Story image

Global Telecoms Awards recognizes importance of 'signalling security'

07 Nov 17

The 2017 Global Telecoms Awards have named Evolved Intelligence’s SS7 and Diameter Signalling Firewall the Security Solution of the Year at a ceremony in London last week.

The Awards recognise excellence and innovation in the global telecoms industry and is hailed as ‘the premier event recognising innovation and excellence in the global telecoms industry’, celebrating achievements in a variety of telecoms areas.

‘We are delighted to have won this prestigious award and to also see the industry acknowledge the importance of signalling security,” comments Evolved Intelligence’s commercial director, Peter Blackie.

He believes that firewalls require innovative architecture and features. The company combined these with advanced analytics and a clean user interface to come with a solution that helps operators effectively manage traffic.

“Over the last couple of years, we have seen more and more operators recognise the importance of securing their signalling network, so it’s great that excellence in this area is being rewarded.”

He also says operators can respond to new threats or suspect behaviour patterns.

“This allows our customers to stay one step ahead of the criminals and ensure that their networks stay safe for years to come,” he continues.

Earlier this year the company presented at Mobile World Congress in Shanghai. It warned that operators who race to deploy 5G before the 2018 Winter Olympic Games were in danger of relegating security to the sidelines.

“It is only in the last couple of years that we have begun to protect the open door in the SS7 signalling protocol used in second and third generation networks. Hackers and fraudsters have found that door and have now begun exploiting the weakness,” Blackie said at the time.

“It is therefore vital that as well as continuing to close that door, we also ensure that signalling security in 4G and 5G networks gets the attention it requires now and that we do not repeat the mistakes of the past,” he continues.

He says that he understands the relationship between large events and new technologies, but operators will be vulnerable if they overlook security.

He believes that security issues will not disappear as legacy networks shut down.

“The Diameter signalling used in 4G and 5G networks will need improved security to keep the fraudsters at bay – especially as the technology underpinning Diameter will be more familiar to IT and computer hackers than the telecoms technology used in SS7 signalling,” he concludes.

Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
What disaster recovery will look like in 2019
“With nearly half of all businesses experiencing an unrecoverable data event in the last three years, current backup solutions are no longer fit for purpose."
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.
Symantec and Fortinet partner for integration
The partnership will deliver essential security controls across endpoint, network, and cloud environments.
Is Supermicro innocent? 3rd party test finds no malicious hardware
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.
25% of malicious emails still make it through to recipients
Popular email security programmes may fail to detect as much as 25% of all emails with malicious or dangerous attachments, a study from Mimecast says.