Loading...

02 May 2026 07:43

Mobile & Digital

Nokia extends commitment to network security for the 5G world

Launches DFSEC 2.0: an enhanced security program to address the critical security needs of 5G wide area networks

Opens “Future X Security” Laboratory (FXSec): a new security end-to-end testing and verification lab at Nokia Bell Labs headquarters in Murray Hill, New Jersey 

Initiatives will seek to address the critical security needs of the end-to-end mission-critical networks that will define the 5G era

Espoo, Finland – Nokia today announces a significant extension of its long-held commitment to the highest standards in network security, unveiling an enhanced security program and establishing an advanced security testing and verification laboratory: both designed to address the critical security needs of 5G end-to-end (E2E) networks.

Nokia has a long-standing commitment to creating secure products via its comprehensive, industry-leading Design For Security (DFSEC) process. DFSEC ensures that security is designed into every product from the start, undergoing rigorous security testing prior to commercial release. Launched today, a new program – DFSEC 2.0 – will build on this leadership in security development by focusing on additional verification work in the areas of E2E identity management, network slicing and SDN security, virtualization, and OAM, including patch management.

To support collaborative research and development across the DFSEC 2.0 program, Nokia is opening the “Future X Security” (FXSec) Lab. Built as an extension of Nokia’s Future X network lab in Nokia Bell Labs in Murray Hill, this lab will be open to communications service providers and industries to facilitate joint testing and verification of industrial automation solutions in private local area networks (LANs) and across public wide area networks (WANs).

Marcus Weldon, Corporate Chief Technology Officer and President of Nokia Bell Labs, says: “End-to-end 5G networks will fundamentally transform societies by providing ultra-high-speed wireless connectivity allowing massive, low latency ultra-reliable streaming data that will drive intelligent automation for a wide array of infrastructure, industries and enterprises. But with great opportunity comes significant security risk that must be addressed end-to-end, using an array of novel techniques and technologies. As the most trusted end-to-end solution provider in the 5G era, Nokia is taking a leadership position in defining and building advanced security solutions that will meet mission-critical needs, leveraging the deep and extensive security research and disruptive innovations from Nokia Bell Labs.

Defining 5G security standards for the future

The E2E 5G networks that will define this new era are a significant advance from the closed systems and technologies in previous generations. Software Defined Networking (SDN) with distributed cloud infrastructure and augmented intelligent control systems will allow networks to scale in the 5G era, powering the next billion connected things, systems, machines and people.

However, open interfaces and commonly available technology also introduce new networking infrastructure security challenges, as does the addition of billons of unverified devices that will be used to sense and control the physical world.  Therefore, a new approach is warranted that goes beyond today’s security for ‘best effort’ networks, to enable security for E2E mission-critical networks.

Nokia’s 7 key research areas for secure design

In building the new security approach for LAN and WAN, Nokia will be incorporating advanced research from Nokia Bell Labs to create Network Slicing Security Solutions that will ensure security and trustworthiness of the end-to-end network slices – the critical connectivity and service fabric for industrial applications in the 5G era. These security solutions are based on 7 key research areas:

“Accountable Security” that provides failproof identification of industrial IoT devices in mobile and dynamic environments

“Physical and Virtual Device Integrity Protection” that provides scalable device attestation (hardware, firmware and software) across the supply chain

Artificial Intelligence enabled “Threat Detection and Mitigation for Network Slices”

“Fine-grained Security Policy Management” which dynamically tailors network slice elements to meet specified security requirements

“Dynamic data protection” which addresses the issue of data isolation across mobile devices, applications and slices

“Microservice Behavioral Fingerprinting” that is a unique machine learning based anomalous behavior detection of third party and open-source 5G services

Paradigm shift in design for security that provides run-time mitigation of potential security concerns with rapid feedback into development cycle using DevSecOps models

The next generation “Future X Security” for end-to-end mission critical networks will leverage Nokia Bell Labs long-standing leadership in researching and standardizing security solutions. Nokia Bell Labs has the leading patent filings in key areas of security of 5G and E2E networks – including aspects of multi-tenancy, slicing, and industrial IoT – and for trust and patch management, remote attestation, security management and orchestration. Beyond patents, Nokia has taken an active leadership role in supporting the development of key industry standards by working with 3GPP and ETSI. 

NULL
(Visited 18 times, 1 visits today)
peri hokiperihokiduta76duta 76ABC1131 - MPO SLOTABC1131 Bandar Slot Togelmix parlay agen slot qrisMPOGALAXYslot thailandAWSBEThttps://premium-soft.com/Consulta-Licencias/https://sintnicolaasschool.com/https://abc1131aa.com/kincir88cakar76Slot mahjongABC1131ABC1131 LOGINhttps://abc1131.hartanzah.com/https://www.abc1131.it.com/stc76006 sinkronisasi momentum strategi hibrida pola scatter mahjong wild deluxe gates of olympus manajemen risiko dadu sicbo007 rekayasa taktik hibrida pola transformasi gold simbol mahjong ways 2 pgsoft baccarat prediksi starlight princess008 arsitektur kemenangan terpadu navigasi strategi blackjack optimasi peluang sweet bonanza mahjong wins 3 pragmatic009 dekonstruksi momentum strategi eksploitasi pola scatter mahjong ways 2 pgsoft teknik unit roulette wild west gold010 manifesto ekspertis navigasi rtp live sugar rush pola statis sv388 taktik kalkulasi blackjack mahjong wins 3 pragmatic011 rekayasa taktik lintas platform optimasi teknik analisa statistik mahjong wild deluxe gates of olympus dadu sicbo012 sinkronisasi data teknik rtp live mahjong ways 2 pgoft strategi baccarat statis dan dinamis starlight princess013 sinergi operasional integrasi teknik analisa statis blackjack dinamika sweet bonanza mahjong wins 3 pragmatic014 manifesto ekspertis rekayasa peluang algoritma pgsoft mahjong ways 2 pgsoft dinamika roulette wild west gold015 protokol strategis optimasi teknik analisa mahjong wins 3 pragmatic sugar rush sv388 blackjack proeksekusi taktik analisa pola gates of olympus dadu sicbo mahjong wild deluxetaktik peluang baccarat teknik analisa pola rtp live starlight princess mahjong ways 2 pgsoftsinergi strategi analisa peluang blackjack taktik teknik pola rtp live mahjong wins 3 pragmatic sweet bonanzaanalisa teknik peluang roulette taktik pola strategi rtp live mahjong ways 2 pgsoft wild west goldstrategi peluang blackjack analisa sv388 teknik taktik pola rtp live mahjong wins 3 pragmatic sugar rushpola mahjong ways 2 spin manualmanajemen saldo olympus 1000jam gacor pragmatic vs pg softfitur baru pg soft 2026mekanik baru pragmatic playmitos rtp live slot onlinegame pg soft low volatilityefek spin turbo algoritma slotrahasia frame emas wild banditoreview fitur buy spin pragmaticintegrasi analisa pola taktik rtp live strategi mahjong wild deluxe dadu sicbo gates of olympusmetodologi strategi teknik rtp live analisa pola mahjong ways 2 pgsoft baccarat starlight princessrekayasa metodologi peluang blackjack pola mahjong wins 3 pragmatic teknik sweet bonanzakomputasi peluang analisa strategi roulette pola mahjong ways 2 pgsoft taktik wild west goldmetodologi taktik presisi peluang blackjack pola sugar rush analisa sv388 mahjong wins 3 pragmaticmengindustrialisai perkembangan teknologi digital mahjong wins menuju kebebasan invoasi modernrevolusi industri digital mahjong ways dengan sistem integrasi ai merevolusionerkan peradabanstrategi tepat cuan mahjong ways 2 menurut mahjong analis era transformasi digitalteknologi cloud mahjong wins 3 bikin performa permainan terasa lebih stabiltransformasional teknologi digital mendorong kerangka mahjong ways 2 dengan pola dan rtp roboticlogika win streak pg softpenjelasan ilmiah scatter hitampotensi maxwin game sederhanarahasia near miss jackpotfakta menang akun barupeluang multiplier x500 olympusalgoritma scatter setelah maintenanceefek sering ganti game pg softtanda algoritma sedang downfungsi fitur double chanceanalisa lintas algoritma sinkronisasi pola mahjong wild deluxe gates of olympus probabilitas dadu sicboarsitektur strategi hybrid integrasi taktik baccarat pola presisi mahjong ways 2 pgsoft starlight princessprotokol rtp live integrasi strategi blackjack volatilitas mahjong wins 3 pragmatic sweet bonanzadialektika probabilitas analisa pola mahjong ways 2 pgsoft integrasi strategi roulette wild west goldrekayasa peluang membedah strategi mahjong wins 3 pragmatic sugar rush kalkulasi taktis sv388kesempatan emas mahjong ways hadir dalam sesi game online terbaikkilas balik penggunaan mahjong ways yang mulai terlihat di digital onlinekomposisi gaya pola mahjong ways 2 mengoptimalkan rtp live deluxemembaca gaya permainan tanpa pola mahjong ways disesuaikan poker onlinemomen mahjong ways mencapai puncak tertinggi tanpa menggunakan pola gates of olympusobservasi taktik dan gaya permainan terbaru yang dimiliki lucky nekorasio peningkatan taktik mahjong ways semakin terlihat di pg softstrategi mahjong ways untuk terjun di permainan online semakin meningkatkan di tahun 2026struktur permainan mahjong ways dengan penilaian casino onlinestudi banding teknik wild bounty showdown pastikan roulette alami peningkatan Top