Menu

T-mobile First SIM-Based SASE

T-mobile First SIM-Based SASE

The Six Five Team discusses T-mobile First SIM-Based SASE.

If you are interested in watching the full episode you can check it out here.

Disclaimer: The Six Five Webcast is for information and entertainment purposes only. Over the course of this webcast, we may talk about companies that are publicly traded and we may even reference that fact and their equity share price, but please do not take anything that we say as a recommendation about what you should do with your investment dollars. We are not investment advisors and we ask that you do not treat us as such.

Transcript:

Patrick Moorhead: SASE is a fancy way of combining four different security technologies into one. I believed it was coined by Gartner. That doesn’t mean it’s right or it’s accurate, but I do think this one is. And there’s multiple ways to do SASE. Which essentially protection on everything on the edge. One way is to have a software agent out there. And that is the predominant way of doing it. That software agent is on phones, it’s on PCs. Heck, you can put that software inside to a router everywhere. And essentially, you want to make sure that what is coming in is exactly what it says, and it only gets access to the data and resources that it’s enabled for.

What T-Mobile has done, which is a first on a worldwide basis. I didn’t know if it was on a worldwide basis. I guess that matters or doesn’t matter because T-Mobile operates here only in the United States and it’s basically Deutsche Telekom outside, but they’re doing hardware based SIM SASE. And anybody who knows anything about security… And listen, everybody’s a security expert in one shape or form, but every single thing that I’ve seen in the last 15 years that if it’s hardware-based security, it’s fundamentally harder to crack because software is inherently full of holes. And essentially, anything with one of these SIM capabilities enables you to get a higher degree of authentication and essentially telling the services and the software that you are who you are and you can get access to what you want to get access to. So congratulations to the team out there at T-Mobile at AT&T and Verizon do not have this capability. And I think this just shows the uncarrier for businesses that T-Mobile is executing so well on.

Daniel Newman: Yeah. I don’t have a ton on this one to add, Pat. But look, I think T-Mobile made a really great case. It’s that, A, it doesn’t seem to be if anymore, your data’s going to get breached, it’s really when. And that the cost of a data breach is really growing at an exponential rate. The ability to add more security around the perimeter, both through private and secure internet access gives enterprise businesses users a level of protection that should add layers of abstraction from the ability for bad actors to get at the data. And so it’s innovation. It’s innovation that doesn’t exist in the competition. And when you talk about business and government, it really is their responsibility to do everything in their power to reduce risk of being breached. And so I like what you said at the end, Pat, it’s probably my most prudent and important argument I’ll make here, but they do it and everyone else doesn’t.

So if you’re a business customer and you’re running on a competition that does not offer these additional layers of protection and then something goes wrong, you genuinely know that you could have done something to potentially have reduced the risk of being a victim of a data breach. So what happens next, Pat? Do the competition invest in catch up? Can they invest in catch up? And if so, how quickly? But we know SASE architectures have been heavily adopted. We understand that outside of enterprise is one of the biggest risks for breach and we know that T-Mobile is thinking about its customers and it’s thinking about how to be more secure than its competition. And these are all good things.

Patrick Moorhead: Yeah. The final loop back here is they’re implementing this through what’s called a security slice. And while we’ve talked about different slices and different levels of quality for 5G streams, you couldn’t do that without SA. So they’re doing this through an entirely new way of doing this, which shows off the power of standalone 5G. So to make a long story longer, in the 4G world, even if you didn’t need the throughput and the latency and the speed, it still cost you the same. With 5G it’s scalable, right? You want to stream with high latency, low performance, you can do that. It’s essentially virtualizing a network.

Author Information

Daniel is the CEO of The Futurum Group. Living his life at the intersection of people and technology, Daniel works with the world’s largest technology brands exploring Digital Transformation and how it is influencing the enterprise.

From the leading edge of AI to global technology policy, Daniel makes the connections between business, people and tech that are required for companies to benefit most from their technology investments. Daniel is a top 5 globally ranked industry analyst and his ideas are regularly cited or shared in television appearances by CNBC, Bloomberg, Wall Street Journal and hundreds of other sites around the world.

A 7x Best-Selling Author including his most recent book “Human/Machine.” Daniel is also a Forbes and MarketWatch (Dow Jones) contributor.

An MBA and Former Graduate Adjunct Faculty, Daniel is an Austin Texas transplant after 40 years in Chicago. His speaking takes him around the world each year as he shares his vision of the role technology will play in our future.

Related Insights
Can UK Public Sector Security Keep Up With Its Own Digital Growth?
April 2, 2026

Can UK Public Sector Security Keep Up With Its Own Digital Growth?

The UK public sector's complex digital infrastructure has outpaced manual audits. Palo Alto Networks offers visibility to uncover critical security gaps in government and NHS environments....
Are Browsers the New Enterprise Attack Surface No One Is Ready to Defend?
April 2, 2026

Are Browsers the New Enterprise Attack Surface No One Is Ready to Defend?

Browser security is now the primary enterprise attack surface, with 95% of organizations experiencing browser-originated incidents that legacy tools cannot defend....
CrowdStrike Deepens Agentic SOC Strategy Across Partners, Services, and Devices
April 1, 2026

CrowdStrike Deepens Agentic SOC Strategy Across Partners, Services, and Devices

Fernando Montenegro, VP & Practice Lead for Cybersecurity & Resilience at Futurum, examines CrowdStrike’s agentic SOC expansion across partners, IBM, and Intel, and what it means for security execution and...
LevelBlue–SentinelOne Partnership: Does Unified Security Improve Outcomes?
April 1, 2026

LevelBlue–SentinelOne Partnership: Does Unified Security Improve Outcomes?

Fernando Montenegro, VP & Practice Lead for Cybersecurity & Resilience at Futurum, analyzes the LevelBlue SentinelOne partnership and its focus on integrating threat intelligence, AI detection, and response to improve...
Palo Alto Bets on Agentic Endpoints Before Anyone Else Does
April 1, 2026

Palo Alto Bets on Agentic Endpoints Before Anyone Else Does

Palo Alto Networks bets big on AI agent security through Koi acquisition, with CEO Nikesh Arora backing it with a $10M stock purchase, positioning the company as first to formally...
IBM Pushes Voice AI Into watsonx. Can It Drive Enterprise Adoption
March 31, 2026

IBM Pushes Voice AI Into watsonx. Can It Drive Enterprise Adoption?

Nick Patience, VP and AI Practice Lead at Futurum, examines IBM ElevenLabs voice AI integration and how it enables multilingual, secure, voice-first AI agents within watsonx Orchestrate for enterprise workflows....

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.