Boldyn noted that private 5G network needs to prevent unauthorized users/devices to limit the risk of any data leakage

Private 5G networks offer significant security advantages over public networks for industrial applications, Janne Isosaari, senior director of operations for private networks Europe at Boldyn Networks said, adding that industrial facilities can deploy reliable private 5G networks that safeguard their critical operations and sensitive data.

ā€œPrivate networks are deployed for exclusive use by an enterprise or campus, allowing only authorized users and devices to connect to the network. For private networks, data is encrypted and stored locally with limited access. It prevents leakage of data. The privacy/security is assured via private APNs,ā€ said Isosaari.

ā€œJamming, the inevitable disruption of wireless signals, remains a potential threat. However, the closed nature of private networks, working on a dedicated spectrum, makes them less susceptible compared to other wireless network solutions,ā€ the executive added.

The Boldyn executive also explained that industrial interconnectedness, driven by Industry 4.0 technology advancements, requires a constant and reliable network connection to minimize downtime from lagging. ā€œTo achieve this, securing this complex environment requires a team of experts who not only understand cybersecurity concerns but can also maintain optimal network performance. The network needs to prevent unauthorized users/devices to limit the risk of any data leakage.ā€

Commenting about the strategies that companies should adopt in order to enhance the security of private 5G networks in industrial environments, Isosaari said that while private 5G networks offer inherent security advantages due to their dedicated nature, itā€™s crucial to go beyond that and implement additional security measures following ISO27001 recommendations. ā€œTreating private 4G/5G networks just like any other enterprise network is another key point. This means applying the same security protocols and access controls used for other network systems. This consistency simplifies security management and reduces the risk of introducing vulnerabilities,ā€ the executive said.

Isosaari went on to say that the growth in IoT devices creates a complex security challenge for enterprises, as many IoT devices often lack robust security features, making them easy targets for attackers. ā€œMoreover, patching vulnerabilities across all these devices can be a slow and heavy-labor process. IoT device ecosystem requires careful management to ensure end-to-end security,ā€ Isosaari added.

The executive highlighted that private networks can significantly mitigate these threats as they allow for a central system to manage and authorize all devices, ensuring only those approved can access the network and its controls. ā€œAdditionally, private networks enable secure communication by encrypting all data flowing between devices, protecting sensitive information from unauthorized users/devices.ā€

When asked about the differences in the security implications in a scenario where the private network is on-prem core and RAN versos on-prem RAN, public core, the executive stated that on-prem core and RAN provide more control over data privacy and also usage statistics. ā€œSince both core and RAN are within the infrastructure, the customers will have more control over user data and how itā€™s handled. This allows stricter access control and encryption policies,ā€ the executive said.

ā€œWhile on-prem core offers more control over data privacy, itā€™s not the only factor. Security implications depend on the overall network design and security practices,ā€ he added.

Original article can be seen at: