About Us

Nokia Launches New SaaS applications

SIM Secure Connect and AVA Network Data Analytics Function are two new software solutions (SaaS) launched by Nokia for mobile carriers and companies.

The new services, which are focused on security, data, and monetization, build on Nokia’s current SaaS business to enable telecoms service providers (CSPs) and enterprises to increase their value by transitioning to a subscription-based, old-school, cost-effective model.

Nokia’s new SaaS solution, ISIM Secure Connect, allows CSPs and companies to manage eSIM and iSIM-enabled device registrations in a secure and medium-term manner. It also integrates all components of the eSIM / iSIM management process seamlessly, allowing services linked to a reliable digital identification system to be monetized.

The company’s second product combines AI and analytics which is a virtualization and automation (AVA) solution. Nokia AVA Network Data Analytics Function (NWDAF) offers analytics on the network edge, leverages 3GPP compliant analytics services, and promotes software development interactions because of its distributed architecture and open APIs.

To generate greater returns automation of artificial intelligence (AI) and machine learning (ML) helps improve network performance and customer experience.

Regarding commercial releases, Nokia said their AVA NWDAF service would be available later this quarter with a SaaS delivery model. ISIM Secure Connect is scheduled to launch as SaaS later this year. However, other shipping options will continue to be available to customers.

AdaptiveMobile Security announced first unified 5G network security solution to secure mobile networks

AdaptiveMobile Security, the global leader in mobile network security, announced a new trio of interlinked 5G security platforms that enable carriers to secure their 5G infrastructure from both internal and external security threats. This is the first unified 5G network security solution, combining a variety of cybersecurity features to secure 5G networks, vertical APIs, slices and subscribers.

5G networks are likely to be the subject of increasingly sophisticated cyberattacks. The security of 5G networks is an order of magnitude more difficult than that of prior mobile technologies. The attack surface has grown in size, telecom and internet technologies are merging, and attacker tools are becoming more freely available. To prevent nation-state adversaries and criminal groups from using other perceived “trusted” networks to perform missions against an operator’s 5G infrastructure, 5G networks must be secured at the interconnects with other networks and systems installed. Internally, networks must be secured against threat actors compromising rogue slices and new application APIs provided by 5G networks. Internally, networks must be secured against threat actors compromising rogue slices and new application APIs exposed by 5G networks must be secured to avoid the creation of new attack vectors.

“As it currently stands, we do not appear to have learned the security lessons from 3G and 4G. Security in 5G networks is not built-in as promised and major vulnerabilities have been exposed even before the technology has been deployed. 5G network core technologies will be fundamentally insecure, and operators face having to protect their networks from both existing and emerging threats. Attackers already have access to the tools and techniques that are known to be effective, exploiting the IT protocols on which 5G architectures are built. Trust is not a security or a business strategy – governments, regulators, mobile operators, and network equipment vendors must all step up and secure the critical infrastructure of 5G networks. Nation-states and cyber-criminal adversaries will take advantage of any security gaps in mobile networks with catastrophic consequences for nations, networks, enterprises and subscribers,” said Brian Collins, CEO, AdaptiveMobile Security.

AdaptiveMobile Security enables governments, regulators, and mobile operators to understand the nature of new threats, pinpoint global threat actors attacking their network, and prevent internal attacks on network slices by identifying and correlating sources of external and internal attacks on 5G networks and subscribers. Mobile operators can analyze, forecast, and protect against attackers’ methods, intentions, infrastructure, and evolution with the 5G network security solution, which proactively maintains defences against known sources of signalling attacks.

“5G is driving the mobile industry into adopting the technology and techniques of the IT world to increase efficiency and improve functionality. However, while laudable, there needs to be a wider mind-set change. When it comes to securing 5G, the telecoms industry needs to fully embrace a holistic and collaborative approach to secure networks across standards bodies, working groups, operators, and vendors. This new unified approach to 5G network security will be critical in protecting operators’ networks, enterprise customer and subscribers from new and emerging cybersecurity threats,” said Dr. Silke Holtmanns, Head of 5G Security Research, AdaptiveMobile Security.