{"id":132208,"date":"2021-05-05T06:00:00","date_gmt":"2021-05-05T13:00:00","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=132208"},"modified":"2021-05-05T05:38:11","modified_gmt":"2021-05-05T12:38:11","slug":"secure-5g-nccoe-technology-partner","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2021\/05\/secure-5g-nccoe-technology-partner\/","title":{"rendered":"A Secure 5G: US Cyber Center of Excellence Selects Palo Alto Networks"},"content":{"rendered":"<p>Ensuring the underlying security of our 5G-dependent future is a generational challenge and Palo Alto Networks is committed to being at the forefront. We\u2019re honored to announce our selection as a technology partner in the <a href=\"https:\/\/www.nccoe.nist.gov\/\" rel=\"nofollow,noopener\" >National Cybersecurity Center of Excellence<\/a> (NCCoE) 5G Cybersecurity project. As part of the project, Palo Alto Networks will work alongside other industry-leading collaborators to identify key 5G use cases and demonstrate how 5G architectures, including cloud-based architectures, can be effectively secured.<\/p>\n<p>In March 2021, the United States National Institute of Standards and Technology\u2019s (NIST) NCCoE published the <a href=\"https:\/\/www.nccoe.nist.gov\/sites\/default\/files\/library\/sp1800\/nist-5G-sp1800-33a-preliminary-draft.pdf\" rel=\"nofollow,noopener\" >Executive Summary<\/a> (Volume A) of a three-part 5G Security Practice Guide, a significant milestone in ensuring higher cybersecurity standards as the U.S. and the world transition to 5G. As part of the ongoing effort, Palo Alto Networks is providing our Next-Generation Firewalls to create an industry standard reference architecture that demonstrates how organizations can meet the unique cybersecurity requirements of 5G and next-generation networks.<\/p>\n<p>While 5G networks have the potential to massively transform businesses, with the ability to provide a higher volume of data at faster speeds, their hyper-connected capability can also open the door to new security vulnerabilities and threat vectors. Existing security practices and legacy solutions won\u2019t meet the needs of the new requirements; this challenge requires enterprise-grade cybersecurity protections. Organizations need confidence that 5G networks and services have <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/09\/netsec-top-5-5g-security-considerations\/\">enterprise-grade security<\/a> with granular visibility and control across all layers and at key locations of the network.<\/p>\n<p>To help keep networks, services and endpoints safe against evolving threats, Palo Alto Networks <a href=\"https:\/\/www.paloaltonetworks.com\/company\/press\/2020\/palo-alto-networks-launches-industry-s-first-5g-native-security-offering--enabling-service-providers-and-enterprises-to-create-new-revenue-streams-while-securing-5g\">launched the industry\u2019s first 5G-native security offering<\/a>, with real-time, automated cloud-delivered threat intelligence powered by machine learning. This offering helps detect and correlate real-time attacks, threats and vulnerabilities through automatic and intelligent security enforcements and dynamic <a href=\"https:\/\/docs.paloaltonetworks.com\/service-providers\/10-0\/mobile-network-infrastructure-getting-started\/5g-security\/5g-network-slice-security\">5G slice security<\/a>.<\/p>\n<p>Lee Klarich, chief product officer at Palo Alto Networks, said, \u201cA secure transition to 5G is key to enabling digital transformation across many industries, such as healthcare, business-critical IoT, critical infrastructure, government, financial services and service provider. At Palo Alto Networks, we are securing networks, clouds and devices in the 5G world with the industry's first 5G-native security offering, enabling service providers and enterprises to turn 5G networks into highly secure networks. NIST is a leading trusted resource for government agencies and private sector organizations, and we are thrilled to offer our expertise and experience to NCCoE\u2019s 5G Cybersecurity Project.\u201d<\/p>\n<p>Kevin Stine, chief of the Applied Cybersecurity Division at NIST, said, \u201c5G is fundamental to our digitally connected future and we\u2019re honored to work with industry-leading 5G technology providers, including Palo Alto Networks, to develop a standards-based approach to securing the transition to 5G.\u201d<\/p>\n<p>NCCoE, a division of NIST, is a public-private collaborative hub which brings together industry, government and academia to solve government and businesses\u2019 most pressing cybersecurity challenges.<\/p>\n<p>For more information about this project or to download the first volume of this report, please visit <a href=\"https:\/\/www.nccoe.nist.gov\/projects\/building-blocks\/5g-cybersecurity\" rel=\"nofollow,noopener\" >NCCoE\u2019s page on 5G cybersecurity<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are honored to announce our selection as a technology partner in the National Cybersecurity Center of Excellence (NCCoE) 5G Cybersecurity Project.<\/p>\n","protected":false},"author":184,"featured_media":132209,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6769],"tags":[3904,183],"coauthors":[1878],"class_list":["post-132208","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-public-sector","tag-5g","tag-nist","net_sec_category-5g-security"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2021\/05\/Using-Phone-at-Night.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/132208","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/184"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=132208"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/132208\/revisions"}],"predecessor-version":[{"id":132222,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/132208\/revisions\/132222"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/132209"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=132208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=132208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=132208"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=132208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}