top of page
Video Game

MOBILITY & IOT

5G AND THE JOURNEY TO THE EDGE

Making it Safer to Innovate

The AT&T Cybersecurity Insights™ Report is an annual research report published by AT&T Cybersecurity. Currently in its tenth edition, the report provides rich insight into critical cybersecurity issues, trends, and emerging technologies to help executives, security professionals, and business leaders understand the current landscape of threats and develop strategies for building a resilient cybersecurity approach that protects the business today and tomorrow.


As the publisher of this report, we do our best to make sure the AT&T Cybersecurity Insights Report is vendor neutral and discusses the broader domain of cybersecurity. This report is based on primary research, including a global survey of security, IT, and line-of-business leaders, to understand first-hand what is most concerning to professionals within the cybersecurity industry and how broader technology and digital business trends impact security. Additionally, this report is informed by subject matter experts from leading cybersecurity vendors and AT&T Business to capture forward-thinking perspectives on topical technology and cybersecurity issues.

 

Our mission for the AT&T Cybersecurity Insights Report is to mesh the knowledge and experience of some of the best minds in the industry with empirical research to provide insight into what enterprises should consider
to achieve a resilient cybersecurity approach that evolves with the business 

5G ENABLES INNOVATION AT THE SPEED OF BUSINESS

IS ENABLING innovations in smart cities, fleet management, supply chain, and IT automation by connecting billions of low-power internet of things (IoT) devices to the cellular network. By taking advantage of low latency, high speed, and ultra-high reliability, enterprises can one day actualize mission-critical and, in some cases, life-critical applications such as smart grids, remote surgery, and intelligent transportation systems. Unlike previous technology rollouts, 5G is finding an enthusiastic audience of line-of-business (LOB) executives that have seen the promise of IoT and edge-based applications in a 4G world and are pushing for
the rapid adoption of 5G to realize all the speed and latency promises that 5G enables. When LOB executives are funding the technology and security improvements needed to realize the safe entry of these 5G use cases, 5G can be called a revolutionary, game-changing technology. Yet, among some organizations, the
implementation of 5G will be evolutionary as they navigate the transition from 4G to 5G and all the security issues that shift implies.


The explosion of 5G-enabled hardware and the apps hosted on those devices bring about yet another elevated era of highly organized, commercialized, and potentially state-sponsored threat actors. These groups are ready and willing to destroy, steal, or hinder the data that these 5G-enabled devices utilize to further their criminal desires. Unlike prior improvements to the radio spectrum, the innovations that 5G brings mean that the vast amounts of data that is being created, hosted, and transmitted could potentially be probed by cybercriminals using the very same technology that allowed this data to move in the first place.

WEB-BASED APP ATTACKS PRESENT A CHALLENGE TO ADDRESS.

WHAT IS SECURE 5G AND WHY DOES IT MATTER?

With standalone 5G and mobile network rollouts accelerating globally, the impact to the enterprise is only just beginning. 5G is not simply a new radio upgrade or more advanced smartphone. 5G implies an adjacent investment in cloud and software-defined networks, both at the core layer and at the edge of the cellular network. Said differently, 5G will ultimately be defined as a new globally distributed mobile platform able to support a whole array of enterprise-grade and consumer devices. 5G will radically transform and empower operators to efficiently drive new market opportunities, all from a single 5G network platform. In fact, nearly 54% of our survey respondents who completed 5G implementations state that multi-access edge computing (MEC) enables near real time cloud services at the edge and 52% believe MEC enhances data management
(see Figure 3).

When it comes to securing the cellular
edge or MEC, 31% of respondents think that 5G is secure out of the box from the network provider with no additional security required and another 26% have no strategic plan to address the security of 5G. This is in direct opposition to the 56% of respondents who understand that 5G will require a change to their security approach to accommodate network changes. In addition, nearly half of the survey respondents believe that 5G poses an elevated security threat, partly because there are more vectors through which adversaries can attack.

Dark-Background

Provide end-to-end security and fuel business efficiencies through IoT video intelligence solutions

Multi-building campuses, entertainment and sports venues, enterprise headquarters, and hotel and hospitality properties rely on the latest technology to help them monitor and analyze people, assets, and property. AT&T IoT – Video Intelligence is a comprehensive solution designed for monitoring, improving public safety and enabling businesses to optimize operations and revenue through the capture and analysis of near-real-time data and alerts.

AT&T IoT – Video Intelligence is an end-to-end, integrated solution that provides video monitoring and near real-time data analysis
and alerts from new or existing video cameras, Internet of Things (IoT) sensors, and other end points located within public and private spaces. The solution includes software that aggregates your data to enable insights that

can be used to address everyday security and business challenges on your campus, property, or facility. Make faster, more informed decisions in near real-time enabling you to respond to incidents and activities to protect the public, enhance experiences, and analyze data collected over time to make data-driven business decisions.

Features and benefits:

• Robust analytics with near real-time situational awareness

• Single view for video, IoT, and analytic data

• VMS (Video Management System) agnostic to support most legacy cameras or disparate systems*

• Integrates 3rd party systems: such as CAD/911, records man agement systems, weather, and more

• Highly secure network connectivity

• Asset protection and risk mitigation
• Operational efficiencies and better managed facilities

• Privacy protection and auditability for compliance purposes

• Obscure and protect persons in video with a range of concealment options frompixelization to total coloring, while keeping movement and actions recognizable

Bring Order to Your Mobile Environment

​How will today’s enterprise evolve their mobile strategy?

Smartphones, tablets, and other mobile devices have transformed how we conduct business and have become deeply integrated in the enterprise. Mobility is boosting business productivity and responsiveness. But companies have grappled with managing and controlling the costs associated with these new mobility services andthe impact they have on their resources.

Fragmented mobile environment 

The mobility environment of a global corporation is complex and frequently changing due to internal and external forces. It requires working with multiple wireless telecom providers in numerous countries each with its own contract, pricing, invoicing, ordering portal, reporting formats, and support offerings. These complexities can lead to a lack of visibility into or influence over your company’s use of and spend on mobile services, which can result in time intensive management of transactions, necessitate additional employee resources to manage numerous carriers and contracts, and can lead to higher overall costs.

AT&T GMM (STANDARD) SERVICES:

Transaction Management
Customer Policy Implementation: AT&T works with you to develop and maintain a central catalog of approved services, devices, features, and accessories across local mobile telecommunication service providers in supported countries integrated with your approval processes (based on wireless policies you establish) to help you ensure that the “right device gets to the right user”.

Transaction Tracking:

AT&T tracks qualified transactions and escalates, on your
behalf, any delays or other provisioning issues regarding such transactions to
the local mobile service provider.

Spend Reporting
Monthly Reporting Tools: AT&T aggregates information from local mobile telecommunication service providers in supported countries and provides you with access to a suite of standard, self-service reports offering a variety of variables from which you can select for a customized view into your company’s mobility usage and/or spend across such providers and countries. These reporting tools enable you to better understand your spending and make more informed decisions about your mobile environment. If you prefer, you can request your AT&T Service Manager to run some or all  f the reports on your behalf each month.

Advice to Pay Reports, Billing Disputes and Escalation:

AT&T reviews incoming carrier invoices to verify that orders were provisioned as requested, provides an “Advice to Pay” report, and escalates billing discrepancies to the local mobile telecommunication service provider on your behalf to help facilitate your resolution of any disputes.

Rate Plan Optimization
AT&T provides quarterly rate plan optimization analysis and reporting to help you assess whether Corporate Responsibility Users are on appropriate rate plans, determine optimal rate plan combinations, make rate plan adjustments, and make decisions as to your company’s wireless-related policies.

Engagement – AT&T Service Manager
Throughout AT&T’s relationship with your company, AT&T is engaged in an active and on-going basis, with your AT&T Service Manager addressing your GMM service implementation, exchanging information and reports, conducting quarterly review meetings, and handling other on-going GMM contract-related matters.

ADDITIONAL AT&T GMM (ENHANCED) SERVICES:

Strategic Carrier Management:
AT&T can perform multi-dimensional carrier management services on your behalf including bid management, carrier evaluation and recommendation, pricing negotiation
assistance, and managed corporate-liable subscriber consolidation to preferred, local mobile service providers.

Incident Management:

AT&T escalates, on your behalf, chronic network outages and issues to the local mobile telecommunication service provider and, to the extent available from the local provider, provides you with notice of planned network outages or upgrades.

Abstract Futuristic Background

Find the right security solutions for your retail business.

Get a professional security assessment. Plans and security postures change and should be
reviewed regularly to identify vulnerabilities and avoid data breaches.

bottom of page