How to Secure Private 5G Networks

Posted on in Presentations

This session provides critical guidance on how a private cellular wireless network can be architected to protect the integrity of critical enterprise applications. Bringing strong device identification, authentication and centralized encryption for all traffic flows, the session will discuss how it can be designed to support a zero trust strategy with a suite of APIs for extensibility and integration.

Interested? We have you covered! This popular session will also be streamed live in The Session Viewing Point, West Level 2 Room 2004.

Srinivasan Balasubramanian


Distinguished Member, CTO Office Head of Standards & IP, Celona

Technology Infrastructure & Operations

mobile security network security zero trust network access control infrastructure security



Share With Your Community