NOTE! This site uses cookies and similar technologies.

Please, Accept to improve your experience of this site. Learn more

I Accept

Blue Telecom Consulting Presents M2M Active Monitoring Solution That Measures and Analyses the Quality of Network Services

  • M2M Active Monitoring is a flexible and customizable cloud solution permitting both operators and corporate customers to monitor the performance of services and take steps to ensure their quality
  • The solution is specifically designed for international use, capable of measuring the quality of services even while roaming

 

BlueTC presenta NFV Security, un sistema de detección de intrusiones para redes IMS virtuales e híbridas, en el MWC 2015 (Comunicaciones Hoy)

Blue Telecom Consulting (BlueTC), consultora internacional especializada en el sector de las telecomunicaciones que ofrece servicios y soluciones innovadores para operadores y fabricantes de equipos de red, aprovecha su presencia como expositor en el GSMA Mobile World Congress para realizar sus primeras demostraciones de NFV Security.

Blue Telecom Consulting Showcases a Selection of New Operator Use Cases at the Mobile World Congress in Barcelona, March 2 to 5

To keep up with market tendencies and fast changing customers' needs, BlueTC has carefully updated its portfolio and will launch new additions to existing solutions and present more comprehensive use cases at the upcoming Mobile World Congress in Barcelona.

The company has prepared the following three live demonstrations that will be on display for companies that book a meeting at the BlueTC booth, Hall 8.0- D20: NFV Security - Network and System Analytics - M2M Active Monitoring

Blue Telecom Consulting Awarded an Advanced Network Audit Project with Mobile Operator Azercell (Azerbaijan), part of Teliasonera Group

The network audit is based on BlueTC’s Network Analytics Solution combined with monitoring tools and will permit correlating network data with the aim of measuring impact on network performance and recommending action plans for optimization.

 Protection of critical telecom network resources

Protection of Critical Telecom Network Resources (Telecom Know How)

Sophisticated attacks require real time intrusion detection and analytics

This article focuses on mobile network security rather than on the devices themselves. The author claims that although the security issues around mobile devices are highly relevant, it is one only of several areas which needs to be carefully considered in an end-to-end network security perspective. The transition to all-IP networks are calling for new tools and solutions.