Singtel pioneers one of the world’s first 5G Security-as-a-Slice (SecaaS) capability

Singtel announced that it is one of the world’s first to have 5G Security-as-a-Slice (SecaaS) as a capability, which proactively identifies and blocks cyber threats at the network level, thus preventing them from reaching the network’s users. According to a survey by Singtel among its customers in December 2022, nine out of 10 users expressed concern about security but only three had installed cybersecurity applications to protect their digital assets.
SecurityGen unveils 5G Cyber-security Lab

Singtel announced that it is one of the world’s first to have 5G Security-as-a-Slice (SecaaS) as a capability, which proactively identifies and blocks cyber threats at the network level, thus preventing them from reaching the network’s users.


With the high level of mobile phone penetration in Singapore and the rapid pace of digitalization among consumers and businesses, the attack surface for cybercriminals and cyber attackers has enlarged exponentially. However, many users are not taking the necessary measures to protect themselves. According to a survey by Singtel among its customers in December 2022, nine out of 10 users expressed concern about security but only three had installed cybersecurity applications to protect their digital assets.

Anna Yip, Chief Executive Officer, Consumer Singapore, Singtel, said, “Everybody wants the peace of mind to enjoy the best digital experiences without having to worry about cyber threats. With SecaaS, we have taken security to the next level so that our customers can take advantage of the ultra-fast download speeds, high bandwidth and ultra-low latency of 5G while being protected from ever-evolving and increasingly sophisticated cyber threats.”

By combining Singtel’s leadership in 5G innovation and Palo Alto Networks expertise in 5G-native security, Machine Learning-Powered Next-Generation Firewalls (ML-Powered NGFW), and cloud-based cybersecurity products, Singtel are now able to offer customized, highly secure 5G virtual networks or “slices.” Cyber threats such as viruses, malware, spyware, phishing links, and malicious websites will be proactively identified and blocked in real-time at the network level, preventing them from getting to users’ mobile devices.

This means that the network’s users have some protections in place even if they have not installed any security applications. This also minimizes the impact on the user’s mobile experience and device battery life. In addition, a network-based security solution can protect all types of 5G network devices, including Internet of Things (IoT) devices, regardless of whether the platforms or operating systems are supported by device-based cybersecurity applications. Real-time security updates performed at the network level will also be able to provide protection against emerging threats without users’ intervention. Singtel will roll out its SecaaS service, for consumers and enterprises, in the coming months. More details can be found in Annex A.

“Sophisticated and evasive cyber attacks are on the rise as we see cybercriminals intensifying their efforts against people and organizations. While it is amazing to see the excitement around adopting 5G, the security of this technology must be constantly enhanced as it can be an enticing attack vector for bad actors. Users deserve comprehensive AI/ML-powered security that protects against highly evasive threats in order to have full confidence in their 5G solution. We are proud to collaborate with Singtel to help them build their SecaaS capability and unlock the full potential of 5G for their customers,” said Anand Oswal, senior vice president, Network Security at Palo Alto Networks.

SecaaS will be made commercially available in the coming months, beginning with Singtel’s 5G mobile subscribers.

For more information on Singtel’s network security measures and services, visit Singtel Secure.

Annex A

To deliver high levels of security, the SecaaS service takes advantage of a number of Palo Alto Networks products that harness deep learning – a subset of traditional machine learning that uses multi-layer artificial neural networks to analyse data the way a human would.

The key technologies found in the SecaaS service include the following products:

  • Palo Alto Networks 5G-Native security which delivers granular security for highly-distributed, cloud-native 5G networks, and includes real-time correlation of threats to 5G users and their device identifiers and 5G network slice security.
  • Advanced Threat Prevention – An Intrusion Prevention System (IPS) with an inline deep learning cloud engine to detect and prevent evasive Command & Control (C2) tactics and techniques in real-time. Advanced Threat Prevention analyses suspicious network sessions to provide a near real-time verdict on unknown C2 traffic and block the session inline.
  • Advanced URL Filtering which helps prevent new, highly evasive phishing attacks, ransomware and other web-based attacks through deep learning-powered analysis of web traffic live web content – in real time and inline.
  • DNS Security that helps prevent the latest DNS-based attack techniques, including strategically aged domains.
  • Advanced WildFire which uses intelligent run-time memory analysis combined with stealthy observation and automated unpacking to stay hidden from malware and defeat advanced evasions. This enables Advanced WildFire to stop more highly evasive zero-day malware than traditional sandboxes.

Recent Content

Edge AI is reshaping broadband customer experience by powering smart routers, proactive troubleshooting, conversational AI, and personalized Wi-Fi management. Learn how leading ISPs like Comcast and Charter use edge computing to boost reliability, security, and customer satisfaction.
The pressure to adopt artificial intelligence is intense, yet many enterprises are rushing into deployment without adequate safeguards. This article explores the significant risks of unchecked AI deployment, highlighting examples like the UK Post Office Horizon scandal, Air Canada’s chatbot debacle, and Zillow’s real estate failure to demonstrate the potential for financial, reputational, and societal damage. It examines the pitfalls of bias in training data, the problem of “hallucinations” in generative AI, and the economic and societal costs of AI failures. Emphasizing the importance of human oversight, data quality, explainability, ethical guidelines, and robust security, the article urges organizations to proactively navigate the challenges of AI adoption. It advises against delaying implementation, as competitors are already integrating AI, and advocates for a cautious, informed approach to mitigate risks and maximize the potential for success in the AI era.
The emergence of 6G networks marks a paradigm shift in the way wireless systems are conceived and managed. Unlike its predecessors, 6G will embed Artificial Intelligence (AI) as a native capability across all network layers, enabling real-time adaptability, intelligent orchestration, and autonomous decision-making. This paper explores the symbiosis between AI and 6G, highlighting key applications such as predictive analytics, alarm correlation, and edge-native intelligence. Detailed insights into AI model selection and architecture are provided to bridge the current technical gap. Finally, the cultural and organizational changes required to realize AI-driven 6G networks are discussed. A graphical abstract is suggested to visually summarize the proposed architecture.
Telecom engineers know OSS systems aren’t broken—they just pretend to work. Outdated data, broken integrations, and overwhelming alerts create false confidence and slow operations. Discover how VC4’s Service2Create delivers real-time, trusted inventory and smarter workflows that engineers can actually rely on.
As the telecom world accelerates toward 5G-Advanced and sets its sights on 6G, artificial intelligence (AI) is no longer a peripheral technology — it is becoming the brain of the mobile network. AI-driven Radio Access Networks (RANs), and increasingly AI-native architectures, are reshaping how operators design, optimize, and monetize their networks. From zero-touch automation to intelligent spectrum management and edge AI services, the integration of AI and machine learning (ML) is unlocking both operational efficiencies and new business models.

This article explores the evolution of AI in the RAN, the architectural shifts needed to support it, the critical role of Open RAN, and the most promising AI use cases from the field. For telcos, this is not just a technical upgrade — it is a strategic inflection point.
ZTE and e& UAE have completed a successful Private 5G Network trial, showcasing high uplink speeds, multi-band adaptability, and ZTE’s NodeEngine Edge Computing platform. This trial enables rapid deployment, stronger enterprise connectivity, and practical use cases for smart industries, aligning with the UAE’s goal of becoming a digital innovation leader.
Whitepaper
5G network rollouts are now sprouting around the globe as operators get to grips with the potential of new enterprise applications. Yet behind the scenes, several factors still could strongly impact just how transformative this technology will be in years to come. Ultimately, it will all boil down to one...
NetInsight Logo
Whitepaper
System integrators play a crucial role in the network ecosystem by bringing together various components and technologies from the diverse network ecosystem players to build, deploy, and operate comprehensive end-to-end solutions that meet the specific needs of their clients....
Tech Mahindra Logo

It seems we can't find what you're looking for.

Download Magazine

With Subscription

Subscribe To Our Newsletter

Scroll to Top