In this chapter, overview of the security challenges and requirements, and their possible solutions, are discussed. Starting from the recommendations and security challenges that will face 5G networks, the chapter goes in depth into the possible security technologies. Also provided are new technological concepts that are highly important in 5G with their security implications. Furthermore, the ... [Show full abstract] chapter provides an overview of how the new technologies such as Software Defined Networking (SDN) and Network Function Virtualization (NFV) will be used to enhance the security of 5G networks. The chapter concludes with future directions and research challenges in 5G security.