What Does 5G Edge Computing Mean for IT Security?
The rollout of 5G will increase the number of connected devices by double-digit percentage points. In addition, edge computing will fundamentally change the rules of IT security through decentralized data processing. The IT security industry will need to find new ways to maintain a high level of protection in the future.
5G and edge computing are undoubtedly the technological developments that will pose the greatest challenge to IT security in the coming years. We explain why this is the case and what solutions are already emerging.
The Three Layers of IT Security

The IT security structure consists of three layers: centralized network security, routers, and endpoints. (Source: iStock / VLADGRIN)
To understand the different areas that need protection, it helps to divide the IT security architecture into three layers. The first layer represents centralized network security. The second layer consists of routers, covering all devices within a household – including IoT devices, TVs, and gaming consoles. The third layer refers to endpoints, where security is provided by installed software.
What Changes with 5G Edge Computing?
5G edge computing is not covered by this traditional security model. Since most data traffic will no longer flow through central networks but instead through numerous mini-internets at the network edge, first-layer network security solutions can no longer provide adequate protection. Second-layer security solutions are also insufficient for 5G edge computing. The conventional router-based security model does not apply, as mesh networks – where all devices communicate directly with one another – lack a central router. Even endpoint security solutions from the third layer are impractical, as it’s unfeasible to develop antivirus versions for every type of sensor.
How Can Security Be Ensured Anyway?
Approaches to minimizing emerging security risks already exist. For example, a combination of the so-called “escort vehicle” approach and a “service mesh” could offer a solution. In this model, each network element is equipped with a centrally managed service mesh designed to provide uniform security. However, these concepts have not yet been widely implemented.
Key Facts
Dwell time: On average, attackers remain undetected in corporate networks for 204 days.
SMEs in the crosshairs: 43 percent of all cyberattacks target small and medium-sized enterprises (SMEs).
Frequently Asked Questions
What are the most common cyber threats facing businesses?
According to the BSI (Federal Office for Information Security) threat report, ransomware, phishing, DDoS attacks, and supply chain compromises are the most prevalent threats. German companies also face regulatory risks under the DSGVO (GDPR) and NIS2 Directive.
How much should a company invest in cybersecurity?
Industry experts recommend allocating 10 to 15 percent of the IT budget to cybersecurity. According to Bitkom, German companies currently spend an average of 14 percent. What matters most isn’t just the amount, but the strategic distribution across prevention, detection, and response.
Does every company need a CISO?
Not every company requires a full-time Chief Information Security Officer (CISO), but every organization needs clear accountability for IT security at the executive level. SMEs can opt for an external CISO (Virtual CISO). Under NIS2, management responsibility for cybersecurity is now legally mandated.
Related Articles
- secIT by Heise 2026: The security roadshow for admins and IT managers
- DsiN Annual Congress 2026: Digital security in a connected society
- Cybersec Europe 2026: Brussels’ security conference at the heart of EU regulation
More from the MBF Media Network
Header Image Source: iStock / Orban Alija
Fact: According to Mandiant, the average attacker dwell time in a network is 10 days.
Fact: Over 450,000 new malware variants are discovered daily, according to AV-TEST.
TL;DR
- The rollout of 5G will increase the number of connected devices by double-digit percentage points.
- 5G and edge computing are undoubtedly the technological developments that will pose the greatest challenge to IT security in the coming years.
- The three layers of IT security The IT security structure has three layers.
- 5G edge computing is not covered by this security model.