APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Unified Communication
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 of 8)
    left
    Taming the flow monster in real-time payments

    Bhupendra Warathe, Chief Information Officer (Corporate and Institutional Banking, Information Technology and Operations)

    Benefits in Unifying Business Communications

    Liam Mallett, CIO, Kings Group

    Innovation-Operations- Transformation - The New IOT Challenge of CIO

    Chin Seng Teo, Global CIO & SVP Global Information Systems, DP World

    Changing Face of Unified Communications from the 80's to Now

    Darshan Appayanna, CIO, Happiest Minds Technologies

    IntelligenceBank Digital Asset Management: Managing the Marketing Process, Easier

    CEO, Intelligence Bank

    ZWCAD Software Co., Ltd. : Integrated CAD/CAM Solution Provider

    CEO, ZWSOFT

    SIPEF

    Daniel Suraboyini, Head Global Chief Information Officer, Information Technology, SIPEF

    The Ever-Changing Landscape of Hospitality Industry

    Virgil Michael, IT Director, Hoiana Resort & Golf

    right

    Prepare for the 5G revolution

    Sashidhar Thothadri, SVP, Mobile Services & IoT of Gemalto

    Tweet
    content-image

    Sashidhar Thothadri, SVP, Mobile Services & IoT of Gemalto

    Are you prepared for 5G—the next big thing in mobile network standards?

    • Increased bandwidth? Check!

    • Faster download speeds? Check!

    • Instant response? Check!

    • Shaping the future of connectivity? Yes indeed!

    Set to launch in 2020, 5G is rewriting the rules on how mobile connectivity will be delivered. 5G will create the foundation for a truly IoT-enabled world: smart cities, autonomous vehicles, automated appliances, and a plethora of similarly groundbreaking concepts. The perception of speed, instantaneous response time and performance for IoT will become a reality thanks to 5G. We’re talking about a revolution, not an evolution.

    However, with opportunity comes risk. The advent of 5G raises profound security questions. According to a recent Ericsson report, 8 out of 10 respondents mentioned “concerns around data security and privacy” as a barrier to 5G adoption. Therefore, to unleash its potential, stakeholders must put in place new strategies to protect us from the increasingly sophisticated threats posed by cybercrimes.

    In June 2018, the 3GPP has approved the first standalone 5G network standard after 34 months of work and discussions with stakeholders, including operators, device manufacturers, chipset vendors and Internet companies. Beyond that, 2019 will see the release of the first 5G-compatible smartphones, along with 5G mobile network deployments. By late 2019 or early 2020, operator adoption of the new standard is predicted to be on a steep upward curve.

    Redesigning the mobile network

    GSMA’s latest Mobile Economy report estimates that Asia Pacific will hit 675 million 5G connections in seven years, putting it on track to be the world’s largest 5G region by 2025. But this rapid deployment will be driven not just by 5G’s eye-catching performance figures, but by how they are achieved.

    In contrast to earlier generations, 5G is very much an open platform. It fuses together an array of different wireless technologies. It also dispenses with the traditional centralized approach, where a mass of data is stored in servers that are far removed from the end user. In its place, 5G employs a highly decentralized, distributed model. Moreover, it leverages so-called virtualized networks, enabling distributed, cloud-based software to do the job currently performed by hardware.

    So whilst enthusiasm for 5G’s new network DNA is perfectly understandable, stakeholders must bear in mind that this creates a radically different security landscape

    Overall, 5G allows both data and apps to be hosted far closer to end users—at the very edge of the network rather than buried at its heart.

    More flexible, more scalable, more efficient

    But what does this mean in practice? In addition to boosting the sheer speed and responsiveness of our everyday connectivity experience, 5G serves up dramatic improvements in the flexibility, scalability, and efficiency available to service providers. This is an important asset for mobile operators faced with falling revenues on one hand, and seemingly inexorable growth in demand for bandwidth on the other. By virtualizing, decentralizing and diversifying their approach to network provision, operators can realize both reduced overheads and enhanced customer service.

    From data hungry consumers to IoT pioneers

    When seeking a rapid return on their 5G investments, most mobile operators will initially concentrate on satisfying and improving the user experience for data hungry subscribers. However, in the longer term, the most exciting commercial opportunities will come from ‘enterprise verticals’—progressive companies operating within sectors as diverse as automotive, transport, the utilities and healthcare—which are already turning the IoT from a hard-to-define concept into day-to-day reality for millions of citizens.

    More potential for weak links

    5G is a genuinely thrilling prospect, and also one which poses some serious questions. Realizing the vision will require complex collaboration between a diverse array of stakeholders, including telcos, cloud and infrastructure vendors, network software vendors, and industry verticals. There could also be a price to pay for the advent of truly ubiquitous connectivity.

    By distributing data, apps and functionality throughout the network, 5G will also increase the so-called attack surface available to the malevolent forces that reside throughout the cyberspace. Every single device, connection, and application within the IoT environment represents a potential entry point for hackers. All it takes is one weak link to endanger an entire system. What’s more, we’re already seeing plenty of evidence of the risks involved—not least in the Mirai botnet attacks of 2016, which targeted the multitude of IoT devices that still retained their vulnerable default, non-unique security settings.

    Get ready for a new security landscape

    With breaches making headlines with increasing regularity, it is apparent just how important trust is for any sustainable digital ecosystem. So whilst enthusiasm for 5G’s new network DNA is perfectly understandable, stakeholders must bear in mind that this creates a radically different security landscape. Consequently, they must ensure that robust protection is built in from the outset of every project, not bolted on at a later stage—or even ignored completely. What’s more, a ground-up approach is essential, starting with the processor and maintained at every level beyond that.

    However, for all those committed to creating a safe, stable, and trusted 5G future, the good news is that the tools necessary to achieving it are readily available. Stakeholders from different regions and countries are working together to finalize the standard for strong mutual authentication for 5G networks. In Asia, mobile operators are planning to launch their 5G services in the next few years. Notable markets like Australia, China, Japan and South Korea are even looking to kickstart their 5G deployment plans starting this year.
    tag

    IoT

    Data Security

    Weekly Brief

    loading
    Top 10 Unified Communication Solution Companies - 2018
    ON THE DECK

    Unified Communication 2018

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Cultivating a Sustainable Future through Collaboration

    Cultivating a Sustainable Future through Collaboration

    Jiunn Shih, Chief Marketing, Innovation & Sustainability Officer, Zespri International
    Mastering Digital Marketing Strategies

    Mastering Digital Marketing Strategies

    Tasya Aulia, Director of Marketing and Communications, Meliá Hotels International
    Building a Strong Collaborative Framework for Artificial Intelligence

    Building a Strong Collaborative Framework for Artificial Intelligence

    Boon Siew Han, Regional Head of Humanoid Component Business & R&D (Apac & Greater China), Schaeffler
    From Legacy to Agility Through Digital Transformation

    From Legacy to Agility Through Digital Transformation

    Athikom Kanchanavibhu, EVP, Digital & Technology Transformation, Mitr Phol Group
    Change Management for Clinical Ancillary Teams: Aligning Practice with Policy and Progress

    Change Management for Clinical Ancillary Teams: Aligning Practice with Policy and Progress

    Ts. Dr. James Chong, Chief Executive Officer, Columbia Asia Hospital – Tebrau
    Digital Transformation: A Journey Beyond Technology

    Digital Transformation: A Journey Beyond Technology

    John Ang, Group CTO, EtonHouse International Education Group
    Building A Strong Data Foundation: The Key To Successful Ai Integration In Business

    Building A Strong Data Foundation: The Key To Successful Ai Integration In Business

    Richa Arora, Senior Director Of Data Governance, Cbre
    Transforming Tollways Through People, Data and Digital Vision

    Transforming Tollways Through People, Data and Digital Vision

    Carlo Cagalingan, Chief Digital Officer and Chief Information Officer, Metro Pacific Tollways Corporation
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://unified-communication.apacciooutlook.com/cxoinsights/prepare-for-the-5g-revolution-nwid-5763.html?utm_source=google&utm_campaign=apacciooutlook_topslider