By Bill Hagerstrand, Security Solutions BU, Marvell
Time to grab a cup of coffee, as I describe how the transition towards open, disaggregated, and virtualized networks – also known as cloud-native 5G – has created new challenges in an already-heightened 4G-5G security environment.
5G networks move, process and store an ever-increasing amount of sensitive data as a result of faster connection speeds, mission-critical nature of new enterprise, industrial and edge computing/AI applications, and the proliferation of 5G-connected IoT devices and data centers. At the same time, evolving architectures are creating new security threat vectors. The opening of the 5G network edge is driven by O-RAN standards, which disaggregates the radio units (RU), front-haul, mid-haul, and distributed units (DU). Virtualization of the 5G network further disaggregates hardware and software and introduces commodity servers with open-source software running in virtual machines (VM’s) or containers from the DU to the core network.
As a result, these factors have necessitated improvements in 5G security standards that include additional protocols and new security features. But these measures alone, are not enough to secure the 5G network in the cloud-native and quantum computing era. This blog details the growing need for cloud-optimized HSMs (Hardware Security Modules) and their many critical 5G use cases from the device to the core network.
By Kim Markle, Director Influencer Relations, Marvell
Wind River and Marvell have collaborated to create an open, virtualized Radio Access Network (vRAN) solution for communication service providers (CSPs) that offers cloud scalability with the features, performance, and energy efficiency of established 5G networks. The collaboration integrates two complementary, industry-leading technologies—the Marvell® OCTEON® 10 Fusion 5G baseband processor and the Wind River Studio cloud software—to provide the carrier ecosystem a deployment-ready vRAN platform built on technologies that are widely proven in 5G networks and data centers.
CSPs aim to leverage established IT infrastructure for enhanced service agility and streamlined DevOps in the cloud-native RAN. Marvell's OCTEON 10 Fusion processor supports these goals with programmability based on open-source, industry-standard interfaces and integration with leading cloud software platforms such as Wind River Studio.
To ensure open-source distribution of Wind River Studio software, OCTEON 10 Fusion software drivers are being used by StarlingX, an open development and integration project. Marvell’s drivers enable Wind River Studio software to communicate with and control the OCTEON 10 Fusion processor. This facilitates developer access to an optimized vRAN system that offers new options for CSPs and helps to expand the carrier ecosystem of RAN and data center hardware and software suppliers, as well as system integrators.
By Matt Bolig, Director, Product Marketing, Networking Interconnect, Marvell
There’s been a lot written about 5G wireless networks in recent years. It’s easy to see why; 5G technology supports game-changing applications like autonomous driving and smart city infrastructure. Infrastructure investment in bringing this new reality to fruition will take many years and 100’s of billions of dollars globally, as figure 1 below illustrates.
Figure 1: Cumulative Global 5G RAN Capex in $B (source: Dell’Oro, July 2021)
When considering where capital is invested in 5G, one underappreciated aspect is just how much wired infrastructure is required to move massive amounts of data through these wireless networks.
By Marvell, PR Team
Last week, Moor Insights and Futurum Research kicked off The Six Five Summit, a virtual, on demand event focused on the latest developments and trends in digital transformation. Marvell was thrilled to join alongside the world’s leading technology companies to share insights on strategy, innovation and where the industry is heading.
Marvell’s Raghib Hussain, President, Products and Technologies participated in the event’s Cloud and Infrastructure Day to discuss the evolution of the cloud data center including the shift from application-specific to data-centric compute. In his presentation, “Accelerating the Cloud Data Center Evolution,” Raghib focuses on how scalability, performance and efficiency are driving technology infrastructure requirements and why optimized and customized silicon solutions are the future of the cloud.
By Gidi Navon, Senior Principal Architect, Marvell
Enterprise networks are changing, adapting and expanding to become a borderless enterprise. Visibility tools must evolve to meet the new requirements of an enterprise that now extends beyond the traditional campus — across multi-cloud environments to the edge.
By Alik Fishman, Director of Product Management, Marvell
In our series Living on the Network Edge, we have looked at the trends driving Intelligence, Performance and Telemetry to the network edge. In this installment, let’s look at the changing role of network security and the ways integrating security capabilities in network access can assist in effectively streamlining policy enforcement, protection, and remediation across the infrastructure.
Cybersecurity threats are now a daily struggle for businesses experiencing a huge increase in hacked and breached data from sources increasingly common in the workplace like mobile and IoT devices. Not only are the number of security breaches going up, they are also increasing in severity and duration, with the average lifecycle from breach to containment lasting nearly a year1 and presenting expensive operational challenges. With the digital transformation and emerging technology landscape (remote access, cloud-native models, proliferation of IoT devices, etc.) dramatically impacting networking architectures and operations, new security risks are introduced. To address this, enterprise infrastructure is on the verge of a remarkable change, elevating network intelligence, performance, visibility and security2.
By Suresh Ravindran, Senior Director, Software Engineering
So far in our series Living on the Network Edge, we have looked at trends driving Intelligence and Performance to the network edge. In this blog, let’s look into the need for visibility into the network.
As automation trends evolve, the number of connected devices is seeing explosive growth. IDC estimates that there will be 41.6 billion connected IoT devices generating a whopping 79.4 zettabytes of data in 20251. A significant portion of this traffic will be video flows and sensor traffic which will need to be intelligently processed for applications such as personalized user services, inventory management, intrusion prevention and load balancing across a hybrid cloud model. Networking devices will need to be equipped with the ability to intelligently manage processing resources to efficiently handle huge amounts of data flows.
By George Hervey, Principal Architect, Marvell
In the previous TIPS to Living on the Edge, we looked at the trend of driving network intelligence to the edge. With the capacity enabled by the latest wireless networks, like 5G, the infrastructure will enable the development of innovative applications. These applications often employ a high-frequency activity model, for example video or sensors, where the activities are often initiated by the devices themselves generating massive amounts of data moving across the network infrastructure. Cisco’s VNI Forecast Highlights predicts that global business mobile data traffic will grow six-fold from 2017 to 2022, or at an annual growth rate of 42 percent1, requiring a performance upgrade of the network.
By George Hervey, Principal Architect, Marvell
The mobile phone has become such an essential part of our lives as we move towards more advanced stages of the “always on, always connected” model. Our phones provide instant access to data and communication mediums, and that access influences the decisions we make and ultimately, our behavior.
According to Cisco, global mobile networks will support more than 12 billion mobile devices and IoT connections by 2022.1 And these mobile devices will support a variety of functions. Already, our phones replace gadgets and enable services. Why carry around a wallet when your phone can provide Apple Pay, Google Pay or make an electronic payment? Who needs to carry car keys when your phone can unlock and start your car or open your garage door? Applications now also include live streaming services that enable VR/AR experiences and sharing in real time. While future services and applications seem unlimited to the imagination, they require next-generation data infrastructure to support and facilitate them.