Top 30 – Global Security Startups

Who are the global security startups that are innovating to solve the security challenges, including protecting public and private networks?

Log In or Register to Access This Content

Login
Register
Login with LinkedIn

Related Magazine Content

Earlier telecommunication systems were proprietary and purpose-built systems developed on a monolithic architecture. These systems ensured that telcos or enterprise entities were struck in a vendor lock-in model, scaling up on different telco-grade applications was time-sensitive, and innovation and automation depended on strategies adopted by OEMs. But time has shown us how telecommunication systems have fundamentally changed and evolved for good.
An in-depth interview with Geoff Hollingworth, Chief Marketing Officer at Rakuten Symphony covering Rakuten Mobile’s Open RAN Journey, including the rationale behind opting for Open RAN solution, the current state of their Open RAN deployment, their success, the challenges they addressed, the solution approach, architecture blueprint and recommendations to operators on the Open RAN journey.
An interview with Francisco (Paco) Martรญn, Head of Open RAN for Vodafone Group focusing on Vodafone’s system integration model for Open RAN adoption. What happens if traditional model is applied to OPEN RAN system integration? How system integration can be done in lab? What is the proposed lab model? What are the benefits? How to do remote system integration? How to manage network operations?
How are operators and businesses protecting their public and private 5G/LTE network deployments? What difficulties are they encountering? What solutions and approaches do they have for securing the network? What role does standardization play in ensuring the networks’ security? How is the industry innovating to tackle those obstacles?
The automotive industry is undergoing a revolutionary change towards software-defined vehicles, 5G connectivity, and autonomy. To cope with this change, the vehicle ecosystem has had to rapidly evolve, leading to the emergence of new potential attack surfaces and target methods. This article focuses on the landscape of vehicle attacks, challenges faced by the Auto OEMs, and the revolutionary approach taken by HARMAN where they build a safety net for customers through anomaly detection and attack prevention.
In todayโ€™s world, the network’s security is of prime importance. It’s on the top of the mind of everyone, be it the CEO, CSIO, the CTO, or the CMO. Moreover, itโ€™s an important topic in all boardroom conversations as glitches in security will impact the brand.”
Public cellular networks have been around for years, and many security tools keep them running. Likewise, enterprise IoT networks are not new, and a wide variety of great security solutions have been developed to protect these networks. So why is a different security solution necessary for private cellular networks?
Can mobile operators use 5G to enhance security and monetize their networks at the same time? The answer is an emphatic Yes! 5G has functions such as NEF (Network Exposure Function) that expose the vast capabilities of Mobile Networks using standardized APIs. It allows mobile operators and private network operators to provide new services and monetize their networks.
Interview with Michael J. Zeto III, Chief Commercial Officer (CCO) at Boingo Wireless, about their public/private 5G Network deployments. We cover Boingo’s private network deployments at Chicago Oโ€™Hare, Dallas Love Field Airports, and Las Vegas Monorail Convention Center Station, in addition to their wider deployment for the transportation sector including Metropolitan Transportation Authority (MTA) in New York, London Heathrow Airport, and Brazil Airports.
Whitepaper
Explore the Private Network Edition of 5G Magazine, your guide to the latest in private 5G/LTE and CBRS networks. This edition spotlights 11 award categories including private 5G/LTE leader, neutral host leader, and rising startups. It features insights from industry leaders like Jason Wallin of John Deere and an analysis...
Whitepaper
Discover the potential of mobile networks in modern warfare through our extensive whitepaper. Dive into its strategic significance, understand its security risks, and gain insights on optimizing mobile networks in critical situations. An essential guide for defense planners and cybersecurity enthusiasts....

It seems we can't find what you're looking for.

Download Magazine

With Subscription

Subscribe To Our Newsletter

Scroll to Top