Enabling this first-of-its-kind protection is the new DOCOMO Cloud Platform Network Security Service, a solution that layers in security solutions from Trend Micro. The result is an easy-to-use security shield specifically for DOCOMO’s customers who are building infrastructure-as-a-service (IaaS) environments.
Until now, deploying a security solution on the DOCOMO Cloud Platform required customers to set up third-party products manually. This new service simplifies the deployment of security onto the DOCOMO Cloud Platform.
Telecom companies and service providers have long been planning for the impact of 5G. Now is the time to ensure the extra security risks posed by these smart endpoints at a network level are protected. Trend Micro is helping DOCOMO protect their customers’ data in cost-effective, easy-to-deploy ways.
Under the technical covers of this solution is Trend Micro’s Virtual Network Function Suite (VNFS), tested rigorously last year in the DOCOMO 5G Open Cloud.
In addition to verification in the 5G environment, verification has also been promoted in the 4G environment currently used by many customers. As a result of verification, DOCOMO concluded that this solution is effective in the environments with increased opportunity for IoT security threats. Therefore, they decided to provide this solution for 4G environments as part of DOCOMO Cloud Platform.
“The promise and potential of 5G has the world waiting but let me issue a warning for the need for extra protection. Smarter endpoints mean a greater cyber risk to manage,” said Akihiko Omikawa, executive vice president for Trend Micro. “We’re delighted and proud that our technology meets the needs of this global mobile phone leader. Together our joint solution delivers cloud infrastructure capabilities integrated with IoT-ready security customized for modern data centers.”
Trend Micro’s telecom solution, VNFS, offers service providers a range of security functionality including intrusion prevention, URL filtering and application control to mitigate threats across their networks without impacting performance.
As a software-based solution, this security service can be deployed in minutes versus the days required with on-site hardware, and is dynamically allocated, configured and scaled according to customer requirements.
Underlying threat intelligence is provided by Trend Micro, which analyzes 1.5 billion new threat samples and blocks 250 million threats every 24 hours.