Report by Trend Micro

Trend Micro joint research with CTOne on 5G networks security

17 FINDINGSPublished May 3, 2025
View Original Report →

Key Findings

100% of IT and cybersecurity professionals say they are either currently using (86%) or evaluating their deployment (14%) private 5G networks.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

50% of IT and cybersecurity professionals say they Deploy strict access controls for AI models to safeguard AI use for traffic monitoring/analysis are.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

On average, less than a fifth (18%) of organisations' security budget is currently allocated to private 5G networks.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

Nearly all IT and cybersecurity professionals said they are either currently using (62%) or planning to use (35%) AI-powered security tools for private 5G networks.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

More than nine in ten organizations currently using AI security admit to facing challenges in deploying the tech to private 5G networks.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

The most frequently cited challenges in deploying AI security to private 5G networks are: High costs (47%), Concerns over false positives/negatives (44%), A lack of internal expertise (37%).

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

Just a fifth (20%) of global organisations have a dedicated team for securing their communications networks.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

44% of IT and cybersecurity professionals say they use data anonymisation techniques to safeguard AI use for traffic monitoring/analysis are.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

The AI-powered capabilities viewed as essential for private 5G networks are: Predictive threat intelligence (58%), Continuous, adaptive authentication (52%), Zero trust enforcement (47%), Self-healing networks featuring AI automation (41%).

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

54% say they Ensure compliance with data privacy regulations like GDPR to safeguard AI use for traffic monitoring/analysis are.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

51% of IT and cybersecurity professionals say they encrypt data at rest and in transit to safeguard AI use for traffic monitoring/analysis are.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

The most frequently cited challenges in deploying AI security to private 5G networks are: High costs (47%), Concerns over false positives/negatives (44%), A lack of internal expertise (37%).

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

54% say they Ensure compliance with data privacy regulations like GDPR to safeguard AI use for traffic monitoring/analysis are.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

50% of IT and cybersecurity professionals say they Deploy strict access controls for AI models to safeguard AI use for traffic monitoring/analysis are.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

44% of IT and cybersecurity professionals say they use data anonymisation techniques to safeguard AI use for traffic monitoring/analysis are.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

Responsibility for CT security often lies with the CTO (43%) and CIO (32%).

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

51% of IT and cybersecurity professionals say they encrypt data at rest and in transit to safeguard AI use for traffic monitoring/analysis are.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025