APAC CIO Outlook
  • Home
  • CXO Insights
  • CIO Views
  • News
  • Conferences
  • Newsletter
  • Whitepapers
  • About us
Apac
  • Admired Tech

    Agile

    AI Healthcare

    Artificial Intelligence

    Augmented Reality

    Aviation

    Big Data

    Blockchain

    Cloud

    Cryptocurrency

    Cyber Security

    Digital Transformation

    Drone

    HPC

    Infrared

    Internet of Things

    Networking

    PropTech

    Remote Work

    Scheduling Software

    Simulation

    Startup

    Storage

    Wireless

  • Banking

    E-Commerce

    Education

    FinTech

    Food and Beverages

    Healthcare

    Insurance

    Legal

    Manufacturing

    Pharma and Life Science

    Retail

    Travel and Hospitality

  • Atlassian

    CISCO

    Microsoft

    Oracle

    Salesforce

    SAP

    ServiceNow

  • Business Intelligence

    CEM

    Cloud-based Planning

    Cognitive

    Compliance

    Contact Center

    Contact Tracing

    Contactless Payments

    Content Management System

    Corporate Finance

    CRM

    Custom Software Development

    Data Center

    Enterprise Architecture

    Enterprise Communications

    Enterprise Contract Management

    ERP

    Field Service

    HR Technology

    IT Service Management

    Managed Services

    Procurement

    Product Management

    RegTech

    Revenue Management

    Sales Tech

Menu
    • Unified Communication
    • Augmented Reality
    • Agile
    • Cognitive
    • Cyber Security
    • Digital Transformation
    • Atlassian
    • E-Commerce
    • Managed Services
    • RegTech
    • CISCO
    • Blockchain
    • IoT
    • MORE
    #

    Apac CIO Outlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIO Outlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Unified Communication
    Editor's Pick (1 - 4 of 8)
    left
    Taming the flow monster in real-time payments

    Bhupendra Warathe, Chief Information Officer (Corporate and Institutional Banking, Information Technology and Operations)

    Benefits in Unifying Business Communications

    Liam Mallett, CIO, Kings Group

    Innovation-Operations- Transformation - The New IOT Challenge of CIO

    Chin Seng Teo, Global CIO & SVP Global Information Systems, DP World

    Changing Face of Unified Communications from the 80's to Now

    Darshan Appayanna, CIO, Happiest Minds Technologies

    IntelligenceBank Digital Asset Management: Managing the Marketing Process, Easier

    CEO, Intelligence Bank

    ZWCAD Software Co., Ltd. : Integrated CAD/CAM Solution Provider

    CEO, ZWSOFT

    Distributed Ledger Tech for Public Good?

    Steven Koh, Director, Agile Consultancy & Engineering, Government Digital Services (GDS), GovTech Singapore

    Video Conferencing Technology is Transforming Students Learning Experiences

    Minhaj Zia, VP Sales for Polycom in South East Asia, India & SAARC

    right

    Prepare for the 5G revolution

    By Sashidhar Thothadri, SVP, Mobile Services & IoT of Gemalto

    Tweet
    content-image

    Sashidhar Thothadri, SVP, Mobile Services & IoT of Gemalto

    Are you prepared for 5G—the next big thing in mobile network standards?

    • Increased bandwidth? Check!

    • Faster download speeds? Check!

    • Instant response? Check!

    • Shaping the future of connectivity? Yes indeed!

    Set to launch in 2020, 5G is rewriting the rules on how mobile connectivity will be delivered. 5G will create the foundation for a truly IoT-enabled world: smart cities, autonomous vehicles, automated appliances, and a plethora of similarly groundbreaking concepts. The perception of speed, instantaneous response time and performance for IoT will become a reality thanks to 5G. We’re talking about a revolution, not an evolution.

    However, with opportunity comes risk. The advent of 5G raises profound security questions. According to a recent Ericsson report, 8 out of 10 respondents mentioned “concerns around data security and privacy” as a barrier to 5G adoption. Therefore, to unleash its potential, stakeholders must put in place new strategies to protect us from the increasingly sophisticated threats posed by cybercrimes.

    In June 2018, the 3GPP has approved the first standalone 5G network standard after 34 months of work and discussions with stakeholders, including operators, device manufacturers, chipset vendors and Internet companies. Beyond that, 2019 will see the release of the first 5G-compatible smartphones, along with 5G mobile network deployments. By late 2019 or early 2020, operator adoption of the new standard is predicted to be on a steep upward curve.

    Redesigning the mobile network

    GSMA’s latest Mobile Economy report estimates that Asia Pacific will hit 675 million 5G connections in seven years, putting it on track to be the world’s largest 5G region by 2025. But this rapid deployment will be driven not just by 5G’s eye-catching performance figures, but by how they are achieved.

    In contrast to earlier generations, 5G is very much an open platform. It fuses together an array of different wireless technologies. It also dispenses with the traditional centralized approach, where a mass of data is stored in servers that are far removed from the end user. In its place, 5G employs a highly decentralized, distributed model. Moreover, it leverages so-called virtualized networks, enabling distributed, cloud-based software to do the job currently performed by hardware.

    So whilst enthusiasm for 5G’s new network DNA is perfectly understandable, stakeholders must bear in mind that this creates a radically different security landscape

    Overall, 5G allows both data and apps to be hosted far closer to end users—at the very edge of the network rather than buried at its heart.

    More flexible, more scalable, more efficient

    But what does this mean in practice? In addition to boosting the sheer speed and responsiveness of our everyday connectivity experience, 5G serves up dramatic improvements in the flexibility, scalability, and efficiency available to service providers. This is an important asset for mobile operators faced with falling revenues on one hand, and seemingly inexorable growth in demand for bandwidth on the other. By virtualizing, decentralizing and diversifying their approach to network provision, operators can realize both reduced overheads and enhanced customer service.

    From data hungry consumers to IoT pioneers

    When seeking a rapid return on their 5G investments, most mobile operators will initially concentrate on satisfying and improving the user experience for data hungry subscribers. However, in the longer term, the most exciting commercial opportunities will come from ‘enterprise verticals’—progressive companies operating within sectors as diverse as automotive, transport, the utilities and healthcare—which are already turning the IoT from a hard-to-define concept into day-to-day reality for millions of citizens.

    More potential for weak links

    5G is a genuinely thrilling prospect, and also one which poses some serious questions. Realizing the vision will require complex collaboration between a diverse array of stakeholders, including telcos, cloud and infrastructure vendors, network software vendors, and industry verticals. There could also be a price to pay for the advent of truly ubiquitous connectivity.

    By distributing data, apps and functionality throughout the network, 5G will also increase the so-called attack surface available to the malevolent forces that reside throughout the cyberspace. Every single device, connection, and application within the IoT environment represents a potential entry point for hackers. All it takes is one weak link to endanger an entire system. What’s more, we’re already seeing plenty of evidence of the risks involved—not least in the Mirai botnet attacks of 2016, which targeted the multitude of IoT devices that still retained their vulnerable default, non-unique security settings.

    Get ready for a new security landscape

    With breaches making headlines with increasing regularity, it is apparent just how important trust is for any sustainable digital ecosystem. So whilst enthusiasm for 5G’s new network DNA is perfectly understandable, stakeholders must bear in mind that this creates a radically different security landscape. Consequently, they must ensure that robust protection is built in from the outset of every project, not bolted on at a later stage—or even ignored completely. What’s more, a ground-up approach is essential, starting with the processor and maintained at every level beyond that.

    However, for all those committed to creating a safe, stable, and trusted 5G future, the good news is that the tools necessary to achieving it are readily available. Stakeholders from different regions and countries are working together to finalize the standard for strong mutual authentication for 5G networks. In Asia, mobile operators are planning to launch their 5G services in the next few years. Notable markets like Australia, China, Japan and South Korea are even looking to kickstart their 5G deployment plans starting this year.
    tag

    IoT

    Data Security

    Weekly Brief

    loading
    Top 10 Unified Communication Solution Companies - 2018

    Featured Vendors

    Converged Communication Network Applications

    Craig Sims, Operation Director

    Bluejeans Network

    Mike Mansbach, President

    ON THE DECK

    Compliance 2021

    Top Vendors

    IT Service Management 2021

    Top Vendors

    Previous Next

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Blockchain: The answer to solve the perennial issues in the Telecom Industry

    Blockchain: The answer to solve the perennial issues in the Telecom Industry

    Neeti Virmani, Venture Partner, Loyal VC
    Self Service: An important slice of the digital transformation pie

    Self Service: An important slice of the digital transformation pie

    Christopher Douglas, Director Member Services Pacific, Accor Plus
    Leveraging POS Systems to Enhance Customer Experiences in Retail

    Leveraging POS Systems to Enhance Customer Experiences in Retail

    Bernie Winter, Director of Point-of-Sale Systems, and Mike Metz, Vice President of Information Technology, Tops Friendly Markets
    How can HR technology help us in our new environments?

    How can HR technology help us in our new environments?

    Claire Tobijanski, Group HR Director, Survitec
    Relevance of Generalists vs Specialists in Enterprise Security Management

    Relevance of Generalists vs Specialists in Enterprise Security Management

    Vishwanath Nair, Head of Information Security and Risk, Western Sydney Local Health District
    Cyber Risk Strategy and the Evolving Role of the CISO

    Cyber Risk Strategy and the Evolving Role of the CISO

    Richard Harrison, Chief Information Security Officer, healthAlliance
    Improve Service - Know your business to increase value

    Improve Service - Know your business to increase value

    Paul Norton, Group Chief Technology Officer, OneSavings Bank
    Using IT Budgets To Drive Strategic Outcomes

    Using IT Budgets To Drive Strategic Outcomes

    Eric Hanson, Vice President Information Technology, HUSCO
    Loading...

    Copyright © 2021 APAC CIOoutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    |  Sitemap |  Subscribe

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://unified-communication.apacciooutlook.com/cxoinsights/prepare-for-the-5g-revolution-nwid-5763.html