Loading...

25 Feb 2026 18:37

Mobile & Digital

Nokia extends commitment to network security for the 5G world

Launches DFSEC 2.0: an enhanced security program to address the critical security needs of 5G wide area networks

Opens “Future X Security” Laboratory (FXSec): a new security end-to-end testing and verification lab at Nokia Bell Labs headquarters in Murray Hill, New Jersey 

Initiatives will seek to address the critical security needs of the end-to-end mission-critical networks that will define the 5G era

Espoo, Finland – Nokia today announces a significant extension of its long-held commitment to the highest standards in network security, unveiling an enhanced security program and establishing an advanced security testing and verification laboratory: both designed to address the critical security needs of 5G end-to-end (E2E) networks.

Nokia has a long-standing commitment to creating secure products via its comprehensive, industry-leading Design For Security (DFSEC) process. DFSEC ensures that security is designed into every product from the start, undergoing rigorous security testing prior to commercial release. Launched today, a new program – DFSEC 2.0 – will build on this leadership in security development by focusing on additional verification work in the areas of E2E identity management, network slicing and SDN security, virtualization, and OAM, including patch management.

To support collaborative research and development across the DFSEC 2.0 program, Nokia is opening the “Future X Security” (FXSec) Lab. Built as an extension of Nokia’s Future X network lab in Nokia Bell Labs in Murray Hill, this lab will be open to communications service providers and industries to facilitate joint testing and verification of industrial automation solutions in private local area networks (LANs) and across public wide area networks (WANs).

Marcus Weldon, Corporate Chief Technology Officer and President of Nokia Bell Labs, says: “End-to-end 5G networks will fundamentally transform societies by providing ultra-high-speed wireless connectivity allowing massive, low latency ultra-reliable streaming data that will drive intelligent automation for a wide array of infrastructure, industries and enterprises. But with great opportunity comes significant security risk that must be addressed end-to-end, using an array of novel techniques and technologies. As the most trusted end-to-end solution provider in the 5G era, Nokia is taking a leadership position in defining and building advanced security solutions that will meet mission-critical needs, leveraging the deep and extensive security research and disruptive innovations from Nokia Bell Labs.

Defining 5G security standards for the future

The E2E 5G networks that will define this new era are a significant advance from the closed systems and technologies in previous generations. Software Defined Networking (SDN) with distributed cloud infrastructure and augmented intelligent control systems will allow networks to scale in the 5G era, powering the next billion connected things, systems, machines and people.

However, open interfaces and commonly available technology also introduce new networking infrastructure security challenges, as does the addition of billons of unverified devices that will be used to sense and control the physical world.  Therefore, a new approach is warranted that goes beyond today’s security for ‘best effort’ networks, to enable security for E2E mission-critical networks.

Nokia’s 7 key research areas for secure design

In building the new security approach for LAN and WAN, Nokia will be incorporating advanced research from Nokia Bell Labs to create Network Slicing Security Solutions that will ensure security and trustworthiness of the end-to-end network slices – the critical connectivity and service fabric for industrial applications in the 5G era. These security solutions are based on 7 key research areas:

“Accountable Security” that provides failproof identification of industrial IoT devices in mobile and dynamic environments

“Physical and Virtual Device Integrity Protection” that provides scalable device attestation (hardware, firmware and software) across the supply chain

Artificial Intelligence enabled “Threat Detection and Mitigation for Network Slices”

“Fine-grained Security Policy Management” which dynamically tailors network slice elements to meet specified security requirements

“Dynamic data protection” which addresses the issue of data isolation across mobile devices, applications and slices

“Microservice Behavioral Fingerprinting” that is a unique machine learning based anomalous behavior detection of third party and open-source 5G services

Paradigm shift in design for security that provides run-time mitigation of potential security concerns with rapid feedback into development cycle using DevSecOps models

The next generation “Future X Security” for end-to-end mission critical networks will leverage Nokia Bell Labs long-standing leadership in researching and standardizing security solutions. Nokia Bell Labs has the leading patent filings in key areas of security of 5G and E2E networks – including aspects of multi-tenancy, slicing, and industrial IoT – and for trust and patch management, remote attestation, security management and orchestration. Beyond patents, Nokia has taken an active leadership role in supporting the development of key industry standards by working with 3GPP and ETSI. 

NULL
(Visited 17 times, 1 visits today)
peri hokiperihokiduta76duta 76ABC1131 - MPO SLOTABC1131 Bandar Slot Togelmix parlay agen slot qrisMPOGALAXYslot thailandAWSBETketajaman analisa melampaui keberuntungan pola mahjong wild deluxe sicbo gates of olympus berbasis siklus entropi duta76meruntuhkan mitos hoki taktik peluang mahjong ways2 pgsoft baccarat starlight princess yang jarang pernah dibagikan duta76membongkar arsitektur peluang mahjong wins3 pragmatic blackjack sweet bonanza teknik kalkulasi rtp live yang terlupakan duta76melampaui batas konvensional analisa pola mahjong ways2 pgsoft roulette wild bounty showdown taktik rekonstruksi siklus sesi duta76filosofi taruhan berbasis nalar mahjong wins3 pragmatic blackjack sabung ayam sv388 taktik probabilitas yang jarang terekspos duta76menyingkap tabir rtp live mahjong wild deluxe sicbo gates of olympus lewat teknik kalkulasi putaran yang terlupakan perihokiketika logika menggantikan spekulasi teknik baca pola mahjong ways2 pgsoft baccarat starlight princess secara holistik perihokiilmu membaca denyut rtp live mahjong wins3 pragmatic blackjack sweet bonanza pendekatan yang diabaikan pemain berpengalaman perihokipeta jalan kemenangan terstruktur mahjong ways2 pgsoft roulette wild west gold strategi non linear tanpa spekulasi perihokiseni membaca momentum tersembunyi mahjong wins3 pragmatic blackjack sabung ayam sv388 analisa taktik lintas permainan presisi perihokiformasi simbol berulang mahjong wins 3 sesi profesionalkalibrasi prediksi multiplier wild bounty showdown 85 jutasinergi kontrol emosi pola sekuensial dragon hatch stabilitas tempomenelusuri jejak rtp live mahjong wild deluxe sicbo gates of olympus lewat prisma kalkulasi taruhan yang terlupakan perihokimembangun kerangka analisa rtp live mahjong ways 2 pgsoft baccarat starlight princess pendekatan matematis yang tidak lazim perihokiketika presisi mengalahkan spekulasi pola mahjong wins 3 pragmatic blackjack sweet bonanza strategi berbasis arus volatilitas perihokimerajut benang frekuensi mahjong ways2 pgsoft roulette wild bounty showdown analisa mendalam yang jarang diperbincangkan perihokiberpikir seperti analis bukan penjudi teknik baca pola mahjong wins 3 pragmatic blackjack sabung ayam sv388 secara holistik perihokiketika nalar mengalahkan takdir pola mahjong wild deluxe sicbo gates of olympus strategi berbasis spektrum peluang duta76menguak gravitasi pola mahjong ways2 pgsoft baccarat starlight princess strategi lintas meja berbasis jejak entropi siklus duta76sirkuit peluang tak terpetakan mahjong wins3 pragmatic blackjack sweet bonanza taktik rekonstruksi momentum berbasis data duta76membangun kerangka taktik rtp live mahjong ways2 pgsoft roulette wild bounty showdown pendekatan matematis yang tidak lazim duta76merancang ekosistem kemenangan mahjong wins3 pragmatic blackjack sabung ayam sv388 taktik berbasis pemetaan peluang terbalikmodel analisis iterasi diskrit mahjong ways 2 konvergensi sistemkeberhasilan strategis indikator balikan akumulasi 27 jutaanalisis struktur peluang dragon tiger probabilitas kartupenentuan arah strategis optimasi fase awal mahjong waysmitigasi risiko fluktuasi tajam perencanaan jangka panjangvalidasi konsistensi ritme ketahanan data performametodologi komprehensif pemetaan volatilitas sesi digital 2026aplikasi indikator korelasi deviasi standar stabilitas algoritmapembaruan data balikan harian konsistensi stabilitas peluangdampak pergerakan putaran mahjong wins alur strategisaws adaptasi pemain mahjong harianaws analisis perubahan visual mahjongaws atur momentum grid mahjongaws heuristik pola mahjong waysaws interpretasi teknis pola mahjongaws mekanisme reel tumbling mahjongaws perilaku pengguna mahjong harianaws strategi navigasi grid mahjongaws tips ritme mahjong tenangaws vektor akselerasi simbol ways2aws algoritma evolusioner mahjong ways3aws geometri pola mahjong iterasiaws kombinasi mahjong starlightaws korelasi pola stabilitas mahjongaws rahasia wild mahjong waysaws scatter rtp mahjong 12jutaaws sinkronisasi simbol grid mahjongaws skema modal mahjong stabilaws strategi transisi mahjong sweetaws target scatter mahjong winse4 strategi berbasis data dan rtp akurat menuju 23 jutae4 strategi bertahan lama dengan manajemen modal terukure4 strategi cerdas membaca mekanisme rtpe4 strategi hitung akurat untuk target puluhan jutae4 strategi jangka panjang mahjong wins 2 dengan mental tangguhe4 strategi konsisten berbasis rtp stabil yang jadi perbincangane4 strategi konsisten mahjong wins 2 terinspirasi mental juara duniae4 strategi konsisten mahjong wins stop spin cepat fokus momentumdekoding algoritma sweet bonanza terbaru pola sederhanaobservasi fenomena popularitas hiburan virtual indonesiatinjauan struktur koordinatif konsistensi performa digitalsintesis interaksi simbol wild dasar mahjong ways 3penemuan algoritma baru rasio berhasil 87 persen terkinieksplorasi konfigurasi adaptif reel mahjong ways 2investigasi pertumbuhan game cloud industri digitaltata kelola modal terarah mahjong wins 3 harmonisasiperencanaan strategis mahjongways pg soft imlek 2026sosialisasi prinsip probabilitas sikap bermain realistisaws admin pola baru mahjongaws baca pola simbol mahjongaws dinamika nonlinier mahjong ways2aws fase menengah mahjong suasanaws integrasi bonus eliminasi mahjongaws pengamatan mendalam mahjong strategiaws pengamatan rutin karakter mahjongaws perubahan irama mahjongaws putaran awal strategi mahjongaws sesi panjang dinamika mahjongaws bermain santai mahjong waysaws eskalasi ritme spin mahjongaws evaluasi volatilitas mahjong pgsoftaws fase tenang mahjong aktifaws fenomena sesi tenang mahjongaws kalibrasi intensitas wild bountyaws optimalisasi intensitas sweet bonanzaaws pengamatan awal mahjong waysaws putaran gratis pola mahjongaws transisi kecepatan spin mahjong Top