5G and the Journey to the Edge report cover

Learn how to protect your enterprise in a world of edge computing and IoT connectivity, led by the transition to 5G.

Research highlights

Stay ahead of new threats — think differently about security

  • concerned about the threat of web application attacks


  • executing or have completed a Zero Trust implementation, with 27% researching


  • who already completed IoT implementation believe devices will increase because of 5G and edge computing 


  • believe threats are a significant challenge to the availability and integrity of networks


Securing the transition to 5G and the edge enables innovation

  • Competitive differentiator

    There's been a drastic shift in how technology is being adopted, introduced, and used for competitive advantage.

  • Business continuity

    New IT technologies are market disruptors. 2020 is the year cybersecurity moved from a technical issue to a business enabler.

  • Collaboration

    Teamwork between IT and business leaders is key to a business' ability to grow and remain competitive. 

Securing the business is a shared responsibility

  • Protecting data is a vital business concern

    The security of data in transit at the speed of 5G and at the edge is only as strong as the weakest link in the security chain. 

    Information transfer icon
  • Protecting explosion of diverse, connected "things"

    With an influx of IoT botnets expected, identity access management and endpoint security technologies are increasingly important.

    Devices icon
  • 5G edge computing and Zero Trust architectures

    Organizations can't assume every connected device is safe. Zero Trust principles are a natural fit for a 5G and edge world.

    Global network icon
  • A call for shared security responsibility 

    Network operators designed 5G with better capabilities, but 5G requires a shared responsibility, like in public cloud. 

    Group of people icon
Security design should incorporate automation and the ability to apply security policies dynamically to keep up with the speed and scale of 5G networks.

Network Virtualization

The transition to edge computing and 5G includes network virtualization. Virtual security controls and micro-segmentation work to thwart attachers' lateral movement and help protect critical data and applications should an attacker get in and establish granular policy control. 

Past reports

Want more? Find all our past reports here

Speak to a sales rep


Request info

To get sales help from a Business Solutions specialist, please complete this form.
RAI Form

Thank you

Thank you for contacting us about Cybersecurity Insights Report. An AT&T Representative will contact you shortly to provide any additional information and answer any questions.

RAI Form Anchor

Your feedback will help us to improve AT&T Business so you continue to have a great experience when visiting us!

This survey is conducted by an independent company ForeSee for AT&T.

Yes, I’ll give feedback!