Menu

T-mobile First SIM-Based SASE

T-mobile First SIM-Based SASE

The Six Five Team discusses T-mobile First SIM-Based SASE.

If you are interested in watching the full episode you can check it out here.

Disclaimer: The Six Five Webcast is for information and entertainment purposes only. Over the course of this webcast, we may talk about companies that are publicly traded and we may even reference that fact and their equity share price, but please do not take anything that we say as a recommendation about what you should do with your investment dollars. We are not investment advisors and we ask that you do not treat us as such.

Transcript:

Patrick Moorhead: SASE is a fancy way of combining four different security technologies into one. I believed it was coined by Gartner. That doesn’t mean it’s right or it’s accurate, but I do think this one is. And there’s multiple ways to do SASE. Which essentially protection on everything on the edge. One way is to have a software agent out there. And that is the predominant way of doing it. That software agent is on phones, it’s on PCs. Heck, you can put that software inside to a router everywhere. And essentially, you want to make sure that what is coming in is exactly what it says, and it only gets access to the data and resources that it’s enabled for.

What T-Mobile has done, which is a first on a worldwide basis. I didn’t know if it was on a worldwide basis. I guess that matters or doesn’t matter because T-Mobile operates here only in the United States and it’s basically Deutsche Telekom outside, but they’re doing hardware based SIM SASE. And anybody who knows anything about security… And listen, everybody’s a security expert in one shape or form, but every single thing that I’ve seen in the last 15 years that if it’s hardware-based security, it’s fundamentally harder to crack because software is inherently full of holes. And essentially, anything with one of these SIM capabilities enables you to get a higher degree of authentication and essentially telling the services and the software that you are who you are and you can get access to what you want to get access to. So congratulations to the team out there at T-Mobile at AT&T and Verizon do not have this capability. And I think this just shows the uncarrier for businesses that T-Mobile is executing so well on.

Daniel Newman: Yeah. I don’t have a ton on this one to add, Pat. But look, I think T-Mobile made a really great case. It’s that, A, it doesn’t seem to be if anymore, your data’s going to get breached, it’s really when. And that the cost of a data breach is really growing at an exponential rate. The ability to add more security around the perimeter, both through private and secure internet access gives enterprise businesses users a level of protection that should add layers of abstraction from the ability for bad actors to get at the data. And so it’s innovation. It’s innovation that doesn’t exist in the competition. And when you talk about business and government, it really is their responsibility to do everything in their power to reduce risk of being breached. And so I like what you said at the end, Pat, it’s probably my most prudent and important argument I’ll make here, but they do it and everyone else doesn’t.

So if you’re a business customer and you’re running on a competition that does not offer these additional layers of protection and then something goes wrong, you genuinely know that you could have done something to potentially have reduced the risk of being a victim of a data breach. So what happens next, Pat? Do the competition invest in catch up? Can they invest in catch up? And if so, how quickly? But we know SASE architectures have been heavily adopted. We understand that outside of enterprise is one of the biggest risks for breach and we know that T-Mobile is thinking about its customers and it’s thinking about how to be more secure than its competition. And these are all good things.

Patrick Moorhead: Yeah. The final loop back here is they’re implementing this through what’s called a security slice. And while we’ve talked about different slices and different levels of quality for 5G streams, you couldn’t do that without SA. So they’re doing this through an entirely new way of doing this, which shows off the power of standalone 5G. So to make a long story longer, in the 4G world, even if you didn’t need the throughput and the latency and the speed, it still cost you the same. With 5G it’s scalable, right? You want to stream with high latency, low performance, you can do that. It’s essentially virtualizing a network.

Author Information

Daniel is the CEO of The Futurum Group. Living his life at the intersection of people and technology, Daniel works with the world’s largest technology brands exploring Digital Transformation and how it is influencing the enterprise.

From the leading edge of AI to global technology policy, Daniel makes the connections between business, people and tech that are required for companies to benefit most from their technology investments. Daniel is a top 5 globally ranked industry analyst and his ideas are regularly cited or shared in television appearances by CNBC, Bloomberg, Wall Street Journal and hundreds of other sites around the world.

A 7x Best-Selling Author including his most recent book “Human/Machine.” Daniel is also a Forbes and MarketWatch (Dow Jones) contributor.

An MBA and Former Graduate Adjunct Faculty, Daniel is an Austin Texas transplant after 40 years in Chicago. His speaking takes him around the world each year as he shares his vision of the role technology will play in our future.

Related Insights
Teradata Trades Duct Tape for Unified Intelligence With Its Latest Release
March 10, 2026

Teradata Trades Duct Tape for Unified Intelligence With Its Latest Release

Brad Shimmin, VP and Practice Lead at Futurum, analyzes Teradata’s launch of the Agentic Enterprise Vector Store. This multi-modal pivot aims to challenge the standalone vector database by bringing AI...
Can Microsoft's Frontier Suite Deliver AI Excellence at Scale
March 10, 2026

Can Microsoft’s Frontier Suite Deliver AI Excellence at Scale?

Futurum analysts Keith Kirkpatrick and Fernando Montenegro share their insights on Microsoft’s Frontier Suite, and discuss the implications for both enterprise buyers and the company’s competitors....
Okta Q4 FY 2026 Earnings Highlight Agentic Identity Positioning
March 6, 2026

Okta Q4 FY 2026 Earnings Highlight Agentic Identity Positioning

Dion Hinchcliffe is Vice President & Practice Lead, CIO & Technology Buyers reviews Okta’s Q4 FY 2026 earnings, focusing on agentic identity positioning, evolving pricing models, and how large-customer platform...
Commvault-CrowdStrike SIEM Link Tests Bi-Directional Resilience
March 6, 2026

Commvault-CrowdStrike SIEM Link Tests Bi-Directional Resilience

Fernando Montenegro, VP and Practice Lead, Cybersecurity at Futurum, examines how Commvault’s bi-directional integration with CrowdStrike Falcon Next-Gen SIEM enables shared backup-integrity telemetry to fasten recovery after cyberattacks....
CrowdStrike Q4 FY 2026 Earnings Extend ARR Scale and AI Security Focus
March 6, 2026

CrowdStrike Q4 FY 2026 Earnings Extend ARR Scale and AI Security Focus

Fernando Montenegro, VP Cybersecurity at Futurum, highlights CrowdStrike’s Q4 FY26 earnings: Falcon expands into AI security, identity, and browser runtime, underscoring consolidation-driven cybersecurity strategies....
S3NS & Sovereignty Can Thales-Google Venture Make AI Sovereignty Work at Scale
March 5, 2026

S3NS & Sovereignty: Can Thales-Google Venture Make AI Sovereignty Work at Scale?

Nick Patience, VP & Practice Lead for AI Platforms at Futurum Research, assesses S3NS’s progress following its SecNumCloud qualification, evaluates the sovereign AI roadmap, and examines what the Thales-Google Cloud...

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.