Zscaler Zero Trust Architecture for Private 5G

OVERVIEW

Powering the next wave of digital transformation

Fifth Generation Wireless (5G) and edge computing are accelerating innovation across industries, ushering in a new meta in connectivity. 

powering-the-next-wave-of-digital-transformation

DETAILS

5G and edge workloads are attractive targets for cyberattacks

Once a threat actor gains access to the network, they can disrupt operations as well as steal and encrypt sensitive data.

Every internet-facing firewall, on-premises or in the cloud, can be discovered and attacked

a-diagram-showing-large-attack-surface

Devices (UE) lack sufficient security and can easily be compromised, serving as beachheads for finding high-value targets

a-diagram-showing-risk-of-compromise.png (29.86 KB)

A single infected device on a routable network can infect everything on the network

a-diagram-showing-risk-of-lateral-movement

Architectural diagram

  1. Risk of compromise: An open system architecture that enables massive device connectivity 

     

    RISK: IoT/OT systems can be easily exploited, and firewalls are not designed to inspect TLS/SSL traffic at scale 
     

  2. A large, routable network: Connects branches, factories, data centers, and public clouds to enable communications 



     

    RISK: A single infected device can infect everything on the network 
     

  3. Castle-and-moat security: Establishes a security perimeter between the corporate network and internet 

     

    RISK: Every internet-facing firewall can be discovered and exploited

5G Architectural Diagram
HOW IT WORKS

Zscaler zero trust architecture for private 5G

Secures and simplifies private 5G deployments for centralized 5G Core

a-diagram-of-zscaler-zero-trust-architecture-for-private-5g
Enable zero trust connectivity
  • Secure site-to-site connectivity over the internet without a routable network (5G UPF to Core)
  • Ensure users and devices (UE) are not on the same routable network as apps in the MEC, DC, and cloud
Secure apps and data
  • Minimize the egress and ingress attack surface
  • Identify workload vulnerabilities, misconfigurations, and excessive permissions
Secure communications
  • Prevent compromise and data loss with inline content inspection
Manage digital experiences
  • Quickly resolve performance issues with visibility into device, network, and app performance

Together, we're empowering customers to securely embrace private 5G

Azure
AWS
Nokia
Ericcson
zscaler-customer-sandvik
CUSTOMER SUCCESS STORIES
sandvik-logo

“With Zscaler zero trust, we can protect [mission-critical] workloads by securing all internet, device, and workload communications.”

—Sebastian Kemi, Chief Information Security Officer, Sandvik AB

CUSTOMER SUCCESS STORIES
klas-logo

“[With Klas and Zscaler], the warfighter now has unprecedented secure, granular access to warfighting applications at the tactical edge.”

—Carl Couch, Director of Engineering, Klas Government

zscaler-customer-sandvik
zscaler-customer-klas-goverment
nathan-howe-vp-5g-zscaler

Nathan Howe

VP, Emerging Technology & 5G, Zscaler
"Customers deploy Zscaler to ensure secure and seamless access to workloads, regardless of the location or network where the application exists."