5G Network Slicing: Deutsche Telekom and Ericsson’s Secure Private Cloud Solution

Deutsche Telekom and Ericsson have developed a secure 5G network slicing that directly connects to a private cloud, addressing enterprise concerns over adopting edge use cases. The proof-of-concept has significant implications for the future of 5G technology, particularly around network slicing, with the potential to provide premium, revenue-generating services. However, security concerns persist, highlighting the need for careful management of network slices.
5G NETWORK SLICING: DEUTSCHE TELEKOM AND ERICSSONโ€™S SECURE PRIVATE CLOUD SOLUTION
Image Credit: DEUTSCHE TELEKOM

Deutsche Telekom, the leading German telecom company, and Ericsson, its supplier partner, have announced that they have developed a secure 5G network slicing that can directly link to a private cloud. This development aims to address the concerns of enterprises about implementing edge use cases supported by emerging 5G technology norms.


Network slicing is considered a crucial feature of a 5G SA deployment, enabling the operator to set up discrete virtual networks that function as independent networks, thus facilitating premium, revenue-earning services.

The proof-of-concept (PoC), named after the project, was executed on a 5G standalone (SA) testbed in Deutsche Telekom’s lab with an enterprise smartphone connected to a predetermined set of private cloud applications. Ericsson supplied the 5G core, the radio access network (RAN), and the complete orchestration.

The trial incorporated mobile device management (MDM) and user equipment route selection policy (URSP) to evaluate and validate an application-level device configuration. It also employed TM Forum-based APIs to assimilate third-party management interfaces that enable external management systems to integrate slice ordering and management.

The organizations confirmed that the validated service offers a unified management interface for “automated configuration, provisioning, and complete orchestration of the enterprise slicing service order” and “can be activated without the user requiring any additional setup on their enterprise devices.”

The companies stated, “Enterprise staff can subsequently access private cloud-based applications on their enterprise smartphone device via a secure network slice over the public network.” They further added, “The enterprise administrator can also utilize a range of analytics services in the integrated solution to monitor and analyze the use of the customized network slice.”

This latest PoC is based on prior collaborations between Deutsche Telekom and Ericsson, including a trial in mid-2021 that utilized Ericssonโ€™s 5G SA core and a Samsung smartphone to support a mobile gaming service.

The financial advantages of network slicing have long been emphasized by analyst firms, especially in the context of penetrating various market sectors.

ABI Research predicted as early as 2018 that 5G network slicing would generate “$66 billion in value for enterprise verticals including manufacturing, logistics, and transportation by 2026.” The research firm also recently highlighted that operators need to focus on 5G slice-as-a-service and other ‘value-added services’ crucial for monetization.

Abdul Rahman, associate VP at Deloitte, explained in a presentation at the last year’s RSA Conference that potential vulnerabilities exist, allowing attackers to exploit one network slice and potentially breaching a device operating in an adjacent network slice. These concerns have grown with the recent trend to open up network APIs further, enabling operators to monetize their 5G network investments better.

Rahman further explained the importance of identifying the location of an organizationโ€™s most valuable assets, termed “crown jewels,” within network slices. He emphasized that it’s crucial to know which hosts are in proximity to where these “crown jewels” are situated.


Recent Content

ETSI has published its first ISAC report for 6Gโ€”ETSI GR ISC 001โ€”highlighting 18 use cases across healthcare, public safety, automation, and mobility. The report dives into deployment scenarios, sensing modalities, and KPIs like fine motion accuracy and sensing latency. It also outlines security, privacy, and sustainability guidelines for real-world ISAC integration into 6G networks.
In 2025, 5G surpasses 2.25 billion global connections, marking a pivotal shift toward mainstream adoption. While North America leads in performance and per capita usage, challenges in spectrum policy and enterprise integration remain. This in-depth report from 5G Americas explores the rise of Standalone 5G, the promise of 5G-Advanced, the reality of private network deployments, and the need for smart, forward-looking spectrum strategy.
Confidencial.io will unveil its unified AI data governance platform at RSAC 2025. Designed to secure unstructured data in AI workflows, the system applies object-level Zero Trust encryption and seamless compliance with NIST/ISO frameworks. It protects AI pipelines and agentic systems from sensitive data leakage while supporting safe, large-scale innovation.
The integration of tariffs and the EU AI Act creates a challenging environment for the advancement of AI and automation. Tariffs, by increasing the cost of essential hardware components, and the EU AI Act, by increasing compliance costs, can significantly raise the barrier to entry for new AI and automation ventures. European companies developing these technologies may face a double disadvantage: higher input costs due to tariffs and higher compliance costs due to the AI Act, making them less competitive globally. This combined pressure could discourage investment in AI and automation within the EU, hindering innovation and slowing adoption rates. The resulting slower adoption could limit the availability of crucial real-world data for training and improving AI algorithms, further impacting progress.
Low-code platforms like VC4’s Service2Create (S2C) are transforming telecom operations by accelerating service delivery, reducing manual tasks, and simplifying integration with legacy systems. Discover how this technology drives digital transformation, improves efficiency, and future-proofs telecom networks.
Samsung has launched two new rugged devicesโ€”the Galaxy XCover7 Pro smartphone and the Tab Active5 Pro tabletโ€”designed for high-intensity fieldwork in sectors like logistics, healthcare, and manufacturing. These devices offer military-grade durability, advanced 5G connectivity, and enterprise-ready security with Samsung Knox Vault. Features like hot-swappable batteries, gloved-touch sensitivity, and AI-powered tools enhance productivity and reliability in harsh environments.
Whitepaper
Explore the Private Network Edition of 5G Magazine, your guide to the latest in private 5G/LTE and CBRS networks. This edition spotlights 11 award categories including private 5G/LTE leader, neutral host leader, and rising startups. It features insights from industry leaders like Jason Wallin of John Deere and an analysis...
Whitepaper
Discover the potential of mobile networks in modern warfare through our extensive whitepaper. Dive into its strategic significance, understand its security risks, and gain insights on optimizing mobile networks in critical situations. An essential guide for defense planners and cybersecurity enthusiasts....

It seems we can't find what you're looking for.

Download Magazine

With Subscription

Subscribe To Our Newsletter

Scroll to Top