The name of the base system (platform): | PT Telecom Attack Discovery (PT TAD) |
Developers: | Sparkle |
Date of the premiere of the system: | 2018/03/30 |
Branches: | Telecommunication and communication |
Technology: | Firewall, cybersecurity - Information loss preventions, cybersecurity - Information management and events in a security system (SIEM) |
Signaling Protection Suite — based on PT Telecom Attack Discovery is the advanced universal solution package on protection of signal networks of mobile operators. Identification and blocking of illegitimate traffic will allow to avoid a personal data leakage, failures in work and financial losses.
2018: Launching
The Sparkle company, the international service division of the TIM group, announced on March 30, 2018 start together with Positive Technologies company of a solution package on protection of signal networks. The service solution Signaling Protection Suite in general provides to mobile operators protection of signal 3G networks and 4G from financial losses.
Sparkle and Positive Technologies intend to provide jointly to clients full range of services on information security support, including testing for vulnerabilities, assessment of level of compliance to the advanced practicians, the signal firewall and monitoring of security in real time. Services are aimed at ensuring due protection of all perimeter of signal network. Moreover, such opportunities as detailed analytics and the reporting, are designed to help mobile operators to react to threats without delay.
Networks of mobile communication represent a difficult ecosystem. And, even in spite of the fact that technologies 4G are more advanced in comparison with the previous generations, the security issue still remains open. Infrastructure of 4G networks remains vulnerable to the same attacks, as well as earlier SS7 protocol what our recent researches testify to. Critical vulnerabilities of signal protocols and an error of a configuration of network give to hackers the chance to carry out the attacks aimed, for example, at plunder of personal data of subscribers, tracking of location, fraud and failure in service — Dmitry Kurbatov, the Chief information security officer of telecommunication systems of Positive Technologies said. |