Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
(00:00):
With the huge growth of 5G and telecom, how can organizations
manage security for this important technology?
We're taking a deep dive with a world leading expert, Anand
Oswald, who is Senior Vice President and General Manager of
Network Security for Palo Alto Networks.
It's exciting to see all the momentum of 5G technologies in
(00:22):
transforming industries. They unlock opportunities for
mobile broadband, for video streaming.
And today 5G is allowing businesses to integrate more
connected devices. And as you connect more, you can
see, control and automate more. But the real exciting trend I'm
seeing is the convergence of technologies that are coming
(00:42):
together to supercharge 5G digital transformation across
most of our critical infrastructure, industrial
businesses and in governments. 5G is truly coming of age at the
same time as AI, and as these technologies converge, you get
5G connected nearly everything at lightning fast speeds and AI
(01:05):
is embedding intelligence into it.
When AI gives 5G the potential to predict issues and optimize
itself in real time, you have the recipe for business
transformation at a scale that we have not seen before.
At the same time, we also have IT and OT coming together,
creating new opportunities for efficiency, for productivity and
(01:28):
agility. Being traditionally siloed
systems, with the rise in 5G demand and access to more and
more IoT, users are getting their important work done from
anywhere using connected devices.
Together, this is driving a transformation that will create
profound ships in how businessesand industries operate.
(01:52):
And you're right in the middle of it.
And on 5G is exploding. Why is security so complex when
it comes to 5G? 5G is an incredibly amazing
technology. We think of the evolution of the
G networks. We are analog with 1G and you
have digital with 2G and you have 3G with 4G.
Got you more data. 5G is all about this high speed data, low
(02:14):
latency. Now, 5G is a lot of inbuilt
technologies for security, user authentication, encryption and
so on and so forth. But those are not enough.
You need to be able to see what's happening within your 5G
traffic because tests are getting more and more
sophisticated. It's important to ensure that we
protect across all layers. It's your signaling layer, it's
(02:36):
your application layer, your data layer, your management
layer, etcetera. All locations, right across
edge, core, cloud, data centre, everywhere.
And that is very critical. As 5G evolves, we are working on
securing the 5G infrastructure and as people build private 5G
networks to not only protect that infrastructure, but also by
(02:57):
the right level of visibility, segmentation and tech detection
capabilities. Can you give me some examples of
how these technologies are converging to drive business
transformation? This digital transformation will
happen in areas that affect our daily lives the most important
things like energy, utilities, transportation, oil and gas, and
(03:21):
telcos. Let me give you a few examples
of disenaction. I recently met with a
telecommunications company who has been combining AI with 5G to
build smart 5G networks. Now, these networks are not only
blazing fast, but they're also adaptive.
They use machine learning algorithm to continuously
analyze network performance, build traffic, and optimize so
(03:44):
they can offer customers the best possible connectivity.
I recently also met a chemical manufacturer that was using
private 5G that connects different devices like sensors
to monitor temperature and chemical composition to ensure
the process remains safe and stable.
Operators can then monitor and control machinery virtually from
(04:07):
almost anywhere with real time data.
They're able to optimize operations across the board,
automating dangerous tasks, analyzing data, and even
predicting upcoming maintenance windows.
This has led to a decrease in human intervention, increase in
safety and better operational efficiencies, giving them a
(04:29):
competitive edge. And last, Michael, one of our
customers, the local government,they were tasked with updating
their entire aging critical infrastructure.
They were concerned that legacy technology was increasing their
risk of attacks by nation state Ted actors and were also
inspired by their vision of whattheir community could do with
(04:50):
the help of smart solutions. Let me also give you an example
of a remote access solution. A global oil and gas exploration
and production company with offices and remote locations
decided to centralized it's entire SCADA system.
Instead of maintaining a dedicated server at each remote
office, the company choose to consolidate with a single SCADA
(05:11):
server located at their data center.
This new approach requires a secure private 5G network
connecting OT sensors, pumps andother devices across this entire
vast network, while ensuring secure connectivity to the
centralized data centre for all the remote operations.
(05:33):
By integrating 5G, AIIT and OT into your infrastructure,
communities and countries aroundthe world can connect
everything, including autonomouscars, transportation,
supermarkets, shipping ports, manufacturing plants, farms,
water systems, and so on. What are the most pressing
(05:54):
security threats and attack vectors in relation to 5G?
This bright future of digital transformation and opportunities
associated with that comes with risks.
The convergence of these technologies increase new attack
vectors that we have to be awareof and protect against.
(06:15):
Now, I don't need to tell you that as more and more devices
get connected to the network, itincreases the attack surface.
And you don't need to be a Cybercity professional to see how the
high speed data transfer capabilities of 5G can help
cyber criminals infiltrate largevolumes of data quickly.
The threat landscape continues to increase both in scale in
(06:36):
sophistication and speed. AI is having a compounding
effect on all of these. So today we are we are seeing
over 30 billion attacks that we are able to block on our
platform every single day. More and more of these attacks
are net new attacks that nobody has ever seen before.
And we're telling every organization to assume that at
some point of time they will be in the attack with the scale and
(07:00):
sophistication of nation state attacks, and they have to
prepare for those days. But this can be solved.
We think of security holistically when it's not an
afterthought. There's a lot of discussion
about public and private 5G networks from a security
perspective. What are the differences between
(07:21):
them? The 5G standard itself has some
excellent security capabilities baked into it for user
authentication, user privacy forthe over the air traffic and
traffic encryption and some protection for signalling
traffic. These are very important, but
not designed for seeing and stopping the advanced tests
(07:41):
within the mobile traffic itself.
And it's definitely not enough for your enterprises, for your
governments and industrial businesses.
Now if you think of public 5G networks, the key thing that we
want to do is protect the infrastructure of the service
providers across all locations, all vectors.
And 2nd, ensure the users who connect to this 5G networks are
(08:03):
fully protected. Now when we come to private 5G
networks, these networks are usually flat layer 2 networks.
You need to 1st, have full visibility into what the network
is and ensure that we are able to provide the light level of
segmentation, the right level ofcapabilities to be able to
isolate any threats that we see and provide good connectivity
(08:24):
between what we are seeing on the IT side and what we are
seeing on the OT side. So these threats vary across
public and private 5G networks. For organizations just starting
their 5G journey, is there a keypiece of advice for them to
build security into their strategy from the ground up?
(08:45):
Absolutely. Here's how I think about
securing 5G to the enterprise grade level.
First, get ready. The sophistication of attacks is
going in scale and speed. The question isn't when you'll
be attacked, it's Are you ready for it?
Understand the potential risks and the failure points in your
(09:05):
5G network and create a plan of how you can protect against
doses. Now that you have an idea of
these potential risks, think about how you can identify if
and when an attack happens. So come down to zero trust.
First and foremost, it's most important to implement a zero
trust approach to securing your 5G infrastructure.
(09:28):
This means continuously validating your users, your
devices, the applications and sessions at every stage of the
digital interaction and ensuringthat you have full visibility
into the applications, the services and the test present on
your 5G network. Second, secure all layers.
(09:48):
The signalling layer, the application layer, the data
layer, the management layer. Secure all locations across all
facets of your 5G network. Most CD solutions only protects
you on layer 3 and layer 4, but what about the test that you're
seeing on the application side? Evasive attacks require
visibility and advanced securityacross all 5G devices, networks
(10:11):
and services everywhere. On premises, edge, core,
perimeter, roaming and cloud. You have to secure all layers of
a network and all the places. When an attack may occur across
every single threat vector anyway, you might be exposed.
And by the way, a common mistakeI see is people only thinking
(10:32):
about security. One step part has gone live.
Big mistake. You should be building this from
the get go with security in mind, testing it in a
development phase before it goeslive in containerized
environments and again at runtime.
Next, Michael, we have to fight AI.
With AI, you need protections against all possible attacks,
(10:54):
known and unknown, across all vulnerabilities, which are
growing thanks to the help of AI.
The good news is defenders can leverage a IS capabilities to
enhance these measures while ensuring that the 5G
infrastructure is fortified against threats.
Organizations can embrace new innovative technologies like
(11:15):
precision AI to more proactivelyand effectively safeguard their
network. Next, simplify security.
The typical organizations juggles between variety of
different solutions and vendors.This creates inconsistent
policies. Security teams are overwhelmed
with how how all of this can challenge their operations, give
(11:39):
them inconsistent policy and inconsistent views of their
entire infrastructure. ANAD as more companies leaned
into 5G network adoption, is there a role for Sassy as a
security architecture? Secure Access Service Edge SAS
EE is an approach to security that brings every device and
(12:02):
service on the network together securely.
So you can ensure your company is protected no matter where
your workforce is located, what device they're using, so that
they get access to the right data, the right SAS
applications, the right private applications that they need to
do their jobs effectively and safely.
For 5G networks, this is relevant because they are test
(12:24):
impacting the enterprise end users and devices that access
Internet websites that could be malicious.
They are accessing SaaS applications, they are accessing
genuine applications when connected over the public 5G
network. This is because with public 5G,
enterprise admins do not have any visibility and control of
(12:45):
these devices as they are not onthe enterprise network, they are
on the public 5G network. As a result, although these
devices are carried in and all the enterprise, the enterprise
security team has no way to control them.
So public 5G networks do not organically support connections
into the enterprise network. And that's why we are launching
(13:05):
a new Sassy 5G solution, Prisma.Sassy 5G is built for businesses
that use public 5G connectivity within their enterprise, whether
it is their employees with 5G powered phones or tablets or the
infrastructure like IoT and OT devices or SD Wan devices with
5G connectivity for branch via the network.
(13:29):
It uses the telco provided SIM to authenticate the users and
provide that grander policies across your network.
No matter where you are in the world, no matter which user or
which OTIOT device, whether you're on the wireless 5G
network or the wired network, you can get consistent policy,
(13:50):
you can get full visibility across the network, and you can
prevent attacks all through a single pane of glass.
Our customers will also be excited about how this enables
data sovereignty with options toconfigure your security
processing regions, locations and log storage to stay in the
(14:11):
location that you have specified.
Telecommunications service providers should be especially
excited about this because it gives them a new opportunity to
provide security to the enterprise customers as a value
added service and they can quickly integrate this into the
existing network with fast and fictitious integration Through a
(14:31):
cloud delivered solution, you'llhelp enterprises secure their
data, users and applications without needing to redesign your
network. Get a little technical with me.
Can you explain how this works? When a 5G user or a 5G device
connects with a 5G network, it goes through a telcos
(14:52):
authentication process. As part of that process, the
authentication details like the MZ and IMEI are securely
communicated to Prisma Access, which uses this information to
then uniquely identify the user or the device.
Next we can apply granular per user or per device policies.
(15:14):
When the 5G user or device starts Internet browsing on the
phone or uses an app, the traffic is securely transported
to Prism Access. This is achieved or pre
established dynamically scalablehigh bandwidth cross connects
between the service provider's 5G network and Prismax
infrastructure. Prism Access does secret
(15:35):
inspection security enforcement of the traffic to protect the
user from threats and vulnerabilities.
If and when the 5G user connectsonto the Wi-Fi network, Prismax
can also apply the same consistent policies for security
for that user based on the user's enterprise identity.
(15:56):
This gives the telco service provider and the enterprise
admin comprehensive visibility of the 5G users and apply the
security policies and the enforcement of security for 5G
devices based on the 5G identifiers which the enterprise
admins don't have today. Effectively Michael, what this
(16:17):
does it is secures 5G users and devices when they access the
Internet, SAS or private data centre applications, whether
they are on the 5G network or inthe corporate Wi-Fi wired
network, giving them the best consistent security against all
the threats. You're doing a lot with 5G.
(16:38):
Are there other things you're working on that you'd like to
tell us about? A 5G native security platform
secures 5G devices, networks andservices everywhere, including
on premise, edge, core, perimeter, the roaming interface
and cloud with a unified networkcity platform.
(16:58):
It gives comprehensive visibility, sickly policies
based on 5G specific identifiersand protects against advanced
threats including day zero attacks using position AI.
And it has a few components. First, our next generation
firewalls, which are advanced protectors for 5G network
traffic going deep. Look to find anything hiding the
(17:21):
traffic, detecting threats, malware or ransomware, blocking
inclusions in real time, and offering controls to ensure the
right admins had the right levelof access to the right data.
NGF WS ensure that malicious trafficker attacks don't sneak
in even when billions of devicesare connecting and talking to
(17:42):
each other. Second, software firewalls,
which are next generation firewalls that run as
virtualized or containerized instances in public and private
cloud or as a service natively in the cloud environment.
They include all the capabilities of hardware in GFW
but can be deployed programmatically with standard
orchestration tools for infrastructure as code.
(18:05):
This flexibility makes software firewalls protect to secure 5G
cloud native network functions and value added services or even
to be offered as a service for subscribers.
Our cloud delivered security solution or CDSS safeguards and
organizations network security end to end with the power of
precision AI. These best of breed security
(18:28):
subscriptions detect and block new and unknown malware, guard
against DNS attacks, or prevent lateral threat movements of
managed IT and unmanaged IoT devices while stopping zero day
threats from entering into your network.
There's also Cortex Cloud which protects your 5G native
(18:48):
environments with the real time security from code to cloud to
SoC. Using Cloud Runtime Security,
you can stop modern attacks against your cloud native 5G
deployments with real time prevention, lightning fast
response and significantly more and efficient security
operations. And of course, our newest
(19:08):
offering are Sassy 5G solution that allows service providers to
use our industry leading Sassy offering to support enterprises
deploying 5G networks by ensuring workers get secure
access to write data and missioncritical applications they need
to get their work done for any device, any location.
(19:29):
It features advanced AI power solutions to protect users from
malicious websites and content, prevent unauthorized access or
threats, deliver fine grained policy enforcement and detect
those anomalous behaviours and potential threats in real time.
And finally, they have an extensive private 5G ecosystem
(19:51):
of partnerships for organizations for a quick look
to 5G adoption. By partnering with a trusted
vendor, you can aim to simplify the process and better ensure
that your company's 5G deployment protects against
issues like data leakage and complies with all the relevant
laws and regulation. You have a lot going on with 5G.
(20:13):
Any final thoughts? It's a very exciting time in the
world of 5G, Michael. Yes, today's digital
transformation will affect businesses across sectors and
geographies. As these emerging technologies
continue to intersect, they willdrive more competitiveness for
the business leaders who embracethem.
But in order to realize this potential, cyber security must
(20:38):
be the forefront of business planning.
It cannot be an afterthought because the potential for
digital transformation will provide us with an abundant
future that's faster, that's optimised and more secure.
And as the convergence of 5G andAI and IT and OT continues, the
combined potential to drive digital transformation across
(21:00):
industries. But there's telecommunications,
manufacturing, oil and gas, healthcare, retail.
This will become more pronouncedwith the future that's faster,
the future that's more connected, and a future that is
more secure. Anon, thanks so much.
It's great to see you again to talk about 5G.
Thank you, Michael. Appreciate it.