5G Network Slicing: Deutsche Telekom and Ericsson’s Secure Private Cloud Solution

Deutsche Telekom and Ericsson have developed a secure 5G network slicing that directly connects to a private cloud, addressing enterprise concerns over adopting edge use cases. The proof-of-concept has significant implications for the future of 5G technology, particularly around network slicing, with the potential to provide premium, revenue-generating services. However, security concerns persist, highlighting the need for careful management of network slices.
5G NETWORK SLICING: DEUTSCHE TELEKOM AND ERICSSON’S SECURE PRIVATE CLOUD SOLUTION
Image Credit: DEUTSCHE TELEKOM

Deutsche Telekom, the leading German telecom company, and Ericsson, its supplier partner, have announced that they have developed a secure 5G network slicing that can directly link to a private cloud. This development aims to address the concerns of enterprises about implementing edge use cases supported by emerging 5G technology norms.


Network slicing is considered a crucial feature of a 5G SA deployment, enabling the operator to set up discrete virtual networks that function as independent networks, thus facilitating premium, revenue-earning services.

The proof-of-concept (PoC), named after the project, was executed on a 5G standalone (SA) testbed in Deutsche Telekom’s lab with an enterprise smartphone connected to a predetermined set of private cloud applications. Ericsson supplied the 5G core, the radio access network (RAN), and the complete orchestration.

The trial incorporated mobile device management (MDM) and user equipment route selection policy (URSP) to evaluate and validate an application-level device configuration. It also employed TM Forum-based APIs to assimilate third-party management interfaces that enable external management systems to integrate slice ordering and management.

The organizations confirmed that the validated service offers a unified management interface for “automated configuration, provisioning, and complete orchestration of the enterprise slicing service order” and “can be activated without the user requiring any additional setup on their enterprise devices.”

The companies stated, “Enterprise staff can subsequently access private cloud-based applications on their enterprise smartphone device via a secure network slice over the public network.” They further added, “The enterprise administrator can also utilize a range of analytics services in the integrated solution to monitor and analyze the use of the customized network slice.”

This latest PoC is based on prior collaborations between Deutsche Telekom and Ericsson, including a trial in mid-2021 that utilized Ericsson’s 5G SA core and a Samsung smartphone to support a mobile gaming service.

The financial advantages of network slicing have long been emphasized by analyst firms, especially in the context of penetrating various market sectors.

ABI Research predicted as early as 2018 that 5G network slicing would generate “$66 billion in value for enterprise verticals including manufacturing, logistics, and transportation by 2026.” The research firm also recently highlighted that operators need to focus on 5G slice-as-a-service and other ‘value-added services’ crucial for monetization.

Abdul Rahman, associate VP at Deloitte, explained in a presentation at the last year’s RSA Conference that potential vulnerabilities exist, allowing attackers to exploit one network slice and potentially breaching a device operating in an adjacent network slice. These concerns have grown with the recent trend to open up network APIs further, enabling operators to monetize their 5G network investments better.

Rahman further explained the importance of identifying the location of an organization’s most valuable assets, termed “crown jewels,” within network slices. He emphasized that it’s crucial to know which hosts are in proximity to where these “crown jewels” are situated.


Recent Content

The pressure to adopt artificial intelligence is intense, yet many enterprises are rushing into deployment without adequate safeguards. This article explores the significant risks of unchecked AI deployment, highlighting examples like the UK Post Office Horizon scandal, Air Canada’s chatbot debacle, and Zillow’s real estate failure to demonstrate the potential for financial, reputational, and societal damage. It examines the pitfalls of bias in training data, the problem of “hallucinations” in generative AI, and the economic and societal costs of AI failures. Emphasizing the importance of human oversight, data quality, explainability, ethical guidelines, and robust security, the article urges organizations to proactively navigate the challenges of AI adoption. It advises against delaying implementation, as competitors are already integrating AI, and advocates for a cautious, informed approach to mitigate risks and maximize the potential for success in the AI era.
The emergence of 6G networks marks a paradigm shift in the way wireless systems are conceived and managed. Unlike its predecessors, 6G will embed Artificial Intelligence (AI) as a native capability across all network layers, enabling real-time adaptability, intelligent orchestration, and autonomous decision-making. This paper explores the symbiosis between AI and 6G, highlighting key applications such as predictive analytics, alarm correlation, and edge-native intelligence. Detailed insights into AI model selection and architecture are provided to bridge the current technical gap. Finally, the cultural and organizational changes required to realize AI-driven 6G networks are discussed. A graphical abstract is suggested to visually summarize the proposed architecture.
Telecom engineers know OSS systems aren’t broken—they just pretend to work. Outdated data, broken integrations, and overwhelming alerts create false confidence and slow operations. Discover how VC4’s Service2Create delivers real-time, trusted inventory and smarter workflows that engineers can actually rely on.
As the telecom world accelerates toward 5G-Advanced and sets its sights on 6G, artificial intelligence (AI) is no longer a peripheral technology — it is becoming the brain of the mobile network. AI-driven Radio Access Networks (RANs), and increasingly AI-native architectures, are reshaping how operators design, optimize, and monetize their networks. From zero-touch automation to intelligent spectrum management and edge AI services, the integration of AI and machine learning (ML) is unlocking both operational efficiencies and new business models.

This article explores the evolution of AI in the RAN, the architectural shifts needed to support it, the critical role of Open RAN, and the most promising AI use cases from the field. For telcos, this is not just a technical upgrade — it is a strategic inflection point.
ZTE and e& UAE have completed a successful Private 5G Network trial, showcasing high uplink speeds, multi-band adaptability, and ZTE’s NodeEngine Edge Computing platform. This trial enables rapid deployment, stronger enterprise connectivity, and practical use cases for smart industries, aligning with the UAE’s goal of becoming a digital innovation leader.
The City of Istres, France, partners with Ericsson, SPIE, and Unitel to deploy a cost-efficient Private 5G Network. This smart city blueprint reduces surveillance camera installation costs by over 80%, improves secure emergency communications, and leverages Edge Computing for AI-ready urban security. Istres sets a precedent for mid-sized European cities modernizing connectivity and resilience.
Whitepaper
Explore the Private Network Edition of 5G Magazine, your guide to the latest in private 5G/LTE and CBRS networks. This edition spotlights 11 award categories including private 5G/LTE leader, neutral host leader, and rising startups. It features insights from industry leaders like Jason Wallin of John Deere and an analysis...
Whitepaper
Discover the potential of mobile networks in modern warfare through our extensive whitepaper. Dive into its strategic significance, understand its security risks, and gain insights on optimizing mobile networks in critical situations. An essential guide for defense planners and cybersecurity enthusiasts....

It seems we can't find what you're looking for.

Download Magazine

With Subscription

Subscribe To Our Newsletter

Scroll to Top

Private Network Readiness Assessment

Run your readiness check now — for enterprises, operators, OEMs & SIs planning and delivering Private 5G solutions with confidence.