One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 2084559
Date de publication 2020-12-08 11:00:00 (vue: 2020-12-08 11:05:41)
Titre Just released! AT&T Cybersecurity Insights™ Report: 5G and the Journey to the Edge
Texte We are certainly in unique times, with COVID driving digital transformation at an unprecedented pace, remote work appearing to be long term, and the specter of new threats looming over security professionals as they strategized how to protect a rapidly changing business and tech landscape.  To use perhaps one too many cliches: it is the best of times, it is the worst of times, the times are a changin’, and a change will do you good. No really, it will. The silver lining in all of this is that the transformations enterprises are making today sets the stage for the next generation of compute that will drive business globally — I am talking about 5G and edge computing. Not convinced? Take a peek into the just released AT&T Cybersecurity Insights™ Report: 5G and the Journey to the Edge, which is based on a global survey of 1,000 IT, security, and line-of-business leaders, research from IDC, and dozens of interviews with subject matter experts across security and networking. The report explores how 5G will impact security, including the opportunities for businesses to evolve their security approach and benefits of transitioning to 5G and the edge. Interestingly, data from the report clearly shows that many of the changes companies are making today, such as virtualizing security and network controls and focusing on frameworks like Zero Trust, are bringing them closer to what’s going to be required for securing 5G and the edge, as well as the IoT explosion both will drive. No, 5G infrastructure is not yet globally ubiquitous, but believe-you-me, the world is quickly marching toward that. According to IDC, mid 2020 saw 93 operators having deployed 5G networks across more than 40 countries, and IDC has forecasted that worldwide 5G connections will grow from 13.6 million in 2019 to 1.8 billion by 2024 — which means 5G will make up approximately 15% of all cellular-based mobile and IoT connections.  Enterprises are taking notice, with 93.5% worldwide researching, implementing, or having completed a 5G initiative, according to the AT&T global survey for the Insights Report. Yes, the train has left the station. Why? Because 5G and edge provide a leg up for business, and this is clearly being recognized: 60% of enterprises globally believe 5G and edge computing will help to provide a competitive advantage. And so, the digital transformation journey to the edge has begun. As enterprises make this transition, security is the top concern. No surprise, right? However, two key themes, which arose from our research for the Insights Report, are fundamentally shifting the conversation around security . First, security has truly moved from the basement to the boardroom, a change that was no doubt accelerated by COVID and the realization that enterprise networks and the security that protects them are absolutely integral to business continuity.  In other words, the digital transformation to 5G and edge computing is not happening without the security stakeholders at the table. Second, and perhaps more importantly, the way we approach security as we move to the future is absolutely going to change. Security leaders are acknowledging the challenge ahead in order to protect the business and minimize risks, while the enterprise attack surface grows exponentially large and complex due to the promise of billions of devices interconnecting in the future. How are they preparing? Here are some highlights from the report. Download your copy for the details. Zero Trust (ZT) has become a top priority, with 94% of enterprises researching, implementing, or having completed a ZT initiative. Security of  data is key to moving into a 5G future. Data privacy, data loss and prevention, data encryption, and access to that data, inclu
Envoyé Oui
Condensat  data  faster  in  to 000 2019 2020 2024 about absolutely accelerated access according acknowledging across address advantage agile ahead all along among appearing approach approximately are arose around assets at&t attack based basement because become been begun being believe benefits best billion billions boardroom both bringing business businesses but can capabilities cellular centric certainly challenge challenged challenges change changes changin’ changing clearly cliches: closer companies competitive completed complex compute computing concern connections consider continue continuity controls conversation convinced copy countries covid cybersecurity data defined deploy deployed details detection device devices digital doubt download dozens drive driven driver driving due edge embark encryption endpoint enterprise enterprises evolve experts explores explosion exponentially fact figure finally first focusing forecasted frameworks from function functions fundamentally future generation global globally going good grow grows guidance happening has have having help here highlights how however idc identity impact implementation implementing importance important importantly including increasingly industrial infrastructure initiative insights insights™ insights™ integral interconnecting interestingly interviews iot it’s journey just key landscape large leaders left leg like line lining long look looming loss make making managed management many marching matter means mid million minimize mobile months more most move moved moving mssp network networking networks new next not notice one operators opportunities order organization’s organizations other out over pace peek peers perhaps preparing prevention priority privacy professionals promise protect protecting protects provide provider quickly rapidly realization really recognized: recommendations released remote report report: required research researching right risks saw scale sdn second securing security see seeking service sets shifting shows silver software some specter stage stakeholders stated station strategized subject such surface surprise survey table take taking talking tech technologies term territory than them themes these those threat threats times today tomorrow too top toward train transformation transformations transition transitioning truly trust try two ubiquitous unique unprecedented use venturing virtualization virtualizing way we’re well what what’s which why will without words work world worldwide worst yet your zero
Tags Threat Guideline
Stories
Notes ★★★★
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: