* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * [5G Security](https://www2.paloaltonetworks.com/blog/network-security/category/5g-security/) * The Tools and Capabilitie... # The Tools and Capabilities You Need for Securing 5G Networks and Data [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2020%2F09%2Fsecuring-5g-networks-and-data%2F) [](https://twitter.com/share?text=The+Tools+and+Capabilities+You+Need+for+Securing+5G+Networks+and+Data&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2020%2F09%2Fsecuring-5g-networks-and-data%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2020%2F09%2Fsecuring-5g-networks-and-data%2F&title=The+Tools+and+Capabilities+You+Need+for+Securing+5G+Networks+and+Data&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/2020/09/securing-5g-networks-and-data/&ts=markdown) \[\](mailto:?subject=The Tools and Capabilities You Need for Securing 5G Networks and Data) Link copied By [Danielle Kriz](https://www.paloaltonetworks.com/blog/author/danielle-kriz/?ts=markdown "Posts by Danielle Kriz") Sep 24, 2020 4 minutes [5G Security](https://www.paloaltonetworks.com/blog/network-security/category/5g-security/?ts=markdown) [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown) [5G](https://www.paloaltonetworks.com/blog/tag/5g/?ts=markdown) [policy](https://www.paloaltonetworks.com/blog/tag/policy/?ts=markdown) [Service Providers](https://www.paloaltonetworks.com/blog/tag/service-providers/?ts=markdown) This post is also available in: [日本語 (Japanese)](https://www2.paloaltonetworks.com/blog/2020/09/securing-5g-networks-and-data/?lang=ja "Switch to Japanese(日本語)") ###### *Our position paper, "A Comprehensive Approach to Securing 5G Networks and Data," details best practices and the state-of-the-art, scalable security tools and capabilities that can help secure today's complex network infrastructures, communications and data. This overview provides a high-level view of the information covered in the paper, which you can download below.* Managing the security of telecom networks and the data that runs on them is a challenge, particularly in the context of the evolution to 5G. Due to its compelling value proposition as a major driver of business transformation, 5G adoption is growing rapidly across numerous industry verticals worldwide -- bringing a new threat landscape. When it comes to 5G cybersecurity, some stakeholders focus on the trustworthiness or security of particular technologies or vendors in the network and consider excluding them accordingly. While vendor supply chain security is important, this narrow approach does not account for how telecom networks are architected and operate, nor the full picture of cybersecurity threats and risks to networks and end-users. As a result, this approach does not enable effective management of all risks. Telecom networks have undergone a large technological shift, leveraging more types of technologies than ever before, which has radically changed the necessary approach to security. Traditionally, networks were largely composed of physical equipment, such as hardware switches and routers, often placed in operator-controlled physical premises with dedicated communications links. Today, while physical elements still exist, networks have evolved radically. They are dynamic and scalable, largely software-driven, virtualized and decentralized, as well as cloud-ready, and many operators prefer a multi-cloud strategy. Today's telecom networks "mix and match" multiple vendors from across the globe, producing various technologies that must be integrated seamlessly. Examples of technologies in today's 4G/5G telecom networks include diverse hardware such as networking and storage; software to enable business service functions like fulfillment, service assurance and operations support; and cloud technologies. The massive increase in network connectivity, move to software-driven networks, and emergence of new types of applications pose expanded security risks for both telecom operators and their end-users/customers. At the same time, cyberattacks on network infrastructure, applications, services and operators' customers/end-users ([enterprises](https://www.paloaltonetworks.com/blog/2020/09/netsec-top-5-5g-security-considerations/)) continue to grow in volume and sophistication. Threats are amplified in 5G, where attacks leverage 5G speeds and there are many new points of attack as IoT devices proliferate. Given the facts outlined above, we must revisit the conventional approach to the security of telecom networks, especially as they become increasingly virtualized. While individual information and communication technologies (ICT) vendors remain responsible for securing their own proprietary hardware, software or unique offerings deployed in a network, telecom operators have the ability to secure the network infrastructure and communications/data traversing networks. Further, security of the device and communications traffic is imperative. Proven, state-of-the-art security tools and capabilities are available to operators to secure today's complex network infrastructures, communications, and data, regardless of underlying technology or vendor in the network. Important functionalities of these tools and capabilities include: * ***Maintaining constant real-time visibility and enforcement.*** Telecom operators need to have constant real-time visibility and enforcement of traffic interactions between and among diverse network elements as well as into and out of the network itself and be able to detect and stop in real time cybersecurity threats within that traffic. * ***Leveraging real-time mitigation.*** This is critical in responding to correlated threats and to taking actions. * ***Authenticating that devices and users are who they claim to be*** before they can perform a certain action, such as requesting data. * ***Controlling the level of access each device or user is granted to certain resources, based on sensitivity or criticality.*** * ***Internally dividing/segregating network elements,*** based on level of risk or function, and managing communications between disparate elements accordingly. * ***Securing the "containers" used to build the 5G core.*** As container adoption rises, so should the adoption of best practices for container security. As government policymakers seek to address concerns about [cybersecurity in 5G networks](https://www.paloaltonetworks.com/blog/2020/05/network-securing-5g/), they should encourage the use of state-of-the-art, scalable security tools and capabilities that can secure modern telecom networks, communications and data regardless of the underlying technology or ICT vendor in the network; promote and incentivize ICT vendor best practices and transparency; work with vendors that are open to shared responsibility and demonstrate best practices; and promote automated sharing of actionable cybersecurity threat information. Read more details on all of the above points in our 6-page position paper, "[A Comprehensive Approach to Securing 5G Networks and Data](https://www.paloaltonetworks.com/blog/wp-content/uploads/2020/09/A-Comprehensive-Approach-to-Securing-5G-Networks-and-Data-September-2020.pdf)." *** ** * ** *** ## Related Blogs ### [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown) [#### Are We Prepared to Deal with the Impact of Cyber Threats on 5G?](https://www2.paloaltonetworks.com/blog/2020/05/network-5g-security/) ### [5G Security](https://www.paloaltonetworks.com/blog/network-security/category/5g-security/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown), [Service Providers](https://www.paloaltonetworks.com/blog/category/service-providers/?ts=markdown) [#### The Right Approach to Securing 5G](https://www2.paloaltonetworks.com/blog/2020/05/network-securing-5g/) ### [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Australia's New Cyber and Critical Tech Strategy, Key to Diplomacy](https://www2.paloaltonetworks.com/blog/2021/06/australia-cyber-critical-tech-strategy/) ### [5G Security](https://www.paloaltonetworks.com/blog/network-security/category/5g-security/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown), [Service Providers](https://www.paloaltonetworks.com/blog/category/service-providers/?ts=markdown) [#### Top 5 5G Security Considerations for Enterprises](https://www2.paloaltonetworks.com/blog/2020/09/netsec-top-5-5g-security-considerations/) ### [AI Governance](https://www.paloaltonetworks.com/blog/category/ai-governance/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Government](https://www.paloaltonetworks.com/blog/category/government/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Improving National Security Through Secure AI](https://www2.paloaltonetworks.com/blog/2025/05/improving-national-security-through-secure-ai/) ### [News \& Events](https://www.paloaltonetworks.com/blog/sase/category/news-events/?ts=markdown), [Partner Integrations](https://www.paloaltonetworks.com/blog/sase/category/partner-integrations/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Service Providers Can Seize the 5G Opportunity with Prisma SASE 5G](https://www2.paloaltonetworks.com/blog/sase/service-providers-can-seize-the-5g-opportunity-with-prisma-sase-5g/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language