How Will NTT DATA and Palo Alto Networks Secure Private 5G Networks?

February 27, 2025
How Will NTT DATA and Palo Alto Networks Secure Private 5G Networks?

Matilda Bailey is a Networking specialist who focuses on the latest technologies and trends in cellular, wireless and next-gen solutions.

Can you explain the new managed security service announced by NTT DATA and Palo Alto Networks? What technologies are powering this service? How does this service enhance private 5G security in industrial settings?

The new managed security service is a collaborative effort by NTT DATA and Palo Alto Networks to improve private 5G security for industrial and operational technology (OT) environments. This service leverages Palo Alto Networks’ industry-leading technologies, such as their Next-Generation Firewall (NGFW) and OT/IoT subscriptions. The service empowers enterprises by integrating these advanced cybersecurity features with NTT DATA’s Private 5G architecture, ultimately enhancing network visibility, access control, and automated threat detection and response. In industrial settings, this enhanced security helps protect critical systems and data by applying a Zero Trust security posture, which ensures that only authorized connections, applications, and protocols are enabled. Machine learning is also utilized to detect and respond to threats swiftly.

What are the key components of this security offering? How does the Palo Alto Networks Next-Generation Firewall contribute to the service? What role do OT/IoT subscriptions play?

The key components of this security offering include Palo Alto Networks’ NGFW, OT/IoT subscriptions, and NTT DATA’s Private 5G network. The Palo Alto Networks NGFW plays a crucial role by applying a Zero Trust security model, which involves strict access controls and machine learning to allow only legitimate traffic and connections. This firewall’s ability to analyze and filter network traffic based on predefined security policies greatly enhances the security of the network. OT/IoT subscriptions, on the other hand, provide additional security measures tailored for OT and IoT devices, ensuring that any connected device is analyzed for risk and behavior, significantly reducing the potential attack surface within industrial environments.

How does the new service improve network visibility and threat response? What is the importance of machine learning in this context? How does the service ensure a Zero Trust security posture?

The new service improves network visibility and threat response by incorporating real-time visibility tools, machine learning algorithms, and a Zero Trust security model. Machine learning is essential as it helps to identify and profile devices based on behavior and risk, enabling more accurate threat detection and automated responses. Real-time visibility allows clients to monitor encrypted data, traffic patterns, and device communications, providing crucial insights needed to preemptively detect and mitigate threats. Ensuring a Zero Trust security posture involves implementing strict access controls where only authorized devices and applications can communicate, thus minimizing the risk of unauthorized access and potential breaches.

What industries stand to benefit the most from this managed service? How will manufacturing, healthcare, and transportation sectors be impacted? Can you share specific examples of improvements in these industries?

Industries such as manufacturing, healthcare, and transportation stand to benefit significantly from this managed security service. For instance, in manufacturing, the enhanced security allows for real-time monitoring and risk mitigation, which helps prevent disruptions and maintain smooth operations. In healthcare, securing patient data and ensuring the reliability of connected medical devices are critical. This service ensures that only authorized devices and applications can access the network, protecting sensitive data and maintaining operational continuity. In the transportation sector, protecting against disruptions ensures that logistics and transportation networks remain efficient and reliable. A specific example of improvement can be seen in the adoption by Roularta Media Group, which has utilized the NTT DATA Private 5G network to modernize its printing facilities, leading to increased productivity and new use cases, such as intelligent asset tracking and push-to-talk communications.

What challenges in industrial connectivity does this service address? How prevalent are cyberattacks in OT environments according to the 2024 State of OT Security Report? How does this service help tackle the visibility gap in private 5G networks?

This service addresses several challenges in industrial connectivity, including the prevalence of cyberattacks and the visibility gap in private 5G networks. According to the 2024 State of OT Security Report, 70% of industrial organizations experienced a cyberattack on their OT environment in the past year, with nearly 25% resulting in operational shutdowns. This managed security service tackles these challenges by providing enhanced network visibility and security measures tailored to OT environments. By offering real-time visibility into network traffic, even encrypted data, and profiling devices through machine learning, the service ensures that any threats are quickly identified and mitigated. This proactive approach significantly reduces the risk of disruptions and enhances the overall security posture of industrial networks.

How does the service integrate into existing IT/OT environments? What makes the service easy to set up and manage? What are the benefits of a fully managed service?

The service integrates seamlessly into existing IT/OT environments thanks to its turnkey nature and the expertise of NTT DATA in both private 5G and network security. It is designed to be easy to set up and manage, allowing organizations to focus on innovation and operations rather than security concerns. The fully managed service model means that NTT DATA handles the complexities of implementation, monitoring, and maintenance, providing clients with a hassle-free experience. This approach allows organizations to leverage cutting-edge security technologies without needing extensive in-house resources or expertise, ensuring that their networks remain secure and efficient.

Can you provide more details on the specific features of this service? How does real-time visibility work with encrypted data? What is involved in device profiling?

The service offers several specific features, including real-time visibility, device profiling, and Zero Trust security. Real-time visibility works with encrypted data by using advanced monitoring tools that can analyze traffic patterns and communications even when encrypted, providing deep insights into network activity without compromising data privacy. Device profiling involves the use of machine learning algorithms to identify and analyze IoT and OT devices based on their behavior and risk level. This enables the service to accurately determine which devices pose a potential threat and take appropriate action to mitigate any risks.

How does the service’s Zero Trust security model function? What are the strict access controls in place? How does automated threat detection and remediation work?

The service’s Zero Trust security model functions by assuming that any device or user could be a potential threat and therefore requires strict access controls and continuous verification. The strict access controls ensure that only authorized devices and applications can access the network, significantly reducing the risk of unauthorized access. Automated threat detection and remediation work through the integration of AI-driven tools that monitor network traffic, detect anomalies, and take immediate actions to mitigate identified threats. This automated approach ensures a rapid response to any potential security incidents, minimizing the impact on business operations.

What feedback have you received from initial users like Roularta Media Group? How has their experience been with the NTT DATA Private 5G network? What new use cases have they unlocked with this service?

Initial feedback from users like Roularta Media Group has been very positive. They have reported significant improvements in productivity and security across their facilities since deploying the NTT DATA Private 5G network. The enhanced network security has enabled them to unlock new use cases, such as intelligent asset tracking and push-to-talk communications, which have streamlined their operations and improved overall efficiency. The robust security measures provided by the service have given them confidence in embracing these innovative technologies without compromising on security.

What is the strategic goal of combining NTT DATA’s Private 5G with Palo Alto Networks’ cybersecurity? How does this partnership help in accelerating digital transformation? How does it assist in protecting critical infrastructure and data?

The strategic goal of combining NTT DATA’s Private 5G with Palo Alto Networks’ cybersecurity is to create a secure and reliable foundation for digital transformation in industrial environments. This partnership accelerates digital transformation by providing enterprises with advanced security measures integrated into their private 5G networks, enabling them to adopt new technologies and innovations confidently. This combination helps protect critical infrastructure and data by ensuring that the network is secure from the ground up, with enhanced visibility, access controls, and automated threat detection and response capabilities. By addressing the security challenges associated with digital transformation, this partnership enables organizations to innovate and grow while maintaining a high level of security.

Can you share more about NTT DATA’s commitment to innovation and R&D? How does the company’s annual investment in R&D contribute to these advancements? What future trends do you foresee shaping your services?

NTT DATA is deeply committed to innovation and R&D, investing over $3.6 billion annually to drive advancements in technology and services. This substantial investment allows the company to stay at the forefront of digital business and technology services, continuously developing new solutions to meet evolving industry needs. The company’s focus on R&D contributes to the creation of cutting-edge security measures, including the latest offerings in private 5G and cybersecurity. Looking ahead, I foresee trends such as the continued growth of IoT and OT devices, the increasing adoption of AI and machine learning for threat detection, and the expansion of Zero Trust security models shaping our services. These trends will drive the need for more advanced and integrated security solutions to protect complex industrial environments.

Do you have any advice for our readers?

My advice for readers is to prioritize security from the beginning when planning and implementing new technologies and innovations. As the digital landscape continues to evolve, so do the threats that organizations face. Integrating advanced security measures into your network’s design will help safeguard your critical infrastructure and data, allowing you to embrace digital transformation with confidence. Additionally, consider partnering with experienced providers who can offer fully managed services, as this can significantly ease the burden of maintaining a secure and efficient network. Investing in robust security solutions today will pay off in the long run by protecting your operations and enabling growth and innovation.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later