Developers: | Positive Technologies |
Date of the premiere of the system: | 2016 |
Last Release Date: | 2017/11/29 |
Branches: | Government and social institutions, Telecommunication and communication |
Technology: | Firewall, cybersecurity - Information management and events in a security system (SIEM) |
The product PT Telecom Attack Discovery (PT TAD) is intended for the automated identification of illegitimate activity in signal networks of the operator and control of the attacks of network of mobile operators.
The product is developed by Positive Technologies company in 2016.
PT Telecom Attack Discovery allows to detect any types of the attacks, to carry out the analysis of traffic for the purpose of operational investigation of an incident and acceptance of response measures.
Specific Features:
- Monitoring of signal networks of the operator in real time.
- Advanced means of analytics for quick reaction on an incident.
- Intuitive navigation ― the developed means of filtering, grouping and sorting of incidents are available.
2017: Concept of 2-level protection of corporate infrastructure against the attacks
Positive Technologies companies and the Open mobile platform at the end of November, 2017 submitted the concept of two-level protection of corporate infrastructure against the attacks via mobile devices and telecom operators.
Approach is based on one-time protection at two levels (the operator and end mobile devices), allows to notify instantly Information security departments for timely reaction and also performs the retrospective analysis of illegitimate traffic and helps with investigation of incidents.
As a rule, the companies place emphasis on defense of perimeter, disregarding mobile devices. Whereas mobile devices perform a part of functions of corporate communication: employees can browse the service information, check e-mail, etc., using personal gadgets. And, together with it, smartphones on popular OS long ago under a sight at malefactors, ― were emphasized by Dmitry Kurbatov, the Chief information security officer of telecommunication systems, Positive Technologies. ― our own researches of mobile networks of the operator show that vulnerabilities of the last open ample opportunities for industrial espionage: at least in 50% of cases malefactors can intercept and listen to calls, in 58% — to define location of the subscriber, and in 89% — to intercept the SMS. All this in a complex requires the approach to security considering both directions. |
According to Positive Technologies, complex use of such technologies as PT Telecom Attack Discovery and OS Sailfish Mobile OS Rus providing security of end mobile devices will allow to build the protected corporate mobile platform.
On the basis of the Sailfish Mobile OS Rus operating system and cloud software of Sailfish Cloud Rus we provide the entrusted corporate solutions for mobile devices and servers, and PT Telecom Attack Discovery allows to provide protection against external threats in real time, ― Pavel Eyges, the CEO of Open Mobile Platform company added. |
The solution is intended, first of all, for the large corporations, public institutions and special services including developing virtual mobile operators for own needs or commercial use.