubiquitous framework that will allow IoT to really take off, both in terms of the business benefits that can be leveraged, but also in the potential risk that businesses could be exposed to,” he said.
“As 5G connectivity will enable a whole host of higher-bandwidth IoT devices, for businesses it’s about building security in to the infrastructure from the outset and not as a mere bolt-on.
“The IoT is only as secure as you make it. In today’s market, you cannot rely on manufacturers to produce a network-controlled device with security at the forefront.
“It is therefore up to the business to ensure these devices – which are essentially remote controls for the world to operate – are secure and remain accessible by authorised personnel and devices only.”
Internet of Business says
A number of recent reports have suggested that IoT security is already lax, with non-expert device manufacturers rushing gadgets to market with basic security flaws built in. Meanwhile, organisations are giving little strategic thought to the unique challenges of IoT security. Factor in 5G and there is every chance that things could get messy.
Standards and specifications will certainly help on the way to securing 5G-based IoT use cases, but in the end it will come down to strategy. Robust cybersecurity must include the network, the device, and the data, taking into account the unique issues that 5G networks bring.
• Read our recent in-depth report on how to secure 5G deployments: