{"id":21645,"date":"2023-03-29T18:05:19","date_gmt":"2023-03-29T16:05:19","guid":{"rendered":"https:\/\/www.cubro.com\/?page_id=21645"},"modified":"2025-04-03T08:39:54","modified_gmt":"2025-04-03T06:39:54","slug":"5g-security","status":"publish","type":"page","link":"https:\/\/www.cubro.com\/en\/resources\/white-paper\/5g-security\/","title":{"rendered":"5G Security"},"content":{"rendered":"\n<div class=\"wp-block-getwid-section alignfull alignfull getwid-section-content-full-width\"><div class=\"wp-block-getwid-section__wrapper\" style=\"padding-top:100px;padding-bottom:40px\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\" style=\"background-image:url('https:\/\/www.cubro.com\/en\/wp-content\/uploads\/header-images_single-white-paper-pages_5G-security.png');background-position:center left\"><div class=\"wp-block-getwid-section__background-image-wrapper\"><img decoding=\"async\" class=\"wp-block-getwid-section__background-image\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/header-images_single-white-paper-pages_5G-security.png\" alt=\"\"\/><\/div><\/div><div class=\"wp-block-getwid-section__foreground\" style=\"opacity:0.7;background-color:#0f3051\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:16%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<div class=\"wp-block-getwid-advanced-heading has-custom-font-size\" style=\"font-size:60px\"><p class=\"wp-block-getwid-advanced-heading__content has-text-color has-nv-site-bg-color\" style=\"text-align:left\">White Paper<\/p><\/div>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-getwid-section\"><div class=\"wp-block-getwid-section__wrapper\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\"><nav aria-label=\"breadcrumbs\" class=\"rank-math-breadcrumb\"><p><span class=\"last\">Home<\/span><\/p><\/nav>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper\" style=\"padding-bottom:3px\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-getwid-advanced-heading\"><h1 class=\"wp-block-getwid-advanced-heading__content has-text-color\" style=\"text-align:center;color:#0f3051\">What is 5G Security?<\/h1><\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p>5G has introduced a number of improvements in security compared to 4G. 5G standards development has adopted \u2018Secure by Design\u2019 principles, using for example Mutual Authentication and acknowledging that all links could be tapped, but making sure that the encrypted information is worthless when intercepted.<\/p>\n\n\n\n<p>Security is a wide topic and has different angles to it, for example, ITU-T has defined eight security dimensions shown in the table below. While these are important factors, this White Paper focuses more on the 5G network security measures and attempts to bring how to utilize data regardless of regulation and tight security in the summary section.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/images-wp-pages_5g-security.jpg\" alt=\"\" class=\"wp-image-21672\" srcset=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/images-wp-pages_5g-security.jpg 1200w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/images-wp-pages_5g-security-480x251.jpg 480w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/images-wp-pages_5g-security-240x126.jpg 240w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/images-wp-pages_5g-security-768x402.jpg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-m wp-block-getwid-section getwid-margin-bottom-none\"><div class=\"wp-block-getwid-section__wrapper\" style=\"padding-bottom:0px\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/CUB-5G-Security-WP.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"595\" height=\"842\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/CUB-5G-Security-WP_cover.png\" alt=\"\" class=\"wp-image-21702\" style=\"width:207px;height:294px\" srcset=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/CUB-5G-Security-WP_cover.png 595w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/CUB-5G-Security-WP_cover-339x480.png 339w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/CUB-5G-Security-WP_cover-170x240.png 170w\" sizes=\"(max-width: 595px) 100vw, 595px\" \/><\/a><figcaption class=\"wp-element-caption\"><strong>Download White Paper<\/strong><\/figcaption><\/figure><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:75%\">\n<figure class=\"wp-block-table is-style-regular\"><table class=\"has-text-color\" style=\"color:#0f3051\"><thead><tr><th><strong>Security Dimension<\/strong><\/th><th><strong>Description<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Access control<\/td><td>Protects against unauthorized use of network resources<\/td><\/tr><tr><td>Authentication<\/td><td>Confirms identities and ensures validity of claimed identities<\/td><\/tr><tr><td>Non-repudiation<\/td><td>Means for associating actions with entities<\/td><\/tr><tr><td>Data confidentiality<\/td><td>Data protection from unauthorized disclosure<\/td><\/tr><tr><td>Communication security<\/td><td>Information flow only allowed between authorized end points<\/td><\/tr><tr><td>Data integrity<\/td><td>Correctness and accuracy of data<\/td><\/tr><tr><td>Availability<\/td><td>No denial of authorized access to network resources or data<\/td><\/tr><tr><td>Privacy<\/td><td>Protection of information that might be derived from the observation of network activities<\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull getwid-margin-top-none\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-none\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<p>The importance of security is increasing continuously as we become more and more dependent on digital services. The number of connections is increasing exponentially with M2M and IoT. Therefore, aspects such as trusted ID, trusted SW, secure configuration, trustworthy data, protected communication, privacy and physical security are gaining more relevance not only in IoT communication, but in telecommunications in general.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background has-background\" style=\"background-color:#003479\"><\/div><div class=\"wp-block-getwid-section__foreground\" style=\"opacity:0.82;background-color:var(--nv-site-bg)\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-getwid-advanced-heading\"><h2 class=\"wp-block-getwid-advanced-heading__content has-text-color\" style=\"text-align:center;color:#0f3051\">Subscriber and Device Protection<\/h2><\/div>\n\n\n\n<p class=\"margin-bottom-0\"><strong>5G has several enhancements in subscriber security:<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-top is-not-stacked-on-mobile o-sticky o-sticky-scope-main-area o-sticky-pos-top o-sticky-bhvr-keep is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<ul class=\"wp-block-list\">\n<li>Protects the confidentiality of the initial non-access stratum (NAS) messages between the device and the network. It is no longer possible to trace user equipment (UE) using current attack methodologies over the radio interface, protecting against man in the middle (MITM) and fake base station (Stingray\/IMSI catcher) attacks.<\/li>\n\n\n\n<li>Home control \u2013 a mechanism that requires the home network to check the authentication status of the device in the visited network preventing various roaming fraud types.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<ul class=\"wp-block-list\">\n<li>Unified authentication, for example, for WLAN, allowing 5G networks to manage previously unmanaged and unsecured connections.&nbsp;<\/li>\n\n\n\n<li>User plane integrity checking, ensuring the user traffic is not modified during transit.<\/li>\n\n\n\n<li>Enhanced privacy protection with the use of public\/private key pairs to conceal the subscriber&#8217;s identity.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<p>UE keys are stored in the Universal Subscriber Identity Module (USIM) and the home environment to enable network access security. There are two trust domains, tamper proof universal integrated circuit card on which the USIM resides as a trust anchor and the Mobile Equipment.<\/p>\n\n\n\n<p>Subscription Permanent Identifier (SUPI), equivalent to IMSI in 4G, is encrypted and available as SUCI, Subscriber Concealed Identifier. Naturally, the air interface between UE and gNB is encrypted.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper\" style=\"padding-bottom:35px\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-getwid-advanced-heading\"><h2 class=\"wp-block-getwid-advanced-heading__content has-text-color\" style=\"text-align:center;color:#0f3051\">Network protection<\/h2><\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/images-wp-pages_5g-security_netw-sec.jpeg\" alt=\"\" class=\"wp-image-21675\" srcset=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/images-wp-pages_5g-security_netw-sec.jpeg 1200w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/images-wp-pages_5g-security_netw-sec-480x251.jpeg 480w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/images-wp-pages_5g-security_netw-sec-240x126.jpeg 240w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/images-wp-pages_5g-security_netw-sec-768x402.jpeg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p>RAN is separated into Distributed Units (DU) and Central Units (CU). DU doesn\u2019t have any access to customer communications. IPSec is typically used for the connection from gNB to backhaul.<\/p>\n\n\n\n<p>On the core side AMF serves as a termination point for NAS security. AMF is co-located with Security Anchor Function (SEAF) that holds the root key for the visited network. Authentication Credential Repository and Processing Function (ARPF) is co-located with UDM and stores long-term security credentials.<\/p>\n\n\n\n<p>5G also introduces a new network architecture element: the Security Edge Protection Proxy (SEPP). The SEPP protects the home network edge, acting as the security gateway on interconnections between the home network and visited networks. Its main functionality includes:<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>Application layer security and protection against eavesdropping and replay attacks<\/li>\n\n\n\n<li>End-to-end authentication, integrity and confidentiality protection via signatures and encryption of all HTTP\/2 roaming messages<\/li>\n\n\n\n<li>Key management mechanisms for setting the required cryptographic keys and performing the security capability negotiation procedures<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>Message filtering and policing, topology hiding and validation of JSON objects, including cross-layer information checking with address information on the IP layer<\/li>\n\n\n\n<li>Enhanced security of the international roaming services to overcome the existing security risks linked to SS7 and Diameter usage.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background has-background\" style=\"background-color:#003479\"><\/div><div class=\"wp-block-getwid-section__foreground\" style=\"opacity:0.84;background-color:var(--nv-site-bg)\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-getwid-advanced-heading\"><h2 class=\"wp-block-getwid-advanced-heading__content has-text-color\" style=\"text-align:center;color:#0f3051\">5GC security<\/h2><\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center ticss-a75ca894 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p>5GC introduces a new set of protocols and processes to secure the core functions. These include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>HTTP\/2 communication between cloud native functions (CNF) in the core<\/li>\n\n\n\n<li>TLS providing encrypted communication between all CNF<\/li>\n\n\n\n<li>HTTP\/2 over N32, replacing Diameter over the S6a reference point<\/li>\n\n\n\n<li>More secure cipher suites<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/tech-graphic_4G-technology-compared-5G-SA_2-1.png\" alt=\"\"\/><\/figure>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignwide alignwide\"><div class=\"wp-block-getwid-section__wrapper\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-getwid-advanced-heading\"><h2 class=\"wp-block-getwid-advanced-heading__content has-text-color\" style=\"text-align:center;color:#0f3051\">Network domains and security<\/h2><\/div>\n\n\n\n<p>Telecom networks are often divided into four distinctive parts: Access and core network, transport and interconnect network that connects different core networks with each other.&nbsp;<\/p>\n\n\n\n<p>It is clear that 5G has increased security in many ways compared to previous telecom generations. New features such as network slicing and 5GC bring new ways of having a safe network, but they also carry potential dangers. Kubernetes and container security require new thinking in security management, for example, secure container lifecycle management is a must.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background has-background\" style=\"background-color:#003479\"><\/div><div class=\"wp-block-getwid-section__foreground\" style=\"opacity:0.82;background-color:var(--nv-site-bg)\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-getwid-advanced-heading\"><h2 class=\"wp-block-getwid-advanced-heading__content has-text-color\" style=\"text-align:center;color:#0f3051\">CSPs and security<\/h2><\/div>\n\n\n\n<p>CSPs are definitely facing a huge challenge with all the security technologies and threats. It is one thing to secure the network properly, but at the same time, the CSP&#8217;s existence and success depends on how well subscribers are served. Understanding subscriber behaviour is even more important than before.<\/p>\n\n\n\n<p>This creates a bit of a dilemma for the CSPs. How to run a secure network and still have visibility in the subscribers?<\/p>\n\n\n\n<p>Network visibility stays as a cornerstone to understanding what happens in the network. Despite the multi-layer security measures, the data flow and messages need to be decrypted before any actions can be done. The point of decryption allows having legitimate extraction of data, for example, from 5GC or User Plane data after it has run through Security GW.<\/p>\n\n\n\n<p>The increasing number of attacks, regulators\u2019 tightened requirements and a massive increase in data volumes demand the CSPs to plan the data extraction points more carefully and, in many cases, even add encapsulated encryption with anonymisation. With careful planning and the right solution, monitoring the data and getting insights into subscribers\u2019 behaviour is still possible.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull ticss-463d19d6 alignfull\" style=\"margin-top:60px;margin-bottom:30px\"><div class=\"wp-block-getwid-section__wrapper\" style=\"padding-top:4px;padding-bottom:0px\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background has-background has-nv-dark-bg-background-color\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\"><div class=\"wp-block-image is-style-default ticss-b2896e02\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/CNV-Logo_just-symbol_divider.png\" alt=\"\" width=\"30\" height=\"48\"\/><\/figure><\/div><\/div><\/div><\/div><\/div><\/div>\n\n\n<p class=\"newsletter-headline\">Newsletter - Stay up to date with Cubro Bytes<\/p><div class=\"zweispaltig\"><div class=\"spalte\" style=\"margin-top:30px;padding-left:30px;padding-right:30px;\">\r\n\t\t\t<div style=\"padding-bottom:15px; text-align:center;\">\r\n\t\t\t  <img decoding=\"async\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/icon_newsletter.png\" \r\n\t\t\t       width=\"200\" \r\n\t\t\t       style=\"padding-bottom:10px;\">\r\n\t\t\t<\/div>\r\n\r\n\t\t\t<p style=\"font-size:20px;\">Our newsletter provides thought leadership content about the industry. It is concise and has interesting content to keep you updated with what\u2019s new at Cubro and in the industry. You can unsubscribe anytime with a single click.<\/p>\r\n\t\t\t<\/div><div class=\"spalte\"><!-- Begin Brevo Form -->\r\n<!-- START - We recommend to place the below code in head tag of your website html  -->\r\n<style>\r\n  @font-face {\r\n    font-display: block;\r\n    font-family: Roboto;\r\n    src: url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/normal\/normal\/7529907e9eaf8ebb5220c5f9850e3811.woff2) format(\"woff2\"), url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/normal\/normal\/25c678feafdc175a70922a116c9be3e7.woff) format(\"woff\")\r\n  }\r\n\r\n  @font-face {\r\n    font-display: fallback;\r\n    font-family: Roboto;\r\n    font-weight: 600;\r\n    src: url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/medium\/normal\/6e9caeeafb1f3491be3e32744bc30440.woff2) format(\"woff2\"), url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/medium\/normal\/71501f0d8d5aa95960f6475d5487d4c2.woff) format(\"woff\")\r\n  }\r\n\r\n  @font-face {\r\n    font-display: fallback;\r\n    font-family: Roboto;\r\n    font-weight: 700;\r\n    src: url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/bold\/normal\/3ef7cf158f310cf752d5ad08cd0e7e60.woff2) format(\"woff2\"), url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/bold\/normal\/ece3a1d82f18b60bcce0211725c476aa.woff) format(\"woff\")\r\n  }\r\n\r\n  #sib-container input:-ms-input-placeholder {\r\n    text-align: left;\r\n    font-family: Helvetica, sans-serif;\r\n    color: #c0ccda;\r\n  }\r\n\r\n  #sib-container input::placeholder {\r\n    text-align: left;\r\n    font-family: Helvetica, sans-serif;\r\n    color: #c0ccda;\r\n  }\r\n\r\n  #sib-container textarea::placeholder {\r\n    text-align: left;\r\n    font-family: Helvetica, sans-serif;\r\n    color: #c0ccda;\r\n  }\r\n\r\n  #sib-container a {\r\n    text-decoration: underline;\r\n    color: #2BB2FC;\r\n  }\r\n\r\n  label.entry__label {\r\n  \tmargin-bottom:1px;\r\n  }\r\n\r\n  .sib-form {\r\n  \tpadding-left:0!important;\r\n  \tpadding-right:0!important;\r\n  }\r\n\r\n  #sib-container {\r\n  \tpadding:0!important;\r\n  }\r\n\r\n  .recaptcha-text {\r\n  \tfont-size:12px!important;\r\n  }\r\n\r\n  .recaptcha-text a {\r\n    color: #d8522c!important;\r\n    text-decoration: underline;\r\n  }\r\n\r\n  button {\r\n    font-size:16px;\r\n    text-align:left;\r\n    font-weight:700;\r\n    font-family:Helvetica, sans-serif;\r\n    color:#FFFFFF;\r\n    background-color:#84a6ad;\r\n    border-radius:3px;\r\n    border-width:8px;\r\n  }\r\n\r\n  button:hover {\r\n    color:#FFFFFF;\r\n    background-color:#333333;\r\n  }\r\n\r\n  \/* --- Brevo Formular: 2-spaltiges Layout f\u00fcr die ersten 4 Felder --- *\/\r\n\r\n  \/* Grid auf die direkten Kinder des <form> anwenden (die Wrapper mit padding) *\/\r\n  #sib-container #sib-form {\r\n    display: grid;\r\n    grid-template-columns: 1fr 1fr;\r\n    column-gap: 16px;\r\n    row-gap: 0; \/* da die Wrapper schon padding haben *\/\r\n  }\r\n\r\n  \/* Alle Wrapper-Blocks standardm\u00e4\u00dfig: eine Spalte *\/\r\n  #sib-container #sib-form > div {\r\n    grid-column: span 1;\r\n  }\r\n\r\n  \/* 5. Block = Email (vollbreit) *\/\r\n  #sib-container #sib-form > div:nth-of-type(5) {\r\n    grid-column: 1 \/ -1;\r\n  }\r\n\r\n  \/* 6. Block = Button (vollbreit) *\/\r\n  #sib-container #sib-form > div:nth-of-type(6) {\r\n    grid-column: 1 \/ -1;\r\n  }\r\n\r\n  \/* Hidden Inputs am Ende: vollbreit und ohne Layout-Effekt *\/\r\n  #sib-container #sib-form > input {\r\n    grid-column: 1 \/ -1;\r\n  }\r\n\r\n  \/* Mobile: alles untereinander *\/\r\n  @media (max-width: 640px) {\r\n    #sib-container #sib-form {\r\n      grid-template-columns: 1fr;\r\n    }\r\n    #sib-container #sib-form > div,\r\n    #sib-container #sib-form > div:nth-of-type(5),\r\n    #sib-container #sib-form > div:nth-of-type(6) {\r\n      grid-column: 1 \/ -1;\r\n    }\r\n  }\r\n\r\n\r\n<\/style>\r\n<link rel=\"stylesheet\" href=\"https:\/\/sibforms.com\/forms\/end-form\/build\/sib-styles.css\">\r\n<!--  END - We recommend to place the above code in head tag of your website html -->\r\n\r\n<!-- START - We recommend to place the below code where you want the form in your website html  -->\r\n<div class=\"sib-form\" style=\"text-align: center; background-color: #ffffff;\">\r\n  <div id=\"sib-form-container\" class=\"sib-form-container\">\r\n    <div id=\"error-message\" class=\"sib-form-message-panel\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;max-width:540px;\">\r\n      <div class=\"sib-form-message-panel__text sib-form-message-panel__text--center\">\r\n        <svg viewBox=\"0 0 512 512\" class=\"sib-icon sib-notification__icon\">\r\n          <path d=\"M256 40c118.621 0 216 96.075 216 216 0 119.291-96.61 216-216 216-119.244 0-216-96.562-216-216 0-119.203 96.602-216 216-216m0-32C119.043 8 8 119.083 8 256c0 136.997 111.043 248 248 248s248-111.003 248-248C504 119.083 392.957 8 256 8zm-11.49 120h22.979c6.823 0 12.274 5.682 11.99 12.5l-7 168c-.268 6.428-5.556 11.5-11.99 11.5h-8.979c-6.433 0-11.722-5.073-11.99-11.5l-7-168c-.283-6.818 5.167-12.5 11.99-12.5zM256 340c-15.464 0-28 12.536-28 28s12.536 28 28 28 28-12.536 28-28-12.536-28-28-28z\" \/>\r\n        <\/svg>\r\n        <span class=\"sib-form-message-panel__inner-text\">\r\n                          Deine Anmeldung konnte nicht gespeichert werden. Bitte versuche es erneut.\r\n                      <\/span>\r\n      <\/div>\r\n    <\/div>\r\n    <div><\/div>\r\n    <div id=\"success-message\" class=\"sib-form-message-panel\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#085229; background-color:#e7faf0; border-radius:3px; border-color:#13ce66;max-width:540px;\">\r\n      <div class=\"sib-form-message-panel__text sib-form-message-panel__text--center\">\r\n        <svg viewBox=\"0 0 512 512\" class=\"sib-icon sib-notification__icon\">\r\n          <path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 464c-118.664 0-216-96.055-216-216 0-118.663 96.055-216 216-216 118.664 0 216 96.055 216 216 0 118.663-96.055 216-216 216zm141.63-274.961L217.15 376.071c-4.705 4.667-12.303 4.637-16.97-.068l-85.878-86.572c-4.667-4.705-4.637-12.303.068-16.97l8.52-8.451c4.705-4.667 12.303-4.637 16.97.068l68.976 69.533 163.441-162.13c4.705-4.667 12.303-4.637 16.97.068l8.451 8.52c4.668 4.705 4.637 12.303-.068 16.97z\" \/>\r\n        <\/svg>\r\n        <span class=\"sib-form-message-panel__inner-text\">\r\n                          Deine Anmeldung war erfolgreich.\r\n                      <\/span>\r\n      <\/div>\r\n    <\/div>\r\n    <div><\/div>\r\n    <div id=\"sib-container\" class=\"sib-container--large sib-container--vertical\" style=\"text-align:center; background-color:rgba(255,255,255,1); max-width:800px; direction:ltr\">\r\n      <form id=\"sib-form\" method=\"POST\" action=\"https:\/\/24bf8055.sibforms.com\/serve\/MUIFAJW5hHXD-knlsGlqSNUcW_X6H-wyIG1XBfBHC1n-r5oWiLIKRNXRDNGHx0jhUUIpnWTh-6f1BKAE6jFyyE4DZupZc0qg-pyk2DusTzZA-sd2kmqr439RPzb-vYZRTRcXHsAxYa16e-8CaDLXh2IKxteM8S8ICusLl-WDN0JwkdZsIhe032CYNNlX8zi1nT5UbXdwGO0854j7\" data-type=\"subscription\">\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-input sib-form-block\">\r\n            <div class=\"form__entry entry_block\">\r\n              <div class=\"form__label-row \">\r\n                <label class=\"entry__label\" style=\"font-weight: 500; text-align:left; font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#3c4858;\" for=\"FIRSTNAME\" data-required=\"*\">First Name<\/label>\r\n\r\n                <div class=\"entry__field\">\r\n                  <input class=\"input \" maxlength=\"200\" type=\"text\" id=\"FIRSTNAME\" name=\"FIRSTNAME\" autocomplete=\"off\" data-required=\"true\" required \/>\r\n                <\/div>\r\n              <\/div>\r\n\r\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\r\n              <\/label>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-input sib-form-block\">\r\n            <div class=\"form__entry entry_block\">\r\n              <div class=\"form__label-row \">\r\n                <label class=\"entry__label\" style=\"font-weight: 500; text-align:left; font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#3c4858;\" for=\"LASTNAME\" data-required=\"*\">Last Name<\/label>\r\n\r\n                <div class=\"entry__field\">\r\n                  <input class=\"input \" maxlength=\"200\" type=\"text\" id=\"LASTNAME\" name=\"LASTNAME\" autocomplete=\"off\" data-required=\"true\" required \/>\r\n                <\/div>\r\n              <\/div>\r\n\r\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\r\n              <\/label>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-input sib-form-block\">\r\n            <div class=\"form__entry entry_block\">\r\n              <div class=\"form__label-row \">\r\n                <label class=\"entry__label\" style=\"font-weight: 500; text-align:left; font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#3c4858;\" for=\"COMPANY\">Company<\/label>\r\n\r\n                <div class=\"entry__field\">\r\n                  <input class=\"input \" maxlength=\"200\" type=\"text\" id=\"COMPANY\" name=\"COMPANY\" autocomplete=\"off\" \/>\r\n                <\/div>\r\n              <\/div>\r\n\r\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\r\n              <\/label>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-input sib-form-block\">\r\n            <div class=\"form__entry entry_block\">\r\n              <div class=\"form__label-row \">\r\n                <label class=\"entry__label\" style=\"font-weight: 500; text-align:left; font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#3c4858;\" for=\"COUNTRY\">Country<\/label>\r\n\r\n                <div class=\"entry__field\">\r\n                  <input class=\"input \" maxlength=\"200\" type=\"text\" id=\"COUNTRY\" name=\"COUNTRY\" autocomplete=\"off\" \/>\r\n                <\/div>\r\n              <\/div>\r\n\r\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\r\n              <\/label>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-input sib-form-block\">\r\n            <div class=\"form__entry entry_block\">\r\n              <div class=\"form__label-row \">\r\n                <label class=\"entry__label\" style=\"font-weight: 500; text-align:left; font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#3c4858;\" for=\"EMAIL\" data-required=\"*\">Email<\/label>\r\n\r\n                <div class=\"entry__field\">\r\n                  <input class=\"input \" type=\"text\" id=\"EMAIL\" name=\"EMAIL\" autocomplete=\"off\" data-required=\"true\" required \/>\r\n                <\/div>\r\n              <\/div>\r\n\r\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\r\n              <\/label>\r\n\t\t\t\t<p class=\"recaptcha-text\">This site is protected by reCAPTCHA and the Google <a href=\"https:\/\/policies.google.com\/privacy\" target=\"_blank\" rel=\"noopener\">Privacy Policy<\/a> and <a href=\"https:\/\/policies.google.com\/terms\" target=\"_blank\" rel=\"noopener\">Terms of Service<\/a> apply.\r\n\t\t\t\t<\/p>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-form-block\" style=\"text-align: left\">\r\n            <button class=\"sib-form-block__button sib-form-block__button-with-loader\" form=\"sib-form\" type=\"submit\">\r\n              <svg class=\"icon clickable__icon progress-indicator__icon sib-hide-loader-icon\" viewBox=\"0 0 512 512\" style=\"\">\r\n                <path d=\"M460.116 373.846l-20.823-12.022c-5.541-3.199-7.54-10.159-4.663-15.874 30.137-59.886 28.343-131.652-5.386-189.946-33.641-58.394-94.896-95.833-161.827-99.676C261.028 55.961 256 50.751 256 44.352V20.309c0-6.904 5.808-12.337 12.703-11.982 83.556 4.306 160.163 50.864 202.11 123.677 42.063 72.696 44.079 162.316 6.031 236.832-3.14 6.148-10.75 8.461-16.728 5.01z\" \/>\r\n              <\/svg>\r\n              Subscribe here\r\n            <\/button>\r\n          <\/div>\r\n        <\/div>\r\n\r\n        <input type=\"text\" name=\"email_address_check\" value=\"\" class=\"input--hidden\">\r\n        <input type=\"hidden\" name=\"locale\" value=\"de\">\r\n      <\/form>\r\n    <\/div>\r\n  <\/div>\r\n<\/div>\r\n<!-- END - We recommend to place the above code where you want the form in your website html  -->\r\n\r\n<!-- START - We recommend to place the below code in footer or bottom of your website html  -->\r\n<script>\r\n  window.REQUIRED_CODE_ERROR_MESSAGE = 'Please select a country code.';\r\n  window.LOCALE = 'de';\r\n  window.EMAIL_INVALID_MESSAGE = window.SMS_INVALID_MESSAGE = \"The information you entered is invalid. Please check the field format and try again.\";\r\n\r\n  window.REQUIRED_ERROR_MESSAGE = \"This field must not be empty. \";\r\n\r\n  window.GENERIC_INVALID_MESSAGE = \"This field cannot be empty. The information you entered is invalid. Please check the field format and try again.\";\r\n\r\n  window.translation = {\r\n    common: {\r\n      selectedList: '{quantity} Liste ausgew\u00e4hlt',\r\n      selectedLists: '{quantity} Listen ausgew\u00e4hlt',\r\n      selectedOption: '{quantity} ausgew\u00e4hlt',\r\n      selectedOptions: '{quantity} ausgew\u00e4hlt',\r\n    }\r\n  };\r\n\r\n  var AUTOHIDE = Boolean(0);\r\n<\/script>\r\n\r\n<script defer src=\"https:\/\/sibforms.com\/forms\/end-form\/build\/main.js\"><\/script>\r\n\r\n<!-- END - We recommend to place the above code in footer or bottom of your website html  -->\r\n<!-- End Brevo Form --><p style=\"font-size:12px;padding-left:16px;\">Your e-mail address is only used to send you our newsletter and information about the activities of Cubro Network Visibility. You can always use the unsubscribe link included in the newsletter.<\/p><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":10,"featured_media":0,"parent":13909,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_searchwp_excluded":"","_uag_custom_page_level_css":"","neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","neve_meta_reading_time":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"class_list":["post-21645","page","type-page","status-publish","hentry"],"acf":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"neve-blog":false},"uagb_author_info":{"display_name":"Gianni","author_link":"https:\/\/www.cubro.com\/en\/blog\/author\/gianni\/"},"uagb_comment_info":0,"uagb_excerpt":null,"_links":{"self":[{"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/pages\/21645","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/comments?post=21645"}],"version-history":[{"count":2,"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/pages\/21645\/revisions"}],"predecessor-version":[{"id":27736,"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/pages\/21645\/revisions\/27736"}],"up":[{"embeddable":true,"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/pages\/13909"}],"wp:attachment":[{"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/media?parent=21645"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}