Applications

5G Technology

5G- the value for businesses and a disruption to cyber security

5G will be a physical transformation and overhaul of our essential networks. It will have an impact on our society and economy in decades to come. 5G networks will enable the connection for billions of new devices, sensors and systems that would intelligently connect to the network based on their time sensitivity and computational needs.

While 5G’s high speeds and connection advantages are revolutionary, the use of 5G creates exciting new possibilities for the business world and its ability to offer services with varying specifications and service level agreements (SLAs) as well as an opportunity to enhance cyber-resilient measures. Artificial intelligence (AI), cloud computing, and the deployment of the Internet of Things (IoT) are all facilitated by the powerful foundation network offered by 5G. 5G will assist IT teams in preventing new cyber security challenges allowing them to operate networks on a more secure basis.

With 5G networks being built on software based models, ensuring security from the infrastructure layer to the application layer becomes an essential factor.

Utimaco’s HSM-protected 5G creates a secure operational environment, supporting all relevant 3G, 4G and 5G Subscriber Authentication and Key Agreement (AKA) protocols.

Business value

Business value

Icon

Mobile subscriber & key agreement in mobile networks

  • Provides a scalable and customizable solution for subscriber authentication and key agreement in mobile networks.
  • Provides easy integration through a dedicated interface for authentication and key agreement (AKA) use cases.
  • A solution especially designed to meet the needs of network element provider for subscriber identity de-concealing and authentication and key agreement in mobile networks
Icon

Scalable and customizable with unprecedented speed

  • Provides easy extension to support future versions of SIDF Profiles and AKA protocols, or even future quantum- safe algorithms
  • Customizable to specific requirements of Mobile Network Operators
  • Process subscriber data and generate keys within a secure and tamper-protected environment at unprecedented speed
Icon

Compliance across industries

  • Provides easy integration through dedicated interfaces for AKA use cases.
  • Provides a secure environment that protects against physical attacks as required in 3GPP Technical Specification 33.501 “Security architecture and procedures for 5G System
  • Assures security and compliance with FIPS 140-2, PCI HSM and Common Criteria proven Hardware Security Module and cryptographic algorithms
  • Support of all relevant 3G, 4 and 5G Subscriber Authentication and Key Agreement (AKA) protocols
Icon

Remote Access

  • Extensive mechanisms for remote administration
  • Efficient key management and firmware updates via remote access
  • Automation of remote diagnosis via SNMP (Simple Network Management Protocol)
Icon

Software Simulator included

Included simulator for the mobile TrustServer, allowing for evaluation and integration testing to benchmark the best possible solution for each specific case

Deployment options

Deployment options

Icon

On Premise

  • Useful for centralized use cases without a requirement of scalability or remote accessibility and existing legacy infrastructure
  • Defined total cost of ownership
  • Complete control on hardware and software, including configuration and upgrades
  • Secured uptime in areas with insatiable internet connectivity
  • Preferred choice in industry-segments where regulation imposes restrictions
Icon

In the Cloud

  • Strategic architectural fit & risk management for your high value assets
  • Provides flexibility, scalability and availability of HSM-as-a-service
  • Ideal for a multi-cloud strategy, supporting multi-cloud deployments & allows for migration flexibility
  • Allows you to seamlessly work with any Cloud Service Provider
  • Easy-to-use remote management and on-site key ceremony service option
  • Full control over data through encryption key life-cycle and key administration
  • Secured data privacy through Bring-Your-Own-Key procedures

Contact us

We look forward to answering your questions.

Get in touch with us

Talk to one of our specialists and find out how Utimaco can help you today.