

August 12, 2024
5G for Connected Workers: Transforming Remote Work v1
Howard Holton
1. Introduction
This GigaOm report was commissioned by T-Mobile.
The advent of 5G technology is revolutionizing a wide range of industries, especially for the remote worker. Sales people, field technicians, maintenance staff, engineers, and others can now link remote locations with central offices more effectively than ever. This transformation is facilitated by devices such as 5G-enabled laptops, mobile phones, wearables, and other connected worker technologies, which enable real-time data collection, sharing, and communication.
This report explores how 5G is enhancing productivity, collaboration, and operational efficiency. It further explores the T-Mobile 5G network and the unique capabilities that 5G-enabled laptops bring in remote-use scenarios.
2. 5G-Connected Laptops: Enabling Remote Work
The shift toward remote work is a significant trend, with an estimated 22% of the US workforce expected to be remote by 2025, according to a recent Upwork survey. However, 73% of executives perceive home workers as a greater security risk, and their concerns are valid. Off-site staff often rely on unsecured public Wi-Fi networks or unmanaged home networks, which can expose them to cyber threats such as data interception, malware, and unauthorized access. Public Wi-Fi networks are the primary source of cyberattacks, with 39% of respondents confirming Wi-Fi attacks as their foremost security threat. Securing these connections is paramount to protect sensitive data and maintain business continuity.
5G-connected laptops are emerging as a solution to address these concerns, with the effort boosted by innovative partnerships between network operators and hardware providers. With T-Mobile, we are seeing the single largest 5G network operator providing laptops equipped with cellular modems optimized for the T-Mobile 5G network. The result is a best-of-breed offering of advanced network, client connectivity, and computing platform capability to ensure a more seamless and secure connected experience.
Our hands-on testing of laptops connected to the T-Mobile 5G network shows that users can expect impressive performance (Figure 1). Download speeds across the sample of four locations averaged 166.6 Mbps, with Bend, Oregon, producing the highest rate of 192.9 Mbps. The Seattle location tested slowest at 142.5 Mbps; however, it did provide the best latency, at 49 ms. The other three locales all produced 60 ms latencies.
Figure 1. T-Mobile 5G Real-Word Test Results
Understanding 5G
As the latest iteration of cellular connectivity, 5G is often misunderstood. Many users believe 5G is simply a faster network standard when in fact much of the value of 5G is in its versatility, scalability, and advanced security capabilities. Here, we address some of the common questions and concerns facing organizations exploring a move to 5G:
5G vs. Wi-Fi: While Wi-Fi is well-established and widely used, it has limitations in terms of security, reliability, and coverage. 5G offers superior performance, enhanced security features, and broader coverage, making it a more suitable choice for remote workers who require consistent, high-quality connectivity. Also, cellular is inherently designed for mobility while Wi-Fi is not, enabling all the advantages 5G offers while allowing for end-user mobility across the entire country.
Cost considerations: The cost of implementing 5G laptops for mobile workers may seem high, but T-Mobile subsidizes the cost of its hardware to bring it at or under the cost of a similar laptop without 5G. Additionally, the long-term benefits of increased productivity, improved security, and reduced downtime typically outweigh the additional upfront expense. As 5G technology becomes more widespread, device costs are expected to decrease, making it more affordable for organizations of all sizes.
Spectrum availability and coverage: T-Mobile’s extensive spectrum holdings, particularly in the low-band and mid-band ranges, ensure broad and reliable 5G coverage across the United States. The company’s ongoing network expansion and optimization efforts aim to enhance coverage and performance further, addressing concerns about 5G availability in certain areas—for instance, by having a presence on 60 low Earth orbit satellites in partnership with SpaceX.
Device compatibility: Device compatibility may be a consideration for organizations as 5G technology evolves. T-Mobile’s partnerships with device manufacturers ensure that a growing range of 5G-connected laptops and other devices will be available to meet the downfield requirements of specific use cases and user profiles.
Advantages of 5G for Mobile Workers Using Laptops
For mobile workers, 5G technology offers important benefits, ranging from improved performance over standards like 4G and LTE to significantly enhanced security. Advantages of 5G for mobile workers using laptops include:
Enhanced connectivity and speed: 5G networks can theoretically deliver gigabit-level speeds (versus 100 Mbps peak theoretical performance with 4G), enabling seamless access to cloud-based applications, high-quality video conferencing, and rapid file transfers. This improved performance boosts productivity and collaboration for remote workers.
Low latency: 5G significantly reduces latency compared to previous generations, enabling real-time responsiveness for applications like remote desktop access, online collaboration tools, and virtual reality/augmented reality (VR/AR) use cases.
Improved reliability: 5G networks are designed to handle a larger number of connected devices without compromising performance. This reliability is crucial for remote workers who require consistent connectivity to perform tasks—such as in healthcare, where an inability to maintain system access can lead to dangerous patient outcomes.
Enhanced security: 5G incorporates advanced security features, such as end-to-end encryption, mutual authentication, and network slicing. These capabilities provide a more secure environment than public Wi-Fi or unmanaged networks, protecting sensitive data and minimizing the risk of cyber threats.
Seamless mobility: 5G offers wider coverage and seamless handoffs between different network nodes, enabling mobile workers to stay connected while on the move, whether in urban or rural areas.
Performance Evaluation
We were able to conduct limited hands-on performance tests of 5G-enabled laptops connected to the T-Mobile 5G network. These tests were done over time, in four different locations, to evaluate the effectiveness of 5G-connected laptops in real-world conditions. As shown in the performance chart in Figure 1, our tests across four locales produced an average download speed of 166.6 Mbps and an average upload speed of 7.8 Mbps.
We also tracked connection latency across a number of leading websites, reflecting the experience for some of the most popular hosting environments over a 5G connection. While higher throughput is helpful in transacting large volumes of data and other digital assets, the actual user experience, in the form of responsiveness and immediacy, is defined by latency. Our tests (Figure 2) showed latencies for Apple, Google, and Facebook to be around 50 to 60 ms, while Microsoft and Amazon produced latencies above 110 ms. Overall, average latency was measured at 81.3 ms. The conclusion: While 5G is vital for effective connectivity, performance will be impacted by aspects outside of the network and client links to it. For instance, T-Mobile has architected its network with hyperscalers for millisecond latency services access over 5G, spending considerable time architecting the network with, for example, traffic shaping and pairing backhaul to the data center.
Figure 2. Latency by Website
Finally, we looked at throughput based on developer application (Figure 3), specifically measuring Microsoft Visual Studio Code, Node.js, Python, and Chrome. Average throughput for all four apps was 4.8 Mbps, with Python leading at 6.1 Mbps, and Microsoft and Node close behind at just over 5.9 Mbps. Chrome trailed significantly, producing just 1.1 Mbps of throughput.
3. Network and Security Considerations
5G Leadership: Spectrum Holdings and Deployment
T-Mobile has established itself in the 5G race through its strategic spectrum acquisitions and innovative deployment approaches. With 97% coverage of the US population, T-Mobile can provide remote workers with high-speed and reliable connectivity virtually anywhere in the country. This extensive coverage is made possible by an ownership of the spectrum license that gives T-Mobile more network capability than any other US provider. The solution employs a “layer cake” strategy, utilizing a combination of low-band, mid-band, and high-band spectrum to deliver comprehensive 5G coverage and performance. The layered service model looks like this:
Low-band spectrum (600 MHz)
: Provides expansive coverage, including in rural and suburban areas, ensuring that 5G is accessible to a wide audience. This spectrum is particularly effective at penetrating buildings and covering large areas.
Mid-band spectrum (2.5 GHz)
: Considered the “sweet spot” for 5G, balancing speed and coverage. T-Mobile’s acquisition of 2.5 GHz spectrum through Auction 108 significantly enhances its capacity and performance, especially in urban and suburban areas.
High-band spectrum (mmWave)
: Offers ultra-fast speeds in densely populated urban areas and specific high-demand locations like stadiums and campuses. Although range is limited, it provides the highest data rates for bandwidth-intensive applications.
Advanced Features of T-Mobile’s 5G Network
In addition to wide coverage, the T-Mobile 5G network offers several advanced features that enhance its performance and reliability:
Nationwide 5G standalone (SA) network
: T-Mobile’s 5G SA network is built from the ground up, offering improved speed, latency, and security compared to non-standalone (NSA) networks that rely on 4G infrastructure.
Network slicing
: This capability allows T-Mobile to create multiple virtual networks on top of a single physical 5G network, each optimized to support specific use cases, such as remote work, IoT, or mission-critical applications.
Multi-connectivity
: The T-Mobile 5G network supports multi-connectivity, allowing devices to simultaneously connect to multiple network nodes (e.g., 5G, 4G, and Wi-Fi) for seamless handovers and improved reliability.
5G Security: A Zero-Trust Network by Design
5G networks are inherently designed with a zero-trust architecture, making them a natural fit for organizations looking to secure their remote workers. Unlike traditional networks that assume trust based on location or perimeter security, 5G requires continuous verification and authentication before granting access to network resources. Some of the security features built into the 5G standard include:
Enhanced subscriber privacy: 5G introduces the Subscription Concealed Identifier (SUCI) to protect against IMSI catchers
Improved key hierarchy: A more complex key derivation mechanism for better security
Stronger encryption algorithms: Support for 256-bit encryption
Network slicing security: Isolation and access control for different network slices
Security Edge Protection Proxy (SEPP): Protects signaling messages at network borders
Unified authentication framework: Supports various authentication methods, including EAP-based mechanisms
Secondary authentication: Allows for additional service-level authentication
Increased home network control: The home network has more control over authentication decisions
Improved secure storage and processing environment: For subscriber credentials
Security Anchor Function (SEAF): Enhances security in the serving network
By leveraging these built-in security features, T-Mobile’s 5G network provides a solid foundation for organizations looking to secure their remote workers’ devices and data.
T-SIMsecure: Combining the Power of 5G and Advanced Security
T-Mobile’s T-SIMsecure is a game-changing SASE (Secure Access Service Edge) solution that combines the inherent security features of 5G with advanced security capabilities. By integrating T-SIMsecure into its 5G network, T-Mobile offers a multilayered approach to protecting customer data and devices, delivering unmatched network security. Some of the key security features of T-SIMsecure include:
End-to-end encryption: T-SIMsecure ensures that all data transmitted over the 5G network is encrypted from the device to the network core, protecting against eavesdropping and tampering.
Zero-trust authentication: The solution implements a zero-trust security model, continuously verifying the identity and integrity of devices before granting access to network resources.
Threat detection and response: T-SIMsecure incorporates advanced threat detection and response capabilities, using machine learning and AI to identify and mitigate potential security threats in real time.
T-SIMsecure integrates security protocols directly into the SIM card. This embedded security simplifies authentication, reduces administrative complexity, and provides comprehensive protection for a wide range of devices, including laptops, tablets, and IoT devices. Key advantages of T-SIMsecure include:
Clientless authentication: T-SIMsecure utilizes the International Mobile Subscriber Identity (IMSI) and International Mobile Equipment Identity (IMEI) embedded in SIM cards for automatic device authorization, streamlining the authentication process for IT and security teams.
Enhanced security: By integrating security protocols directly into the SIM card, T-SIMsecure ensures that security measures are deeply embedded in the device itself, reducing the risk of unauthorized access and enhancing the overall security posture of the network.
Simplified management: T-SIMsecure automates the authentication process, reducing administrative complexity and the potential for human error in managing separate authentication mechanisms for each device.
Protection for non-traditional devices: T-SIMsecure extends security to devices that may not support traditional SASE software, such as IoT devices and routers, ensuring comprehensive protection across the entire network.
Seamless remote access: With T-SIMsecure, mobile employees can seamlessly and securely access company data and applications while on the go without the need for additional authentication steps.
At Risk: Public and Unmanaged Private Wireless Networks
While 5G offers significant security advantages, it’s essential to understand the risks associated with alternative connectivity options, such as public Wi-Fi and unmanaged private wireless networks. Commonly found in cafes, airports, and other public spaces, public Wi-Fi networks are notoriously insecure. These networks often lack even basic security measures, such as encryption and authentication, making them prime targets for cybercriminals. Attackers can easily intercept data transmitted over public Wi-Fi, steal sensitive information, or distribute malware to connected devices.
Unmanaged private wireless networks, such as those found in employees’ homes, likewise pose significant risks. These networks may have unknown vulnerabilities, outdated security settings, or even malicious devices connected to them. Without proper management and oversight, these networks can serve as entry points for attackers to compromise remote workers’ devices and gain unauthorized access to corporate resources.
Trusting employees to be vigilant when using these networks is not a reliable approach to security. Even the most security-conscious users can fall victim to sophisticated phishing attacks or inadvertently connect to a rogue access point. The potential data loss, financial damage, and reputational harm resulting from a security breach far outweigh any perceived convenience or cost savings associated with using unsecured networks.
4. Conclusion
5G technology is transforming the worker experience, improving performance, coverage, mobility, security, and more. Of these, security is most important. Organizations cannot afford the financial and reputational risks associated with security breaches, making the adoption of 5G-connected devices a top priority.
T-Mobile’s 5G network, with its extensive coverage, advanced capabilities, and robust security features, stands out as the clear choice for organizations looking to empower their connected workers. By partnering with device manufacturers to deliver 5G-connected laptops with industry-leading performance and hardware-based security, T-Mobile offers a comprehensive solution that addresses the unique challenges faced by remote workers.
The company’s T-SIMsecure SASE solution is a case in point. It provides robust security that is fine-tuned for remote work scenarios, ensuring that the benefits of 5G connectivity are fully realized in a secure environment.
With T-Mobile, organizations can unlock the full potential of 5G technology, enabling remote workers to thrive through enhanced performance, seamless mobility, and resilient security measures. As the 5G landscape continues to evolve, T-Mobile’s strategic and ongoing investments ensure that it will remain at the forefront of innovation, enhancing the worker experience and maintaining its leadership in the 5G space.
For more information on 5G solutions, visit T-Mobile’s business solutions page.
5. About Howard Holton
Howard Holton is an analyst at GigaOm. He has worked in IT for three decades, the last half in executive leadership, as a CIO and CTO. He has been an engineer, an architect, and a leader in telecom, health care, automotive, retail, legal, and technology.
In the last decade, Howard focused on cloud technology and economics, data analytics, and digital transformation. As CTO of Hitachi Vantara, he spent his time developing digital transformation, IT, and data strategies for Fortune 1000 companies and global governments.
His years at Rheem Manufacturing, Hitachi Vantara, and others provided the experience that helped him develop a mind for leadership—the successful execution of vision and culture to inspire. Successful leadership is all about maximizing your team’s potential, as Howard has demonstrated over the course of his career.
Howard is also a technologist at heart; passionate about how data science and new technologies can be used to accelerate time-to-market and better serve the customer, now and in the future. Howard has been a trusted advisor and agent of change to a number of organizations, bringing vision and successful execution to internal and external customers alike.
6. About GigaOm
GigaOm provides technical, operational, and business advice for IT’s strategic digital enterprise and business initiatives. Enterprise business leaders, CIOs, and technology organizations partner with GigaOm for practical, actionable, strategic, and visionary advice for modernizing and transforming their business. GigaOm’s advice empowers enterprises to successfully compete in an increasingly complicated business atmosphere that requires a solid understanding of constantly changing customer demands.
GigaOm works directly with enterprises both inside and outside of the IT organization to apply proven research and methodologies designed to avoid pitfalls and roadblocks while balancing risk and innovation. Research methodologies include but are not limited to adoption and benchmarking surveys, use cases, interviews, ROI/TCO, market landscapes, strategic trends, and technical benchmarks. Our analysts possess 20+ years of experience advising a spectrum of clients from early adopters to mainstream enterprises.
GigaOm’s perspective is that of the unbiased enterprise practitioner. Through this perspective, GigaOm connects with engaged and loyal subscribers on a deep and meaningful level.
7. Copyright
© Knowingly, Inc. 2024 "5G for Connected Workers: Transforming Remote Work" is a trademark of Knowingly, Inc. For permission to reproduce this report, please contact sales@gigaom.com.