EnterpriseWeb and Fortinet Demonstrate Adaptive Security for 5G Edge Networks

The rise of edge networking and distributed applications exponentially increases the attack surface for both the enterprise and Telecom infrastructure. EnterpriseWeb and Fortinet have partnered on award-winning solutions that continuously observe, manage and secure 5G multi-access edge computing (MEC) end-to-end. Together, EnterpriseWeb and Fortinet are providing an intelligent SASE solution that provides end-to-end protection spanning network infrastructure (control plane), network traffic (user plane), and application security. To see the advanced capabilities in action, watch the replay of their latest demo in collaboration with Intel, Microsoft and KX - “Secure Dev-centric Networking with CAMARA APIs”.
EnterpriseWeb and Fortinet Demonstrate Adaptive Security for 5G Edge Networks

Adaptive Security for 5G Edge Networks

The rise of edge networking and distributed applications exponentially increases the attack surface for both the enterprise and Telecom infrastructure. EnterpriseWeb and Fortinet have partnered on award-winning solutions that continuously observe, manage and secure 5G multi-access edge computing (MEC) end-to-end. By Dave Duggal, founder and CEO of EnterpriseWeb and Ronen Shpirer, Director, Telco Solutions Marketing at Fortinet.


The Telecom industry is following in the footsteps of the Cloud providers, seeking to expose APIs to developers so they can design applications that can dynamically access and control network infrastructure. It opens the door to network-aware business applications that can dynamically scale resources up and down on-demand to ensure optimized performance, while maintaining efficiency. This is particularly attractive at the edge, where resources are constrained and local processing is limited.

Of course, with great power comes great responsibility. Exposing network data and controls to the Developer community opens the network to a new set of exploits. Integrated solutions from EnterpriseWeb and Fortinet close the gaps to protect both the business applications and the Telco infrastructure from exploits.

While there are emerging standards for developer-facing APIs (e.g., Linux Foundation CAMARA; GSMA Open Gateway; ETSI Network Exposure Function), there is no common model or shared library to support their implementations. This is a roadblock to adoption and leads to one-off implementations, which makes management, including security management, more difficult.

EnterpriseWeb Intelligent Orchestration

EnterpriseWeb offers an AI-enabled no-code platform. The cloud-native automation platform can deploy at the data center, in the cloud or at the edge. At only 50mb, the platform provides lightweight, low-latency, high-performance middleware capabilities in an edge-optimized form factor to keep processing local. EnterpriseWeb nodes can also connect in a peer-to-peer network to form a mesh network or “application fabric”.

EnterpriseWeb uses graph domain models to support intelligent orchestration. The graph efficiently provides the necessary context to optimize interactions. It acts as a single source of truth so developers can rapidly design smart, network-aware business apps that dynamically and continuously optimize latency, bandwidth and resources.

The platform provides a consistent developer experience, simplifies and automates IT tasks, and enables centralized management. As part of its role, the intelligent orchestrator continuously observes and manages all deployed services and the underlying infrastructure to ensure security, scalability and performance.

In the joint solution, Fortinet FortiWeb provides application and API security and Fortinet FortiGate provides Next Generation Firewall and 5G cybersecurity, securing all the endpoints and protecting user and control plane traffic.

Since application workloads and deployment environments vary, EnterpriseWeb dynamically configures FortiWeb and FortiGate so they are optimized for each use-case. Post deployment, EnterpriseWeb continues to monitor application activity and network usage and reconfigures Fortinet’s products to maintain security levels based on real-time network context. Static security configurations present an unacceptable risk.

Dynamic Security Configuration

  • EnterpriseWeb identifies assigned CP Subnet(s) via CNI Mapping (at time of initial deployment) and for all Function / Component Pods and Containers identifies virtual port assignments / IPs (translated from OpenShift APIs)
  • EnterpriseWeb identifies SDN level IPsec Tunnels (Point-to-Point) between components (from underlying CNI, Service Mesh, Network OS) and dynamically configures FortiGate to monitor and secure each / all such tunnels, adding and removing as the service evolves (scales, heals, etc.).
  • As security demands change, EnterpriseWeb scales FortiGate and/or adjusts networking to prioritize traffic to reflect evolving application behavior

Fortinet Adaptive Security

Fortinet’s market-leading security products also leverage AI to continuously optimize their own behavior. In addition to traditional negative and positive security models (attack signatures, IP address reputation, protocol validation, etc.), FortiWeb applies a second layer of machine learning-based analytics to detect and block malicious anomalies while minimizing false positives. Fortinet’s Adaptive Security ensures that protections are continuously responding to the volatile network and changing threats.

Together, EnterpriseWeb and Fortinet are providing an intelligent SASE solution that provides end-to-end protection spanning network infrastructure (control plane), network traffic (user plane), and application security. To see the advanced capabilities in action, watch the replay of their latest demo in collaboration with Intel, Microsoft and KX – “Secure Dev-centric Networking with CAMARA APIs”.


Recent Content

Batelco by Beyon and Nokia are partnering to launch Bahrain’s first private 5G network at Aluminum Bahrain (Alba). The network will drive smart manufacturing through real-time monitoring, automation, and AI-driven analytics—paving the way for Alba’s digital transformation and advancing Bahrain’s Industry 4.0 strategy.
AT&T reported strong Q1 2025 earnings with EPS of $0.51 and $30.6B in revenue, boosted by 324K new postpaid wireless subscribers and 181K FWA additions. The telecom giant also expanded its fiber footprint by 600,000 locations and reaffirmed its commitment to broadband growth and copper retirement by 2029.
Verizon posted better-than-expected Q1 2025 earnings, with revenue and profits rising. But a record loss of 289,000 postpaid phone subscribers sent the stock down, as investors focused more on churn than cash flow. While prepaid gains and stable guidance offered some optimism, analysts remain cautious about Verizon’s subscriber strategy and pricing pressure.
President Trump’s executive order to modernize environmental permitting may streamline U.S. infrastructure projects—but it notably omits telecom and broadband. Industry experts say pole attachments, state permitting rules, and access to federal lands remain critical hurdles. While the order could bring indirect benefits, real telecom reform still requires sector-specific solutions.
Airtel has acquired 400 MHz of 26 GHz mmWave spectrum from Adani Data Networks, a move that strengthens its high-speed 5G offerings in urban and enterprise zones. The deal enhances Airtel’s ability to scale fixed wireless access, industrial 5G networks, and high-bandwidth consumer services. With India’s spectrum demand surging, this acquisition underscores the critical role of efficient spectrum use and signals a new phase of telecom consolidation.
ETSI has published its first ISAC report for 6G—ETSI GR ISC 001—highlighting 18 use cases across healthcare, public safety, automation, and mobility. The report dives into deployment scenarios, sensing modalities, and KPIs like fine motion accuracy and sensing latency. It also outlines security, privacy, and sustainability guidelines for real-world ISAC integration into 6G networks.
Whitepaper
As VoLTE becomes the standard for voice communication, its rapid deployment exposes telecom networks to new security risks, especially in roaming scenarios. SecurityGen’s research uncovers key vulnerabilities like unauthorized access to IMS, SIP protocol threats, and lack of encryption. Learn how to strengthen VoLTE security with proactive measures such as...
Whitepaper
Dive into the comprehensive analysis of GTPu within 5G networks in our whitepaper, offering insights into its operational mechanics, strategic importance, and adaptation to the evolving landscape of cellular technologies....

It seems we can't find what you're looking for.

Download Magazine

With Subscription

Subscribe To Our Newsletter

Scroll to Top