Palo Alto unveils industry-first 5G-native security offering

5G next to a padlock
(Image credit: Shutterstock)

Palo Alto Networks has announced the launch of the first 5G-native security offering, in a move the cyber security firm says will enable service providers to ensure the integrity of 5G networks.

Available now on select firewalls, Palo Alto says it has added understanding of 5G protocols and network interfaces to its expertise in securing enterprises and mobile networks. The result is a number of industry-firsts - including containerised 5G security, real-time visibility and prevention of threats to 5G devices, and 5G network slice security.

“For 5G to live up to its promise of transforming industries, companies need the confidence that 5G networks and services have enterprise-grade security,” commented Anand Oswal, senior vice president and general manager, Firewall as a Platform, Palo Alto Networks.

Service providers and enterprises will benefit from a reduced security risk thanks to 5G architecture protection across all network layers, the firm says, as well as a high degree of automation, accelerated 5G adoption, and lower total cost of ownership.

As much of the 5G infrastructure is being built with cloud-native architectures, Palo Alto’s containerised 5G security has been designed to secure the 5G core and edge clouds – even across multi-cloud and multi-vendor environments.

The offering also provides real-time visibility, prevention, and correlation of threats to individual 5G users and devices. This ability to look into the signalling channel will let service providers apply security policies based on the user and device, as well as determine potential attack targets and threat causes.

Additionally, 5G network slice security will enable service providers to offer a secure, dedicated end-to-end piece of the network for core business activities as a new product, Palo Alto says.

“We created 5G-native security in order to give enterprises the confidence they need to harness 5G for business transformation and to help service providers secure the new enterprise services they are creating,” Oswal added.

5G security capabilities are available a number of Palo Alto Networks firewalls, including the PA-5200 Series and PA-7000 Series hardware models, as well as all VM-Series/CN-Series software models running PAN-OS 10.0+.

Daniel Todd

Dan is a freelance writer and regular contributor to ChannelPro, covering the latest news stories across the IT, technology, and channel landscapes. Topics regularly cover cloud technologies, cyber security, software and operating system guides, and the latest mergers and acquisitions.

A journalism graduate from Leeds Beckett University, he combines a passion for the written word with a keen interest in the latest technology and its influence in an increasingly connected world.

He started writing for ChannelPro back in 2016, focusing on a mixture of news and technology guides, before becoming a regular contributor to ITPro. Elsewhere, he has previously written news and features across a range of other topics, including sport, music, and general news.

Latest in Security
Ransomware concept image showing a warning symbol in red with binary code in background.
Healthcare systems are rife with exploits — and ransomware gangs have noticed
Application security concept image showing a digitized padlock placed upon a digital platform.
ESET looks to ‘empower’ partners with cybersecurity portfolio updates
NHS logo displayed on a smartphone screen in white lettering on a blue background.
NHS supplier hit with £3m fine for security failings that led to attack
OpenAI logo and branding pictured at Mobile World Congress 2024 in Barcelona, Spain.
OpenAI announces five-fold increase in bug bounty reward
Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.
These five countries recorded the most third-party data breaches last year
Phishing concept image showing an email symbol with fishing hook.
Have I Been Pwned owner Troy Hunt’s mailing list compromised in phishing attack
Latest in News
Ransomware concept image showing a warning symbol in red with binary code in background.
Healthcare systems are rife with exploits — and ransomware gangs have noticed
Application security concept image showing a digitized padlock placed upon a digital platform.
ESET looks to ‘empower’ partners with cybersecurity portfolio updates
Male software engineer working on a laptop at a home office desk with two PC monitors sitting on top of desk.
‘This shift highlights not just a continuation but a broad acceptance of remote work as the norm’: Software engineers are sticking with remote work and refusing to budge on RTO mandates – and 21% would quit if forced back to the office
Databricks logo and branding pictured on a MacBook Pro screen.
Databricks and Anthropic are teaming up on agentic AI development – here’s what it means for customers
Dell Technologies logo and branding pictured at the company's stall at Mobile World Congress (MWC) in Barcelona, Spain.
Scale of Dell job cuts laid bare as firm sheds 10% of staff in a year
Male employee sitting at a desk working on a laptop with earphones in and books scattered on desk.
Employees want purpose, and they’re willing to quit to find it – upskilling, career growth, and work-life balance have shifted priorities for workers