As an operator you must allow and encourage signalling across your network, yet filter out unwanted traffic.
In this third session in a series of the Webinars on 5G Voice Security, BlueTC recommends that you add forensic analytics capabilities to identify sophisticated attacks which could lead to identity theft, fraud or revenue leakage, among other issues.
This webinar thus focuses on the operational requirements and tools to secure voice services in a packet switched network. As an Operator you must allow and encourage signalling across your network, yet filter out unwanted traffic.
In our 2nd webinar we highlighted the limitations of SBCs and in this webinar we go on to argue that firewalls alone are too cumbersome and blunt instruments. In addition, the added value of our approach is that it allows you to monitor QoS per session in real-time and has a lower TCO than alternative solutions.
As a bonus and wrap-up of this 5G Voice Security Webinar series we will have a bonus session on March 24. Our two guest speakers are representatives from European Institutions, the European Commission and ENISA, that work with the policy development and implementation sides of the EU 5G Security Toolbox.
If you would like to receive a link to a private recording of the other two Webinars in this Analytics/AI series, or on other topics, please send and email with your contact data to firstname.lastname@example.org.
Leave a comment