5G Network Slicing: Deutsche Telekom and Ericsson’s Secure Private Cloud Solution

Deutsche Telekom and Ericsson have developed a secure 5G network slicing that directly connects to a private cloud, addressing enterprise concerns over adopting edge use cases. The proof-of-concept has significant implications for the future of 5G technology, particularly around network slicing, with the potential to provide premium, revenue-generating services. However, security concerns persist, highlighting the need for careful management of network slices.
5G NETWORK SLICING: DEUTSCHE TELEKOM AND ERICSSONโ€™S SECURE PRIVATE CLOUD SOLUTION
Image Credit: DEUTSCHE TELEKOM

Deutsche Telekom, the leading German telecom company, and Ericsson, its supplier partner, have announced that they have developed a secure 5G network slicing that can directly link to a private cloud. This development aims to address the concerns of enterprises about implementing edge use cases supported by emerging 5G technology norms.


Network slicing is considered a crucial feature of a 5G SA deployment, enabling the operator to set up discrete virtual networks that function as independent networks, thus facilitating premium, revenue-earning services.

The proof-of-concept (PoC), named after the project, was executed on a 5G standalone (SA) testbed in Deutsche Telekom’s lab with an enterprise smartphone connected to a predetermined set of private cloud applications. Ericsson supplied the 5G core, the radio access network (RAN), and the complete orchestration.

The trial incorporated mobile device management (MDM) and user equipment route selection policy (URSP) to evaluate and validate an application-level device configuration. It also employed TM Forum-based APIs to assimilate third-party management interfaces that enable external management systems to integrate slice ordering and management.

The organizations confirmed that the validated service offers a unified management interface for “automated configuration, provisioning, and complete orchestration of the enterprise slicing service order” and “can be activated without the user requiring any additional setup on their enterprise devices.”

The companies stated, “Enterprise staff can subsequently access private cloud-based applications on their enterprise smartphone device via a secure network slice over the public network.” They further added, “The enterprise administrator can also utilize a range of analytics services in the integrated solution to monitor and analyze the use of the customized network slice.”

This latest PoC is based on prior collaborations between Deutsche Telekom and Ericsson, including a trial in mid-2021 that utilized Ericssonโ€™s 5G SA core and a Samsung smartphone to support a mobile gaming service.

The financial advantages of network slicing have long been emphasized by analyst firms, especially in the context of penetrating various market sectors.

ABI Research predicted as early as 2018 that 5G network slicing would generate “$66 billion in value for enterprise verticals including manufacturing, logistics, and transportation by 2026.” The research firm also recently highlighted that operators need to focus on 5G slice-as-a-service and other ‘value-added services’ crucial for monetization.

Abdul Rahman, associate VP at Deloitte, explained in a presentation at the last year’s RSA Conference that potential vulnerabilities exist, allowing attackers to exploit one network slice and potentially breaching a device operating in an adjacent network slice. These concerns have grown with the recent trend to open up network APIs further, enabling operators to monetize their 5G network investments better.

Rahman further explained the importance of identifying the location of an organizationโ€™s most valuable assets, termed “crown jewels,” within network slices. He emphasized that it’s crucial to know which hosts are in proximity to where these “crown jewels” are situated.


Recent Content

FinTech, private 5G networks, and AI are converging to reshape digital finance across industries. From embedded payments and super apps to AI-driven credit scoring and secure M2M transactions, this $2 trillion opportunity is powered by mobile technology, cloud infrastructure, and regulatory evolution. Leaders must act fast to unlock new revenue, scale inclusion, and secure digital ecosystems.
The future of sports and entertainment is fan-first, immersive, and data-driven. Powered by D2C models, 5G networks, AI content creation, and super apps, industry leaders are reimagining fan experiencesโ€”from Bundesliga’s mobile strategy to Web2.5’s tokenized communities. The shift is not just technical but cultural, prioritizing personalization, monetization, and real-time interaction across every touchpoint.
As one of the worldโ€™s fastest-growing digital economies, India is emerging as a key battleground for 5G expansion. While countries like China and South Korea have led the global 5G race, Indiaโ€™s rapid deployment and sheer market scale make its progress especially noteworthy. With over 1.4 billion people and a thriving mobile-first economy, Indiaโ€™s 5G rollout is not just about faster connectivityโ€”itโ€™s about reshaping industries, enabling smart cities, and unlocking new economic opportunities.
Southern Linc has teamed up with OneLayer to upgrade its CriticalLinc LTE network, focusing on advanced network management and robust security measures. This partnership enhances device management and threat detection, ensuring high reliability for critical communications.
At MWC Barcelona 2025, the O-RAN ALLIANCE showcased significant progress in AI-driven Radio Access Network (RAN) technologies and strategies for 6G standardization. Their approach focuses on interoperability, enhanced security measures, and fostering global collaboration for future mobile networks.

Download Magazine

With Subscription
Whitepaper
As VoLTE becomes the standard for voice communication, its rapid deployment exposes telecom networks to new security risks, especially in roaming scenarios. SecurityGenโ€™s research uncovers key vulnerabilities like unauthorized access to IMS, SIP protocol threats, and lack of encryption. Learn how to strengthen VoLTE security with proactive measures such as...
Whitepaper
Dive into the comprehensive analysis of GTPu within 5G networks in our whitepaper, offering insights into its operational mechanics, strategic importance, and adaptation to the evolving landscape of cellular technologies....

It seems we can't find what you're looking for.

Subscribe To Our Newsletter

Scroll to Top