5G Network Slicing: Deutsche Telekom and Ericsson’s Secure Private Cloud Solution

Deutsche Telekom and Ericsson have developed a secure 5G network slicing that directly connects to a private cloud, addressing enterprise concerns over adopting edge use cases. The proof-of-concept has significant implications for the future of 5G technology, particularly around network slicing, with the potential to provide premium, revenue-generating services. However, security concerns persist, highlighting the need for careful management of network slices.
5G NETWORK SLICING: DEUTSCHE TELEKOM AND ERICSSON’S SECURE PRIVATE CLOUD SOLUTION
Image Credit: DEUTSCHE TELEKOM

Deutsche Telekom, the leading German telecom company, and Ericsson, its supplier partner, have announced that they have developed a secure 5G network slicing that can directly link to a private cloud. This development aims to address the concerns of enterprises about implementing edge use cases supported by emerging 5G technology norms.


Network slicing is considered a crucial feature of a 5G SA deployment, enabling the operator to set up discrete virtual networks that function as independent networks, thus facilitating premium, revenue-earning services.

The proof-of-concept (PoC), named after the project, was executed on a 5G standalone (SA) testbed in Deutsche Telekom’s lab with an enterprise smartphone connected to a predetermined set of private cloud applications. Ericsson supplied the 5G core, the radio access network (RAN), and the complete orchestration.

The trial incorporated mobile device management (MDM) and user equipment route selection policy (URSP) to evaluate and validate an application-level device configuration. It also employed TM Forum-based APIs to assimilate third-party management interfaces that enable external management systems to integrate slice ordering and management.

The organizations confirmed that the validated service offers a unified management interface for “automated configuration, provisioning, and complete orchestration of the enterprise slicing service order” and “can be activated without the user requiring any additional setup on their enterprise devices.”

The companies stated, “Enterprise staff can subsequently access private cloud-based applications on their enterprise smartphone device via a secure network slice over the public network.” They further added, “The enterprise administrator can also utilize a range of analytics services in the integrated solution to monitor and analyze the use of the customized network slice.”

This latest PoC is based on prior collaborations between Deutsche Telekom and Ericsson, including a trial in mid-2021 that utilized Ericsson’s 5G SA core and a Samsung smartphone to support a mobile gaming service.

The financial advantages of network slicing have long been emphasized by analyst firms, especially in the context of penetrating various market sectors.

ABI Research predicted as early as 2018 that 5G network slicing would generate “$66 billion in value for enterprise verticals including manufacturing, logistics, and transportation by 2026.” The research firm also recently highlighted that operators need to focus on 5G slice-as-a-service and other ‘value-added services’ crucial for monetization.

Abdul Rahman, associate VP at Deloitte, explained in a presentation at the last year’s RSA Conference that potential vulnerabilities exist, allowing attackers to exploit one network slice and potentially breaching a device operating in an adjacent network slice. These concerns have grown with the recent trend to open up network APIs further, enabling operators to monetize their 5G network investments better.

Rahman further explained the importance of identifying the location of an organization’s most valuable assets, termed “crown jewels,” within network slices. He emphasized that it’s crucial to know which hosts are in proximity to where these “crown jewels” are situated.


Recent Content

Cloud-based inventory management software is transforming how businesses handle their inventory, offering real-time tracking, cost savings, and enhanced collaboration. Unlike traditional systems, cloud-based solutions provide scalability, live data insights, and seamless integration, enabling businesses to efficiently manage orders, track stock, and optimize decision-making. With features like automated backups, powerful analytics, and 24/7 accessibility, companies can reduce costs and streamline operations.
Paul Warburton, Chief Digital and Marketing Officer NSC takes a look at the importance of prioritising the customer experience in the rapidly evolving landscape of technology, particularly with the advent of AI, 5G, and IoT. He warns that businesses risk stagnation if they focus solely on adopting cutting-edge technologies without aligning them with customer needs. The convergence of AI, IoT, and 5G is transforming industries and creating new possibilities, but this progress must be balanced with considerations of privacy, sustainability, and accessibility.
Boldyn Networks and West Sussex County Council are launching a £3.8M project to transform food and wine production through private 5G networks. The Growing Sussex 5G Innovation Region aims to boost sustainability and productivity in agriculture with technologies like AI, automation, and real-time data monitoring. The initiative also focuses on bridging the digital skills gap in the sector, supporting local businesses and educational institutions.
5G private networks are transforming airport operations, enabling smart, data-driven environments. As air travel continues to grow, robust wireless connectivity is key to improving operational efficiency, safety, and passenger experience. Join the discussion on 5G and aviation at MWC Las Vegas’ Connected Aviation Summit, featuring insights from industry leaders.
As VoLTE becomes the standard for voice communication, its rapid deployment exposes telecom networks to new security risks, especially in roaming scenarios. SecurityGen’s research uncovers key vulnerabilities like unauthorized access to IMS, SIP protocol threats, and lack of encryption. Learn how to strengthen VoLTE security with proactive measures such as audits, session border controllers, and network segmentation.

Currently, no free downloads are available for related categories. Search similar content to download:

  • Reset

It seems we can't find what you're looking for.

Download Magazine

With Subscription

Subscribe To Our Newsletter

Scroll to Top

Private Network Readiness Assessment

Run your readiness check now — for enterprises, operators, OEMs & SIs planning and delivering Private 5G solutions with confidence.