Do you recognize these challenges

Telecommunications companies face challenges when they implement security functions in LTE and 5G networks.

They need to:

  • Protect base stations from threats like device tracking, call interception, frequency jamming, physical base stations attacks, and flooding.
  • Adapt to new security requirements for 5G, where base stations need to be more closely spaced and placed in easier to reach locations.
  • Guarantee high availability of the telecom networks.
  • Authenticate users, base stations and other devices to prevent unauthorized access to the backend services.
  • Prevent malware from executing in the associated backend or applications.

Want to know more?

Customer case

How Vodafone Turkey keeps its rapidly growing network secure with PKI

With thousands of base stations and a rapidly growing network, Vodafone Turkey made a transition from GSM to LTE technology, using public key infrastructure (PKI) to manage the important encyption of the mobile traffic.

Read full case here

 

How does it work?

Giving trusted identities to LTE and 5G base stations provides end-to-end security to help guarantee high availability of the telecom network.

Nexus LTE PKI is based on mature, scalable, highly reliable, continuously tested and maintained products. The multi-CA and multitenancy solution helps you adapt the PKI hierarchy, administration, and reporting, to your needs. Nexus' solution offers automation features and a solid track record. 

Read more on Docs

Why Nexus

Nexus’ platform for LTE and 5G PKI has the following key benefits:

Proven worldwide

Is used in critical, large-scale installations by several of the biggest mobile operators world-wide.

High security

Offers proven high security as Nexus’ quality-assured PKI platform is being certified according to Common Criteria EAL4+, and Nexus’ organization comply with ISO 27001 and TISAX.

Offered as a service

Is offered as a service, with guaranteed SLA and capacity as you grow. 

Want to know more about how we can help you?

Book a free demo

Examples of research projects

Research

New IoT research project aims to provide trusted high-quality elderly care

28 March, 2019
“We have initiated a new research project that we hope will result in a truly secure smart-healthcare system for elderly as well as younger and healthier people,” says Helen Holst, CIO at the Swedish municipality City of Solna.
Research

New research project aims to “shrink” public key infrastructure (PKI) technology to secure the IoT

9 March, 2017
The internet of things (IoT) applications have started to hit the market in big numbers – but security is lagging behind.
Research

Swedish research project CEBOT has solved one of the toughest IoT security problems

16 January, 2017
It has been hard to give resource-constrained things trusted identities, and as the internet of things (IoT) grows this has become one of the biggest security problems.

News and Resources

Customer Cases Lifecycle management LTE

Mobily selects Nexus Smart ID to enable trust in future identities

4 May, 2020
Mobily selects Nexus Smart ID to enable trust in future identities We are pleased to announce that Mobily, the second-largest telecommunications operator in Saudi Arabia, and part of the Etisalat Group, the largest telecom in Middle-east, has selected Nex...
LTE PKI

The big car makers are taking 5G telecoms into a head-to-head with the US government’s homebred DSRC technology

16 May, 2018
Interesting article in today’s Wall Street Journal. The big car makers are taking 5G (next gen) telecoms into a head-to-head with the US government’s homebred DSRC (WiFi based) technology. One, or perhaps even both of these, will define the future for conn...
LTE

Nexus is one of the first CA software vendors to launch support for certificate enrollment protocol EST

31 January, 2017
There are issues with the enrollment protocols used today to distribute trusted identities to things.