In The Arena by TechArena - Exploring the Leading Edge of Private Wireless Security with CTOne

Episode Date: March 26, 2024

TechArena host Allyson Klein chats with Hideyuki Tsugane, Vice President of Business Development at CTOne, about his organization’s vision of private wireless security and the staus of private 5G de...ployments as his company readies for a hockey stick of growth.

Transcript
Discussion (0)
Starting point is 00:00:00 Welcome to the Tech Arena, featuring authentic discussions between tech's leading innovators and our host, Alison Klein. Now, let's step into the arena. Welcome to the Tech Arena. My name is Alison Klein, and today I am very delighted to be joined by Hideyuki Sugana, VP of Business Development at CT1. Welcome to the program. Hi, Alison. Thanks for having me here. My name is Sugana. I'm in charge of sales and business development of CT1. So, CT1 is a new subsidiary of global cybersecurity giant Trend Micro. We are focusing on cybersecurity solution business for CT. CT stands for communication technology. CT1 is aiming to protect end users from cybersecurity concerns.コミュニケーションテクノロジーCT1はサイバーセキュリティーについてコミュニケーションテクノロジーを使用する人たちを
Starting point is 00:01:06 守りたいと考えています 新しい5Gワイヤレスを使用する人たち 会社は1年前に公開されました 5Gテクノロジーは今更成長しています 多くのエンタープライズユーザーは 自分のビジネス目的で5Gネットワークを建てることに興味があります Getting more matured and many enterprise users have interest in building their own 5G network for their own business purpose. C2.1 is offering cybersecurity solutions for 5G environment, including mobile endpoints, core network and radio access network. So, Sugana-san, I saw C2.1's booth at Mobile World Congress recently, and you had an incredible display of technology on hand.
Starting point is 00:01:48 Really impressive, given that you have only been in CT1 for one year. I did want to talk to you about one technology in particular. There's continued excitement about the proliferation of the edge, including edge networks. And the one thing that's gaining ground is organizations tapping private mobile networks to fuel edge requirements. What do you see in your customer base regarding ramp of private mobile networks?
Starting point is 00:02:19 Okay. So talking about the private 5G market, it is still in an early stage, but large enterprise customers are willing to embrace 5G for their digital transformation. We have already had our actual customer base of private 5G security. Several verticals clearly show strong motivation for leveraging 5G technologies, and they also have a high demand for security. For example, manufacturing, energy, oil and gas, transportation, and logistics, public sector like defense. They should be our major customers. Now, while 5G was created to be much more secure
Starting point is 00:03:08 than its Wi-Fi predecessor in this case, anytime that you have a mobile network deployment, you open the gates on risk of security attacks. What do you see as the security landscape in this space? So 5G standard itself is well considering security requirements. However, challenges implementation. Of course, human being develop private 5G system. It means we cannot avoid human errors, which cause vulnerabilities in the system.人間の間違いを起こすことですまたプライベート5Gは 多くのセグメントによって モバイルコア、ラジオアクセスネットワーク エッジコンピューティング、クラウド
Starting point is 00:03:54 そしてIoTデバイスです バラエティの間違いは エンドとエンドネットワークが広がっています ですから エンタープライズユーザーの end-to-end network. Therefore, it is so tough work for enterprise users to manage so many attack surfaces to secure entire network and users. How has the influence of AI impacted the security risk in this space? Okay, AI is also a big topic for the private mobile network.AIはプライベートモバイルネットワークの大きな話です一般的なアイデアは 悪い人やハッカーが
Starting point is 00:04:28 新しいマルウェアや サイバーアタックテクニックを 新しいアイデアを作ることにしています IT世界全体に起こっています プライベートモバイルネットワークは このトレンドからの影響もあります And so private mobile networks also have impact from this trend. And when we talk about specific AI use case for private mobile networks, AI is expected to be contributed to network management like operational automation by using AI.
Starting point is 00:05:02 However, this kind of automation would make network status or behaviors invisible. We are afraid of the hackers easily intrude network, but IT engineer or infosec people cannot be aware of that. Sugana-san, can you introduce us to C2.1's solutions for private mobile networks and how your engineers have tackled this security challenge? So typical security challenges in a private mobile network is how to manage vulnerabilities coming from 5G's open architecture, open source software, and various IoT devices.
Starting point is 00:05:49 Also, private 5G is quite a new technology for existing IT engineers or infosec people. It is a big challenge for them to cover security operations for private mobile network. CT1 is offering quite a unique solution using SIM card to tackle these challenges. We provide SIM card with small security software, which can be running inside SIM card and collect IoT device identities and behaviors in real time.インサイドシムカットとIoTデバイスのアイデンティティーや実際の行動を取り入れることができますまた ネットワークセキュリティバーチャルマシンを 近くに置いて モバイルコアに
Starting point is 00:06:34 ユーザーのトラフィックをモニターすることができます このコンポーネントは ユーザーのトラフィックを ユーザーのトラフィックを ユーザーのトラフィックを ユーザーのトラフィックを ユーザーのトラフィックを ユーザーのトラフィックを
Starting point is 00:06:41 ユーザーのトラフィックを ユーザーのトラフィックを ユーザーのトラフィックを ユーザーのトラフィックを ユーザーのトラフィックを ユーザーのトラフィックを ユーザーのトラフィックを ユーザーのトラフィックを
Starting point is 00:06:42 ユーザーのトラフィックを ユーザーのトラフィックを ユーザーのトラフィックを ユーザーのトラフィックをユーザーのトラフィックをユーザーのトラフィックをユーザーのトラフィックを Now, I know that we talked earlier about the fact that you had a very impressive showing at MWC24. What was new for you at that event? And do you have any announcements that you'd like to highlight from the conference? During Mobile World Congress last week, we announced our new security solution for Open RAN named Secure RAN.
Starting point is 00:07:21 Open RAN or O-RAN is much embracing open technologies and open software.オープンランはオープンテクノロジーやオープンソフトウェアを 多くの人が操作しています。 5Gラジオアクセスネットワークエリアに トレンドがあります。 しかし、オープンテクノロジー on 5G infrastructures. To avoid such security risks, we developed new cyber security solutions for all-round environments. Now, obviously, the world of security never stands still. So what is the next in mobile security and where does the industry need to focus in 2024 for future innovation?
Starting point is 00:08:06 Okay, so historically, people believed mobile network is more closed network. So it is enough secured. However, reality is private 5G is much more open. Customers can use private 5G for more various IoT devices and applications on the internet or cloud. Security is getting more important for customers who rely on mobile network. Moreover, in the near future, more users want to use a public mobile network and private mobile network together. They expect the same level of security no matter which network they are using. That should be a new demand which requires future innovation. Thank you so much for giving us these insights today, Suganasan.
Starting point is 00:09:29 I just have one more question for you. Where can people more articles or information on these medias. And of course, you can ask us directly to know more details. And also, our parent company, Trend Micro, provides information related to 5G or private 5G. Thank you. Thank you so much for the time today. It was a real pleasure catching up with you. And I look forward to hearing more about CT1 as we move forward. Thank you very much. Thanks for joining the Tech Arena. Subscribe and engage at our website, thetecharena.net. All content is copyright by The Tech Arena.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.