what their primary reason is for adopting 5G and the overwhelming response was to ‘remain competitive because it is a competitive world that we live in’. 93 per cent of organisations are either researching, implementing or have completed a 5G initiative.
PROTECT DATA ENDPOINTS
In a 5G world, we're going to have more and more devices connected, including IoT devices where a human being is not connected to the other end. It's just a thing sitting out there on the Internet. Many organisations will forget such IoT devices are an endpoint just like any other. Tese devices have to be protected as adversaries will take the path of least resistance and try to attack these types of endpoints.
It is also crucial businesses protect endpoints where data may be stored. With 5G, you have the luxury of data being stored where it is consumed and created for faster interaction with the applications you're working on. A perfect example of this is in-arena betting. However, these types of use cases are a treasure trove for adversaries if endpoints are not protected and taken care of in the correct way.
5G – A BUSINESS DRIVEN NETWORK
Standalone 5G is more secure than any previous network generation. Te only constraint of 5G use cases is the imagination of the people who are using it.
15 years ago, we would have never thought of P72 NEWSWIRE / INTERACTIVE / MARKET DATA
With 5G, there are going to be incredible use cases. It is unlike any other technology
revolution that we've seen as is not being driven by technical teams but by the line of business. This is why our latest report focuses on how business professionals are preparing for 5G. Businesses
have sensed an opportunity to become more competitive.
using a ride sharing application like we do today or streaming television shows on our mobile phones. On a 3G network, nobody could have predicted those types of applications when GPS systems were first coming online. On 4G, you could ping a driver to meet you within a metre of where you request a ride drop.
With 5G, there are going to be incredible use cases. It is unlike any other technology revolution that we've seen as is not being driven by technical teams, but by the line of business. Tis is why our latest report focuses on how business professionals are preparing for 5G. Businesses have sensed an opportunity to become more competitive.
As an industry, we have been predicting for more than a decade that business is going to become more involved in technology decisions.
5G is the manifestation. All organisations are looking at 5G – whether it is to offer in-arena betting or manage parking spaces within the city - for a competitive business differentiation. 5G is only constrained by the imagination of those who write the applications.
THE YEAR AHEAD
2020 was the year cybersecurity went from being a technical issue to a business imperative. In the year ahead, organisations are going to increasingly adopt 5G and begin the process of figuring out how to make themselves more competitive.
We are also going to see new types of applications being written. We have moved away from creating big monolithic applications to a whole new ecosystem with new hardware and smaller,faster applications built out as result of 5G. A new network means new infrastructure, hardware, and applications.
Software is going to be smaller in size, purpose- built and security will be built in from the very beginning as part of the requirement of writing applications. Security is something organisations will lead with and will no longer be an afterthought bolted on at the end of the development cycle. Personal identifiable information (PII) security is going to be front and centre.
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68 |
Page 69 |
Page 70 |
Page 71 |
Page 72 |
Page 73 |
Page 74 |
Page 75 |
Page 76 |
Page 77 |
Page 78 |
Page 79 |
Page 80 |
Page 81 |
Page 82 |
Page 83 |
Page 84 |
Page 85 |
Page 86 |
Page 87 |
Page 88 |
Page 89 |
Page 90 |
Page 91 |
Page 92 |
Page 93 |
Page 94