While the solutions are there, adopting 5G also has its share of challenges. In an IEEE Communications Society Tech Blog piece,4 hurdles include integrating into existing ecosystems, the complexity of skills and training upkeep, and cost concerns.
The blog also illustrates NTT’s recent CIO survey results, which revealed that the most common (44%) barrier to deploying private 5G networks is integrating the technology with legacy systems and networks.
The survey also disclosed the following figures:
● 37% of respondents saw complexity surrounding the deployment and management of private 5G networks as a significant roadblock, given that 5G technology is still in the early stages of its adoption lifecycle
● 30% of firms said employees lacking the technical skills and expertise to manage 5G networks is the third most common barrier
● 38% of survey respondents preferred private 5G adoption
Gaining these perspectives, we can deduce that organisations should consider outsourcing their private 5G deployment to a managed service provider who already have the expertise in implementing private 5G networks. Acquiring a private 5G network ‘as-a-service’ can accelerate the adoption process and offer a better end-user experience and return on investment for companies.
There’s also the imminent challenge of security. Companies need security checkpoints and measures because 5G networks are not secure by design. Together with 451 Research and as a part of S&P Global Market Intelligence, Trend Micro surveyed over 400 individuals in globally-distributed organisations responsible for deploying private wireless networks in mixed IT and ICS environments. The survey revealed security to be the largest concern, with 39% citing it as the most important aspect. However, most expect to integrate this with their existing IT network and OT environment. Only 20% intend to extend their existing security systems to protect the new private network, while 43% plan to deploy additional capabilities from their current IT security vendors. The remaining 37% are “relying on security capabilities built into the new offering, either by the vendor or by their integrator”.5