Select a language
5G deployments will rely on a cloud-native and microservices-based architecture to connect massive Internet of Things (IoT), low latency, or enhanced mobile broadband services. These services, located in centralized datacenters, distributed edge computing platforms, mobile devices, and operational controls, will be used for management and orchestration. Without the proper security features for infrastructure, workloads, and users in containerized environments, computing environments may be subject to rogue and malicious code deployments, unauthorized access, and other security hazards.
Mitigating the distributed threat landscape that 5G will introduce requires improved monitoring, general vigilance, and new security-focused strategies. New security strategies are necessary because they will introduce an unparalleled level of data processing, storage, and encryption at edge to meet end-to-end service latency budgets for consumer and enterprise customers.
Join this webinar session to find out about:
- Combined security controls recommended by Red Hat and Cisco.
- Methods to enhance the right security features for infrastructure, workloads, and users in containerized environments.
Live event date: Thursday, October 29, 2020 | 15:00 PM CEST
On-demand event: Available for one year afterward.